Performance Analysis of ECDSA Based SE-AODV Routing Protocol In VANETS
Keywords:AODV, BH-AODV, ECDSA, NS3, SE-AODV, VANETs.
Vehicular ad hoc networks is an emerging area for researchers to provide intelligent transportation system to the society. It is due to the wide area of applications of VANETs interest is developed among the people from different countries to be a part of it. Therefore many projects had been started and also presently working to implement VANETs in real world scenario. The main challenge in its implementation is to provide a secure mechanism against the various attacks and threats that have the capability to bring the network performance significantly down. In this paper to overcome different types of authentication based attacks in VANETs an ECDSA based secure routing protocol SE-AODV is proposed with security features incorporated in already existing AODV routing protocol. The performance of SE-AODV is evaluated and compared with original AODV and AODV with black hole attack (BH-AODV). The SE-AODV shows better performance with the parameters used for comparison with the variation in vehicle density, speed of vehicles and simulation time.
 Zeadally, Sherali, Ray Hunt, Yuh-Shyan Chen, Angela Irwin, and Aamir Hassan, (2012), â€œVehicular Ad Hoc Networks (VANETS): Status, Results, and challengesâ€, Telecommunication Systems, Vol.50, no. 4, pp. 217,241.
 Connected vehicles: The future of transportation; official website: https://www.its.dot.gov/ (last visit: 11.03.2018).
 Xiaomin Ma; Jinsong Zhang; Xiaoyan Yin; Trivedi, K.S, (2012), â€œDesign and Analysis of a Robust Broadcast Scheme for VANET Safety-Related Servicesâ€, IEEE Transactions on Vehicular Technology. vol.61, no.1, pp.46, 61.
 Sumra, I.A.; Ahmad, I.; Hasbullah, H.; bin Ab Manan, J.-L. (2011) â€œClasses of attacks in VANETâ€, Electronics, Communications and Photonics Conference (SIECPC), 2011 Saudi International , vol. no. pp.1,5, 24-26.
 Nzouonta, J.; Rajgure, N.; Guiling Wang; Borcea, C (2009), â€œVANET Routing on City Roads Using Real-Time Vehicular Traffic Informationâ€, IEEE Transactions on Vehicular Technology. vol.58, no.7, pp.3609, 3626.
 W. Liang, Z. Li, H. Zhang, Y. Sun, and R. Bie (2014), â€œVehicular ad hoc networks: Architectures, research issues, challenges and trendsâ€. https://link.springer.com/chapter/10.1007/978-3-319-07782-6_10 (last visit: 11.03.2018).
 Awerbuch, Baruch, and Amitabh Mishra. "Introduction to Ad Hoc Networks." http://www.cs.jhu.edu/~cs647/intro_adhoc. (last visit 12.04.2018)
 Shie-Yuan Wang, Chih-Che Lin, Wei-Jyun Hong and Kuang-Che Liu (2011), â€œOn the performances of forwarding multihop unicast traffic in WBSS-based 802.11(p)/1609 networksâ€, Computer Networks. Volume 55, Issue 11, Pages 2592-2607.
 Gadkari, Mushtak Y., and Nitin B. Sambre, (2012), â€œVANET: Routing Protocols, Security Issues and Simulation Toolsâ€, IOSR Journal of Computer Engineering, vol.3, no.3, pp. 28, 38.
 Zeadally, Sherali, Ray Hunt, Yuh-Shyan Chen, Angela Irwin, and Aamir Hassan, (2012), â€œVehicular Ad Hoc Networks (VANETS): Status, Results, and challenges. Telecommunication Systemsâ€, Vol.50, no. 4, pp. 217-241.
 Fatih Sakiz and Sevil Sen (2017), â€œA survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoVâ€, Ad Hoc Networks.Vol. 61, pp. 33-50
 Hamssa Hasrouny, Abed Ellatif Samhat, Carole Bassil and Anis Laouiti (2017), â€œVANET security, challenges and solutions: A surveyâ€, Vehicular Communications,Vol. 7 pp. 7-20
 Richard Gilles Engoulou, Martine BellaÃ¯che, Samuel Pierre, Alejandro Quintero(2014), â€œVANET security surveys. Computer Communicationsâ€ vol. 44, pp. 1-13.
 Bassem Mokhtar and Mohamed Azab (2015), â€œSurvey on security issues in Vehicular Ad hoc Networksâ€, Alexandria Engineering Journal. https://doi.org/10.1016/j.aej.2015.07.011 pp 1115-1126.
 Hau Hu, Rongxing Lu and Zonghua Zhang (2016), â€œVTrust: A robust trust framework for relay selection in hybrid vehicular communicationsâ€,IEEE Global Communications Conference (GLOBECOM). DOI 10.1109/GLOCOM.2015.7417027
 C. Gentry and Z. Ramzan (2006), â€œIdentity-based aggregate signaturesâ€, Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA,April24-26, 2006, Proceedings, pp. 257â€“273,
 R. Sugumar, A.Rengarajan and C.Jayakumar (2016), â€œTrust based authentication technique for cluster based vehicular ad hoc networks (VANET)â€, Wireless Netw.DOI 10.1007/s11276-016-1336-6
 Chengzhe Lai, Kuan Zhang, Nan Cheng, Hui Li and Xuemin Shen (2016), â€œSIRC: A Secure Incentive Scheme for Reliable
Cooperative Downloading in Highway VANETsâ€, IEEE transactions on intelligent transportation systems. pp 1-16
 Parul Tyagi, Deepak Dembla (2018), â€œAdvanced secured outing Algorithm of Vehicular ad hoc Networkâ€, Wireless Pers Commun. Springer. https://doi.org/10.1007/s11277-018-5824-0
 Joon-Sang Park and Seung Jun Beak (2012), â€œSecuring one-way hash chain based incentive mechanism for vehicular ad hoc networksâ€, Peer-to-Peer Netw. Appl.. DOI 10.1007/s12083-012-0178-y
 Suguo Du, Xiaolong Li, Junbo Du, Haojin Zhu (2012), â€œAn attack-and-defence game for security assessment in vehicular ad hoc networksâ€, Peer-to-Peer Netw. Appl. DOI 10.1007/s12083-012-0127-9
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).