Performance Analysis of ECDSA Based SE-AODV Routing Protocol In VANETS

  • Authors

    • Deepak .
    • Rajkumar .
    2018-07-26
    https://doi.org/10.14419/ijet.v7i3.16.16187
  • AODV, BH-AODV, ECDSA, NS3, SE-AODV, VANETs.
  • Vehicular ad hoc networks is an emerging area for researchers to provide intelligent transportation system to the society. It is due to the wide area of applications of VANETs interest is developed among the people from different countries to be a part of it. Therefore many projects had been started and also presently working to implement VANETs in real world scenario. The main challenge in its implementation is to provide a secure mechanism against the various attacks and threats that have the capability to bring the network performance significantly down. In this paper to overcome different types of authentication based attacks in VANETs an ECDSA based secure routing protocol SE-AODV is proposed with security features incorporated in already existing AODV routing protocol. The performance of SE-AODV is evaluated and compared with original AODV and AODV with black hole attack (BH-AODV). The SE-AODV shows better performance with the parameters used for comparison with the variation in vehicle density, speed of vehicles and simulation time.

     

  • References

    1. [1] Zeadally, Sherali, Ray Hunt, Yuh-Shyan Chen, Angela Irwin, and Aamir Hassan, (2012), “Vehicular Ad Hoc Networks (VANETS): Status, Results, and challengesâ€, Telecommunication Systems, Vol.50, no. 4, pp. 217,241.

      [2] Connected vehicles: The future of transportation; official website: https://www.its.dot.gov/ (last visit: 11.03.2018).

      [3] Xiaomin Ma; Jinsong Zhang; Xiaoyan Yin; Trivedi, K.S, (2012), “Design and Analysis of a Robust Broadcast Scheme for VANET Safety-Related Servicesâ€, IEEE Transactions on Vehicular Technology. vol.61, no.1, pp.46, 61.

      [4] Sumra, I.A.; Ahmad, I.; Hasbullah, H.; bin Ab Manan, J.-L. (2011) “Classes of attacks in VANETâ€, Electronics, Communications and Photonics Conference (SIECPC), 2011 Saudi International , vol. no. pp.1,5, 24-26.

      [5] Nzouonta, J.; Rajgure, N.; Guiling Wang; Borcea, C (2009), “VANET Routing on City Roads Using Real-Time Vehicular Traffic Informationâ€, IEEE Transactions on Vehicular Technology. vol.58, no.7, pp.3609, 3626.

      [6] W. Liang, Z. Li, H. Zhang, Y. Sun, and R. Bie (2014), “Vehicular ad hoc networks: Architectures, research issues, challenges and trendsâ€. https://link.springer.com/chapter/10.1007/978-3-319-07782-6_10 (last visit: 11.03.2018).

      [7] Awerbuch, Baruch, and Amitabh Mishra. "Introduction to Ad Hoc Networks." http://www.cs.jhu.edu/~cs647/intro_adhoc. (last visit 12.04.2018)

      [8] Shie-Yuan Wang, Chih-Che Lin, Wei-Jyun Hong and Kuang-Che Liu (2011), “On the performances of forwarding multihop unicast traffic in WBSS-based 802.11(p)/1609 networksâ€, Computer Networks. Volume 55, Issue 11, Pages 2592-2607.

      [9] Gadkari, Mushtak Y., and Nitin B. Sambre, (2012), “VANET: Routing Protocols, Security Issues and Simulation Toolsâ€, IOSR Journal of Computer Engineering, vol.3, no.3, pp. 28, 38.

      [10] Zeadally, Sherali, Ray Hunt, Yuh-Shyan Chen, Angela Irwin, and Aamir Hassan, (2012), “Vehicular Ad Hoc Networks (VANETS): Status, Results, and challenges. Telecommunication Systemsâ€, Vol.50, no. 4, pp. 217-241.

      [11] Fatih Sakiz and Sevil Sen (2017), “A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoVâ€, Ad Hoc Networks.Vol. 61, pp. 33-50

      [12] Hamssa Hasrouny, Abed Ellatif Samhat, Carole Bassil and Anis Laouiti (2017), “VANET security, challenges and solutions: A surveyâ€, Vehicular Communications,Vol. 7 pp. 7-20

      [13] Richard Gilles Engoulou, Martine Bellaïche, Samuel Pierre, Alejandro Quintero(2014), “VANET security surveys. Computer Communications†vol. 44, pp. 1-13.

      [14] Bassem Mokhtar and Mohamed Azab (2015), “Survey on security issues in Vehicular Ad hoc Networksâ€, Alexandria Engineering Journal. https://doi.org/10.1016/j.aej.2015.07.011 pp 1115-1126.

      [15] Hau Hu, Rongxing Lu and Zonghua Zhang (2016), “VTrust: A robust trust framework for relay selection in hybrid vehicular communicationsâ€,IEEE Global Communications Conference (GLOBECOM). DOI 10.1109/GLOCOM.2015.7417027

      [16] C. Gentry and Z. Ramzan (2006), “Identity-based aggregate signaturesâ€, Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA,April24-26, 2006, Proceedings, pp. 257–273,

      [17] R. Sugumar, A.Rengarajan and C.Jayakumar (2016), “Trust based authentication technique for cluster based vehicular ad hoc networks (VANET)â€, Wireless Netw.DOI 10.1007/s11276-016-1336-6

      [18] Chengzhe Lai, Kuan Zhang, Nan Cheng, Hui Li and Xuemin Shen (2016), “SIRC: A Secure Incentive Scheme for Reliable
      Cooperative Downloading in Highway VANETsâ€, IEEE transactions on intelligent transportation systems. pp 1-16

      [19] Parul Tyagi, Deepak Dembla (2018), “Advanced secured outing Algorithm of Vehicular ad hoc Networkâ€, Wireless Pers Commun. Springer. https://doi.org/10.1007/s11277-018-5824-0

      [20] Joon-Sang Park and Seung Jun Beak (2012), “Securing one-way hash chain based incentive mechanism for vehicular ad hoc networksâ€, Peer-to-Peer Netw. Appl.. DOI 10.1007/s12083-012-0178-y

      [21] Suguo Du, Xiaolong Li, Junbo Du, Haojin Zhu (2012), “An attack-and-defence game for security assessment in vehicular ad hoc networksâ€, Peer-to-Peer Netw. Appl. DOI 10.1007/s12083-012-0127-9

  • Downloads

  • How to Cite

    ., D., & ., R. (2018). Performance Analysis of ECDSA Based SE-AODV Routing Protocol In VANETS. International Journal of Engineering & Technology, 7(3.16), 76-80. https://doi.org/10.14419/ijet.v7i3.16.16187