Performance Analysis of ECDSA Based SE-AODV Routing Protocol In VANETS
DOI:
https://doi.org/10.14419/ijet.v7i3.16.16187Published:
2018-07-26Keywords:
AODV, BH-AODV, ECDSA, NS3, SE-AODV, VANETs.Abstract
Vehicular ad hoc networks is an emerging area for researchers to provide intelligent transportation system to the society. It is due to the wide area of applications of VANETs interest is developed among the people from different countries to be a part of it. Therefore many projects had been started and also presently working to implement VANETs in real world scenario. The main challenge in its implementation is to provide a secure mechanism against the various attacks and threats that have the capability to bring the network performance significantly down. In this paper to overcome different types of authentication based attacks in VANETs an ECDSA based secure routing protocol SE-AODV is proposed with security features incorporated in already existing AODV routing protocol. The performance of SE-AODV is evaluated and compared with original AODV and AODV with black hole attack (BH-AODV). The SE-AODV shows better performance with the parameters used for comparison with the variation in vehicle density, speed of vehicles and simulation time.
References
[1] Zeadally, Sherali, Ray Hunt, Yuh-Shyan Chen, Angela Irwin, and Aamir Hassan, (2012), “Vehicular Ad Hoc Networks (VANETS): Status, Results, and challengesâ€, Telecommunication Systems, Vol.50, no. 4, pp. 217,241.
[2] Connected vehicles: The future of transportation; official website: https://www.its.dot.gov/ (last visit: 11.03.2018).
[3] Xiaomin Ma; Jinsong Zhang; Xiaoyan Yin; Trivedi, K.S, (2012), “Design and Analysis of a Robust Broadcast Scheme for VANET Safety-Related Servicesâ€, IEEE Transactions on Vehicular Technology. vol.61, no.1, pp.46, 61.
[4] Sumra, I.A.; Ahmad, I.; Hasbullah, H.; bin Ab Manan, J.-L. (2011) “Classes of attacks in VANETâ€, Electronics, Communications and Photonics Conference (SIECPC), 2011 Saudi International , vol. no. pp.1,5, 24-26.
[5] Nzouonta, J.; Rajgure, N.; Guiling Wang; Borcea, C (2009), “VANET Routing on City Roads Using Real-Time Vehicular Traffic Informationâ€, IEEE Transactions on Vehicular Technology. vol.58, no.7, pp.3609, 3626.
[6] W. Liang, Z. Li, H. Zhang, Y. Sun, and R. Bie (2014), “Vehicular ad hoc networks: Architectures, research issues, challenges and trendsâ€. https://link.springer.com/chapter/10.1007/978-3-319-07782-6_10 (last visit: 11.03.2018).
[7] Awerbuch, Baruch, and Amitabh Mishra. "Introduction to Ad Hoc Networks." http://www.cs.jhu.edu/~cs647/intro_adhoc. (last visit 12.04.2018)
[8] Shie-Yuan Wang, Chih-Che Lin, Wei-Jyun Hong and Kuang-Che Liu (2011), “On the performances of forwarding multihop unicast traffic in WBSS-based 802.11(p)/1609 networksâ€, Computer Networks. Volume 55, Issue 11, Pages 2592-2607.
[9] Gadkari, Mushtak Y., and Nitin B. Sambre, (2012), “VANET: Routing Protocols, Security Issues and Simulation Toolsâ€, IOSR Journal of Computer Engineering, vol.3, no.3, pp. 28, 38.
[10] Zeadally, Sherali, Ray Hunt, Yuh-Shyan Chen, Angela Irwin, and Aamir Hassan, (2012), “Vehicular Ad Hoc Networks (VANETS): Status, Results, and challenges. Telecommunication Systemsâ€, Vol.50, no. 4, pp. 217-241.
[11] Fatih Sakiz and Sevil Sen (2017), “A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoVâ€, Ad Hoc Networks.Vol. 61, pp. 33-50
[12] Hamssa Hasrouny, Abed Ellatif Samhat, Carole Bassil and Anis Laouiti (2017), “VANET security, challenges and solutions: A surveyâ€, Vehicular Communications,Vol. 7 pp. 7-20
[13] Richard Gilles Engoulou, Martine Bellaïche, Samuel Pierre, Alejandro Quintero(2014), “VANET security surveys. Computer Communications†vol. 44, pp. 1-13.
[14] Bassem Mokhtar and Mohamed Azab (2015), “Survey on security issues in Vehicular Ad hoc Networksâ€, Alexandria Engineering Journal. https://doi.org/10.1016/j.aej.2015.07.011 pp 1115-1126.
[15] Hau Hu, Rongxing Lu and Zonghua Zhang (2016), “VTrust: A robust trust framework for relay selection in hybrid vehicular communicationsâ€,IEEE Global Communications Conference (GLOBECOM). DOI 10.1109/GLOCOM.2015.7417027
[16] C. Gentry and Z. Ramzan (2006), “Identity-based aggregate signaturesâ€, Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA,April24-26, 2006, Proceedings, pp. 257–273,
[17] R. Sugumar, A.Rengarajan and C.Jayakumar (2016), “Trust based authentication technique for cluster based vehicular ad hoc networks (VANET)â€, Wireless Netw.DOI 10.1007/s11276-016-1336-6
[18] Chengzhe Lai, Kuan Zhang, Nan Cheng, Hui Li and Xuemin Shen (2016), “SIRC: A Secure Incentive Scheme for Reliable
Cooperative Downloading in Highway VANETsâ€, IEEE transactions on intelligent transportation systems. pp 1-16
[19] Parul Tyagi, Deepak Dembla (2018), “Advanced secured outing Algorithm of Vehicular ad hoc Networkâ€, Wireless Pers Commun. Springer. https://doi.org/10.1007/s11277-018-5824-0
[20] Joon-Sang Park and Seung Jun Beak (2012), “Securing one-way hash chain based incentive mechanism for vehicular ad hoc networksâ€, Peer-to-Peer Netw. Appl.. DOI 10.1007/s12083-012-0178-y
[21] Suguo Du, Xiaolong Li, Junbo Du, Haojin Zhu (2012), “An attack-and-defence game for security assessment in vehicular ad hoc networksâ€, Peer-to-Peer Netw. Appl. DOI 10.1007/s12083-012-0127-9
How to Cite
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Accepted 2018-07-24
Published 2018-07-26