Review on Security Based Vehicular Ad-Hoc Network

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    VANET a vehicular ad-hoc network provides the security to vehicles. To provide security in VANET, we are using Elliptical curve cryptography. In this paper we are going to discuss various techniques of cryptography, the techniques such are Advanced Encryption Standard, Data Encryption Standard, and Triple Data Encryption Standard. These techniques are part of symmetric and asymmetric cryptography. In addition to this there are some attacks which we are discussing in this paper like, masquerade attack, replay attack, insider attack, mutual authentication attack, and parallel session attack. These attacks are on different layer. At the end we are comparing these attacks with each other and compare their quality of services.


  • Keywords

    Elliptical Curve Cryptography; DES; AES; TDES; Security

  • References

      [1] Nshimiyimana A (2016), Comprehensive Survey of V2V Communication for 4G Mobile and Wireless Technology, Proceedings of IEEE WiSPNET conference.

      [2] Bappadiyajana, Mitra S & Jayantaporay (2014), An Analysis of security Threats and Countermeasures in VANET, Techno India University West bengal. India.

      [3] Valle F, Cespedes S.(2016), Improving Vehicular Applications through Network Diversity, De chile, Santiago, Chile.

      [4] Prabha VL & Ranichitra A (2013), Isolating Malicious Vehicles and Avoiding collision between Vehicles in VANET,International conference on communication and signal processing, Vol.2, no.2 pp. 46-51.

      [5] Jain J, Chahal N (2016), A Review on VANET, types, charecteristics and various Approaches, International Journal of Enginnering Scineces & Research Technology, pp-239-245.

      [6] Mahagaonkar SN, Dongre N (2017), TEAC: Timed Efficient Asymmetric Cryptography for Enhancing Security in VANET, International Conference on Nascent Technologies in the Engineering Field .

      [7] Godse SP, Mahalle PN, Wagh SJ (2017), Rising Issues in VANET Communication and Security: A State of Art Survey, International Journal of Advanced Computer Science and Applications, Vol. 8, no. 9, 2017, pp-245-252.

      [8] Setiadi I, Kistijantoro AI, Miyaji A(2015), Elliptic Curve Cryptography: Algorithms and Implementation Analysis over Coordinate Systems, School of Electrical Engineering and Informatics.

      [9] Li X, Liu J, Yao Q, & Ma J (2017), Efficient and Consistent Key Extraction Based on Received Signal Strength for Vehicular Ad Hoc Networks, IEEE Access,Vol. 5, pp.5281-5291.

      [10] Chen L, Li Q, Martin KM, Ng SL(2015), Private reputation retrieval in public privacy-aware announcement scheme forVANETs, IET Information Security, Vol.4, pp.1-29.

      [11] Soni S, Agrawal H, Sharma M(2012), Anlaysis and Comparisonbetween AES and DES Cryptogarphic Algorithm, International Journal of Engineering and Innovative Technology, Vol. 2, no.6, pp-362-365.

      [12] Rahbari M & Jamali MAJ(2011),Efficient detection of Sybil attack based on cryptography in vanet, International Journal of Scinetific and Engineering Research , Vol.3, no.6, pp-185-195.

      [13] Mandal PC(2012), Superiority of BlowfishAlgorithm,International Journal Of AdvancedResearch in Computers Science and SoftwareEngineering, Vol 2 no. 9, pp.14-20.

      [14] Mitali VK & Sharma A (2014), A survey on various cryptographic techniques, International Journal of Emerging Trends & Technology in Computer Science,Vol.3, no.4, pp-307-312

      [15] Iyer KBP, Anusha R, Priya RS(2014), Comparative Study on Various Cryptographic Techniques, International Journal of Computer Applications,pp-37-42




Article ID: 16846
DOI: 10.14419/ijet.v7i3.8.16846

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.