CFP last date
20 January 2025
Reseach Article

Design a Cloud Security Model in VANET Communication: Implementation, Performance and Security Analysis

by Hatem M. Hamad, Alaaeddin B. AlQazzaz
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 146 - Number 4
Year of Publication: 2016
Authors: Hatem M. Hamad, Alaaeddin B. AlQazzaz
10.5120/ijca2016910666

Hatem M. Hamad, Alaaeddin B. AlQazzaz . Design a Cloud Security Model in VANET Communication: Implementation, Performance and Security Analysis. International Journal of Computer Applications. 146, 4 ( Jul 2016), 1-7. DOI=10.5120/ijca2016910666

@article{ 10.5120/ijca2016910666,
author = { Hatem M. Hamad, Alaaeddin B. AlQazzaz },
title = { Design a Cloud Security Model in VANET Communication: Implementation, Performance and Security Analysis },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2016 },
volume = { 146 },
number = { 4 },
month = { Jul },
year = { 2016 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume146/number4/25383-2016910666/ },
doi = { 10.5120/ijca2016910666 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:49:22.393606+05:30
%A Hatem M. Hamad
%A Alaaeddin B. AlQazzaz
%T Design a Cloud Security Model in VANET Communication: Implementation, Performance and Security Analysis
%J International Journal of Computer Applications
%@ 0975-8887
%V 146
%N 4
%P 1-7
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the first paper of this work, the design and the architecture of our proposed model framework, VANET Security as a Service (VSaaS), was discussed. In this second paper, the performance metrics measurements will be investigated through the NS2, SUMO and Trans simulations, to evaluate the security overhead of the secure Vehicle Information Messages (VIMs), which are sent by the vehicles to the cloud as a coarse-grained information. Moreover, our proposed model framework (VSaaS) will be discussed against the security requirements in the VANET.

References
  1. M. Raya and J. P. Hubaux. The Security of Vehicular Ad Hoc Networks. In SASN ’05: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pages 11–21, New York, NY, USA, 2005. ACM.
  2. V. Khairnar and K. Kotecha, Simulation-Based Performance Evaluation of Routing Protocols in Vehicular Ad-hoc Network. International Journal of Scientific and Research Publications. vol. 3, no. 10, October , 2013.
  3. Y. Khasa and Pooja, Performance Evaluation of Routing Protocols in MANET. International Journal of Computer Science Engineering andTechnology (IJCSET). vol . 6, no. 3,p.p 109-112, March , 2016.
  4. P. Rohal, R. Dahiya and P. Dahiya, Study and Analysis of Throughput, Delay and Packet Delivery Ratio in MANET for Topology Based Routing Protocols (AODV, DSR and DSDV), International Journal for Advance Research In Engineering And Technology (IJARET). vol. 1, no. 2, p.p 54-58 March. 2013.
  5. M. A. Al Mamun, K. Anam, M. F. Onik, A M Esfar- E- Alam, “Deployment of Cloud Computing into VANET to Create Ad Hoc Cloud Network Architecture”, Proceedings of the World Congress on Engineering and Computer Science, USA, 2012, vol. 1, ISBN 978-988-19251-6-9
  6. Q. Xu, T. Mak, J. Ko, and R. Sengupta. Vehicle-to-vehicle safety messaging in DSRC. In Proceedings of the first ACM workshop on Vehicular ad hoc networks, pages 19–28. ACM Press, 2004.
  7. X. Yang, J. Liu, F. Zhao, and N. Vaidya. A vehicle-to-vehicle communication protocol for cooperative collision warning. In First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2004), August 2004.
  8. Crypto++ 5.6.0 Benchmarks, http://www.cryptopp.com/benchmarks.html ,accessed Mar. 2012.
Index Terms

Computer Science
Information Sciences

Keywords

VANET Cloud VSaaS Certified Authority Cryptography Vehicle Information Messages Traffic Information Messages Authentication Privacy Security Overhead