CFP last date
20 January 2025
Reseach Article

Secured VANET Protocol with signature authentication (SVPSA)

by Sonia Lal, Anshika Goyal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 24
Year of Publication: 2018
Authors: Sonia Lal, Anshika Goyal
10.5120/ijca2018917904

Sonia Lal, Anshika Goyal . Secured VANET Protocol with signature authentication (SVPSA). International Journal of Computer Applications. 182, 24 ( Oct 2018), 47-51. DOI=10.5120/ijca2018917904

@article{ 10.5120/ijca2018917904,
author = { Sonia Lal, Anshika Goyal },
title = { Secured VANET Protocol with signature authentication (SVPSA) },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2018 },
volume = { 182 },
number = { 24 },
month = { Oct },
year = { 2018 },
issn = { 0975-8887 },
pages = { 47-51 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number24/30085-2018917904/ },
doi = { 10.5120/ijca2018917904 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:12:22.841633+05:30
%A Sonia Lal
%A Anshika Goyal
%T Secured VANET Protocol with signature authentication (SVPSA)
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 24
%P 47-51
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Vehicular Area Network (VANET) plays an important role in today’s demand of smart roads where the traffic needs to be monitored for safe commuting along with it, the commuters should also be given facilities in case of an emergency or otherwise. Keeping in mind the challenging requirements of the present and the future, in this paper work first previous solutions were reviewed and a new Secured Protocol for VANET with Signature Verification has been proposed. Modified Hill cipher and RSA algorithms are used in sequence to secure the Vehicle’s information transmitted to the Road Side Unit(RSU). Signature verification has been taken care of using Baker’s map. MD5 hashing has been also used to ascertain that there was no intrusion. The device in the vehicle and the RSU communicates only when the signatures are verified. A comparative analysis has also been presented where it has been observed that the proposed algorithm performs better than simple RSA algorithm. The results obtained shows an improvement in Bandwidth by 16%, energy consumed is reduced by 14% and time reduced by 5%. The results indicate that the proposed method not only secures the privacy of the commuters but also uses lesser resources. It can be concluded that the proposed three tier secured structure is more robust than the existing models.

References
  1. Toor, Y., P. Muhlethaler, and A. Laouiti, ''Vehicle ad hoc networks: Applications and related technical issues''. Communications Surveys & Tutorials, 2008, IEEE. 10(3): pages 74 to 88.
  2. Jerbi, M., ''Vehicular Communications Networks: Current Trends and Challenges''. 2010, Global IGI: pages 251 to 262.
  3. Lo, N. W., & Tsai H. C., "Illusion attack on VANET applications-A message plausibility problem",. 2007, IEEE, Globecom Workshops.
  4. Safi, S.M., A. Movaghar, & M. Mohammadizadeh, "A novel approach for avoiding wormhole attacks in VANET", 2009, IEEE, AH-ICI.
  5. Hu, Y.-C., A. Perrig, & D.B. Johnson. "Packet leashes: a defense against wormhole attacks in wireless networks", 2003 INFOCOM 2003, IEEE, 22nd Conference on Computer and Communications.
  6. Park, S., "Defense against sybil attack in vehicular ad hoc network based on roadside unit support", 2009, IEEE, MILCOM.
  7. Grover, J., M.S. Gaur, & V. Laxmi, "A novel defense mechanism against sybil attacks in VANET", 2010, 3rd ACM.
  8. Grover, J., "A sybil attack detection approach using neighboring vehicles in VANET", 2011, 4th ACM.
  9. Gupta, S., Kar, S., & Dharmaraja S., "WHOP: Wormhole attack detection protocol using hound packet", 2011, IEEE, IIT.
  10. Sumra, I.A., "Classes of attacks in VANET", 2011, IEEE,Electronics, SIECPC.
  11. Misra, S., K. Bhattarai, & G. Xue. BAMBi: "Blackhole attacks mitigation with multiple base stations in wireless sensor networks", 2011 IEEE, ICC.
  12. Al-kahtani, M.S.,"Survey on security attacks in Vehicular Ad hoc Networks (VANET)",2012,6th, ICSPCS .
  13. He, L. & W.T. Zhu.,"Mitigating DoS attacks against signature-based authentication in VANETs", 2012, IEEE,Internation conference, CSAE.
  14. Gandhewar, N. & R. Patel. "Detection and Prevention of Sinkhole Attack on AODV Protocol in Mobile Adhoc Network", 2012, IEEE, 4th international conference, CICN.
  15. Verma, K., H. Hasbullah, & A. Kumar. "An efficient defense method against UDP spoofed flooding traffic DoS attacks in VANET". 2013, IEEE, 3rd IACC.
  16. RoselinMary, S., M. Maheshwari, & M. Thamaraiselvan. "Early detection of DOS attacks in VANET using Attacked Packet Detection Algorithm(APDA)". 2013, IEEE, ICICES.
  17. Thanmayee Karimireddy, Ahmad Ghulam & A Bakshi, "A hybrid security framework for the vehicular communications in VANET", 2016, IEEE, WiSPNET, 2016, 10.1109/WiSPNET.2016.7566479.
  18. Bariah L., Shehada D., Salaha E., “Recent advances in VANET security: a survey”, 2015, 10.1109/VTCFall.2015.739111
  19. L. M. Ibrahim, "Social networks: Privacy issues & precautions", 2015, 9th Int. Conf. Digit. Soc. (ICDS), pages 65 to 69.
  20. Jiri Fridrich. "Secure image ciphering based on chaos", 1997, AFRL, New York, USA.
  21. Yu R., "MixGroup: Accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks", 2016, IEEE,vol. 13, no. 1, pages 93 to 105.
  22. Shim K. A., "A survey of public-key cryptographic primitives in wireless sensor networks", 2016, IEEE, vol. 18, pages 577 to 601.
  23. Shikha Mathur, "Analysis & design of enhanced RSA algorithm to improve the security", 2017, ICCT 17029536
Index Terms

Computer Science
Information Sciences

Keywords

VANET RSU RSA MD5 Hill Cipher Signature verification