International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 117

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014


Public Key Cryptography based Secured Dynamic Routing in VANET Time Stamp based Key Management System

Shruti Bandak, Rekha Patil


Abstract: VANET is an autonomous dynamic topology network where moving vehicles exchange their position information with each other. The Selective Flooding (SF) protocol by using a brand new dynamic routing Probabilistic Broadcast (PB) ; Time Stamp based Key Management system (TSKMS) is proposed. It uses the key exchange protocol where multicast group header initiates a key for the group which is used to encrypt the packet such that group members can decrypt those keys. The Public Key Cryptographic method is proposed for secured transmission which is used for message authentication with Hash mechanism technique and Huffman tree. In Probabilistic Broadcast every node broadcasts packet with probability P which depends upon several parameters including bit rate; number of transmitting and receiving nodes; path loss etc. The work is simulated using Omnet++ 4.2. The simulation results are presented showing that the proposed TSKMS protocol improves the bit rate; accident duration to large extent. It also reduces the number of received packets on Onboard Unit (OBU).


Keywords: Probabilistic Broadcast, Public Key Cryptographic, Time Stamp Key Management System, VANET


Edition: Volume 3 Issue 6, June 2014,


Pages: 2213 - 2217


How to Cite this Article?

Shruti Bandak, Rekha Patil, "Public Key Cryptography based Secured Dynamic Routing in VANET Time Stamp based Key Management System", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=2014722, Volume 3 Issue 6, June 2014, 2213 - 2217

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Public Key Cryptographic'

Downloads: 122

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1074 - 1077

Location Aware Cluster Based Secured Anonymous Routing for Manet

Nandini S. Patil, Rekha Patil

Share this Article

Downloads: 136

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 146 - 148

A Review on Security Issues and Encryption Algorithms in Mobile Ad-hoc Network

Deepti Ranaut, Madal Lal

Share this Article

Similar Articles with Keyword 'VANET'

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2010 - 2013

Analysis of Road Vehicle Density based VANET Routing Protocol in City Environments using QualNet

Amita Jaiswal, Arun Kumar Shukla

Share this Article

Similar Articles with Keyword 'Probabilistic'

Downloads: 40

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Downloads: 80

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Similar Articles with Keyword 'Broadcast'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 98

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1910 - 1915

An Efficient Hash Count Indexing and Searching Scheme for Audio Fingerprinting

Simarjeet Singh Bhatia, Rupali Bhartiya

Share this Article

Similar Articles with Keyword 'Public'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, Russia, Volume 10 Issue 4, April 2021

Pages: 1115 - 1121

Conceptual Modeling of a Tramcar

Iftikhar B. Abbasov, Viacheslav V. Orekhov

Share this Article

Similar Articles with Keyword 'Key'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 886 - 889

Survey on Algorithms Predicting Performance of Keyword Queries

Snehal Borole

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'Cryptographic'

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Similar Articles with Keyword 'Time'

Downloads: 136 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Similar Articles with Keyword 'Stamp'

Downloads: 108

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2674 - 2680

Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack

Jagdish J. Rathod, Amit. M. Lathigara

Share this Article

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 2017 - 2020

Survey on Secured Multi Sink Data Aggregation Scheme in Mobile Sensing

Tejashree Borbande, Vikas Maral

Share this Article

Similar Articles with Keyword 'Management'

Downloads: 105 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 155

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Similar Articles with Keyword 'System'

Downloads: 174

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 156

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article
Top