Light-Weight Energy Efficient Encryption Scheme for Vehicular Ad Hoc Network
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 120

Research Paper | Information Technology | India | Volume 5 Issue 2, February 2016

Light-Weight Energy Efficient Encryption Scheme for Vehicular Ad Hoc Network

Pooja Mundhe, V. S. Khandekar

Vehicular Ad Hoc Networks are a one form of wireless networks in which Road Side Units (RSU) and vehicles are the communicating nodes, providing each other with information such as traffic information and safety warning. They are self-distributed and organized. They can be useful in avoiding accidents and traffic congestion. Providing safety and comfort applications such as information about road block, fuel station, and traffic are main purposes of the VANET. VANETs are highly dynamic and energy constraint in nature, Due to this nature of VANET it is more challenging to achieve the security. Security and energy consumption are important issues in VANET. Previously data confidentiality can be achieved by AES algorithm in VANETs. But AES requires more energy for the process of encryption and decryption. This paper introduces A Light-Weight Energy Efficient Encryption Scheme for achieving security in energy efficient way. Transmission of data is not the only source of energy consumption there are many much like encryption and decryption. Light-Weight Energy Efficient Encryption scheme saves the energy in the process of encryption/decryption of data.

Keywords: Light-Weight Energy Efficient Encryption, Security, Vehicular Ad Hoc Network

Edition: Volume 5 Issue 2, February 2016

Pages: 1560 - 1565

Share this Article

How to Cite this Article?

Pooja Mundhe, V. S. Khandekar, "Light-Weight Energy Efficient Encryption Scheme for Vehicular Ad Hoc Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV161455, Volume 5 Issue 2, February 2016, 1560 - 1565

Enter Your Email Address




Similar Articles with Keyword 'Security'

Downloads: 0

Survey Paper, Information Technology, Iraq, Volume 10 Issue 7, July 2021

Pages: 1341 - 1348

Proposed Model to Identify the Influencing Students' Behavioral Intention to Use Mobile Learning: A Perspective from a Different Countries Case Study

Zainab Dalaf Katheeth, Bashar Dheyaa Noor, Ammar Dheyaa Noor

Share this Article

Downloads: 1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Similar Articles with Keyword 'Energy'

Downloads: 105

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2849 - 2851

A Survey on Secure Mechanism for Wireless Sensor Networks

Tabbasum Sajjan Magdum, Y.B.Gurav

Share this Article

Downloads: 106

Research Paper, Information Technology, India, Volume 2 Issue 10, October 2013

Pages: 57 - 59

Differential Scanning Calorimetric Analysis of Phase Transition in LCD Materials

D. S. Kushwaha, Jyotsna Sinha

Share this Article

Similar Articles with Keyword 'Efficient'

Downloads: 136

Research Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 24 - 27

An Approach for Canny Edge Detection Algorithm on Face Recognition

A. D. Chitra, Dr. P. Ponmuthuramalingam

Share this Article

Downloads: 39

Research Paper, Information Technology, Nigeria, Volume 4 Issue 4, April 2015

Pages: 264 - 267

Nigerian Cashless Banking Policy: A Multi-Aspectual View of Trust Issues Affecting the Adoption of E-Commerce and Other Technology Tools

Abdul-Hamid A.Kaduna; Mu'azu A. A. Kaduna; Hayatu M. Kaduna

Share this Article

Similar Articles with Keyword 'Encryption'

Downloads: 101

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Downloads: 102

Research Paper, Information Technology, Nigeria, Volume 3 Issue 4, April 2014

Pages: 528 - 535

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J.

Share this Article



Top