International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015

Survey on VANET Protocols and Security Techniques

Ashok Shivaji Dadali, Prof. Ram Joshi

Recently, vehicular ad hoc network (VANET) becomes increasingly popular in many countries. It is an important element of the Intelligent Transportation Systems (ITS). In a typical VANET, each vehicle is assumed to have an on- board unit (OBU) and there are road-side units (RSU) installed along the roads. A trusted authority (TA), a server is installed in the back end. The OBUs and RSUs communicate using the Dedicated Short Range Communications (DSRC) protocol over the wireless channel while the RSUs, TA, and the application servers communicate using a secure fixed network (e.g., the Internet). The basic functionality of a VANET is to allow arbitrary vehicles to broadcast safety messages (e.g., vehicle speed, turning direction, traffic accident information) to other nearby vehicles (denoted as vehicle-vehicle or V2V communications) and to RSU (denoted as vehicle-infrastructure or V2I communications) regularly such that other vehicles may adjust their traveling routes and RSUs may inform the traffic control center to adjust traffic lights for avoiding possible traffic congestion. As such, a VANET can also be interpreted as a sensor network because the traffic control center or some other central servers can collect lots of useful information about road conditions from vehicles. It is natural to investigate how to utilize the collected real-time road conditions to provide useful applications. In this study, proposed application VANET- based secure and privacy-preserving navigation (VSPN), which makes use of the collected data to provide navigation service to users. Based on the destination and the current location of the driver (the query), the system can automatically search for a route that yields minimum traveling delay using the online information of the road condition. In addition of driving guidance, the navigation results can also be used for other purposes like sharing images and videos.

Keywords: Navigation, secure vehicular sensor network, signature verification, pseudo identity, anonymous credential, proxy re-encryption

Edition: Volume 4 Issue 6, June 2015

Pages: 1644 - 1648


How to Cite this Article?

Ashok Shivaji Dadali, Prof. Ram Joshi, "Survey on VANET Protocols and Security Techniques", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155599, Volume 4 Issue 6, June 2015, 1644 - 1648

36 PDF Views | 29 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Navigation'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1295 - 1299

Video Analysis to Detect and Track Road Ahead for Safety

Laxmi, Dr. Neelam Srivastava

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2442 - 2447

A Smart Real Time Ridesharing and Travel Assistance

Aarthi R

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 772 - 775

Knowledge Navigator for Intelligent Collaborative E-Tutoring: A Proposed Framework using Fuzzy Cognitive Agent

Neha Gulati

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1644 - 1648

Survey on VANET Protocols and Security Techniques

Ashok Shivaji Dadali, Prof. Ram Joshi

Share this article



Similar Articles with Keyword 'signature verification'

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 7, July 2014

Pages: 2387 - 2389

Cryptanalysis of Identity Transmission Authentication System

Sattar J. Aboud

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1644 - 1648

Survey on VANET Protocols and Security Techniques

Ashok Shivaji Dadali, Prof. Ram Joshi

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 143 - 146

Offline Signature Verification Using Contour Tracing

Madhuri, Alok

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 517 - 521

Implementation of Digital Signature Verification Using Relative Slope Algorithm

P. N. Ganorkar, Kalyani Pendke, Hemant Turkar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 196 - 200

Offline Signature Verification and Recognition using Neural Network

Ankit Arora, Aakanksha S. Choubey

Share this article



Similar Articles with Keyword 'anonymous credential'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1644 - 1648

Survey on VANET Protocols and Security Techniques

Ashok Shivaji Dadali, Prof. Ram Joshi

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 997 - 1001

Secure and Privacy Preserving Navigation in VANET

Sudarshana A. Abbad, S. P. Godse

Share this article



Similar Articles with Keyword 'proxy re-encryption'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3169 - 3172

A Survey on Secure Data Sharing and Collaboration Approaches in Cloud Computing

Prajakta Solapurkar, Girish Potdar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1644 - 1648

Survey on VANET Protocols and Security Techniques

Ashok Shivaji Dadali, Prof. Ram Joshi

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2618 - 2620

A Unified Scheme of Hierarchical Attribute-Based Encryption

Syeda Husna Mehanoor, Syeda Ayesha Thainiath

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 284 - 287

Survey Paper on Applying Privacy to Healthcare Data Using Cloud

Nikhita Nerkar, Vina M Lomte

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 700 - 702

A Secure Decentralized Erasure for Code-Based Cloud Storage System

Shaik Fathima Zahera

Share this article
Top