Survey on VANET Protocols and Security Techniques
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015

Survey on VANET Protocols and Security Techniques

Ashok Shivaji Dadali, Prof. Ram Joshi

Recently, vehicular ad hoc network (VANET) becomes increasingly popular in many countries. It is an important element of the Intelligent Transportation Systems (ITS). In a typical VANET, each vehicle is assumed to have an on- board unit (OBU) and there are road-side units (RSU) installed along the roads. A trusted authority (TA), a server is installed in the back end. The OBUs and RSUs communicate using the Dedicated Short Range Communications (DSRC) protocol over the wireless channel while the RSUs, TA, and the application servers communicate using a secure fixed network (e.g., the Internet). The basic functionality of a VANET is to allow arbitrary vehicles to broadcast safety messages (e.g., vehicle speed, turning direction, traffic accident information) to other nearby vehicles (denoted as vehicle-vehicle or V2V communications) and to RSU (denoted as vehicle-infrastructure or V2I communications) regularly such that other vehicles may adjust their traveling routes and RSUs may inform the traffic control center to adjust traffic lights for avoiding possible traffic congestion. As such, a VANET can also be interpreted as a sensor network because the traffic control center or some other central servers can collect lots of useful information about road conditions from vehicles. It is natural to investigate how to utilize the collected real-time road conditions to provide useful applications. In this study, proposed application VANET- based secure and privacy-preserving navigation (VSPN), which makes use of the collected data to provide navigation service to users. Based on the destination and the current location of the driver (the query), the system can automatically search for a route that yields minimum traveling delay using the online information of the road condition. In addition of driving guidance, the navigation results can also be used for other purposes like sharing images and videos.

Keywords: Navigation, secure vehicular sensor network, signature verification, pseudo identity, anonymous credential, proxy re-encryption

Edition: Volume 4 Issue 6, June 2015

Pages: 1644 - 1648

Share this Article

How to Cite this Article?

Ashok Shivaji Dadali, Prof. Ram Joshi, "Survey on VANET Protocols and Security Techniques", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155599, Volume 4 Issue 6, June 2015, 1644 - 1648

68 PDF Views | 44 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Navigation'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1295 - 1299

Video Analysis to Detect and Track Road Ahead for Safety

Laxmi, Dr. Neelam Srivastava

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1644 - 1648

Survey on VANET Protocols and Security Techniques

Ashok Shivaji Dadali, Prof. Ram Joshi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2442 - 2447

A Smart Real Time Ridesharing and Travel Assistance

Aarthi R

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2795 - 2798

Guidance Providing Navigation in Target Tracking for Wireless Sensor Networks

Priti G. Kandhare, Gayatri M. Bhandari

Share this Article

Similar Articles with Keyword 'signature verification'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 143 - 146

Offline Signature Verification Using Contour Tracing

Madhuri, Alok

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1644 - 1648

Survey on VANET Protocols and Security Techniques

Ashok Shivaji Dadali, Prof. Ram Joshi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 517 - 521

Implementation of Digital Signature Verification Using Relative Slope Algorithm

P. N. Ganorkar, Kalyani Pendke, Hemant Turkar

Share this Article

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 7, July 2014

Pages: 2387 - 2389

Cryptanalysis of Identity Transmission Authentication System

Sattar J. Aboud

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 310 - 316

Performance Comparison of Devanagari and Gurmukhi Handwritten Numerals Recognition

Gita Sinha, Rakesh Kumar Roshan

Share this Article

Similar Articles with Keyword 'anonymous credential'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1644 - 1648

Survey on VANET Protocols and Security Techniques

Ashok Shivaji Dadali, Prof. Ram Joshi

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 997 - 1001

Secure and Privacy Preserving Navigation in VANET

Sudarshana A. Abbad, S. P. Godse

Share this Article

Similar Articles with Keyword 'proxy re-encryption'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3169 - 3172

A Survey on Secure Data Sharing and Collaboration Approaches in Cloud Computing

Prajakta Solapurkar, Girish Potdar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1644 - 1648

Survey on VANET Protocols and Security Techniques

Ashok Shivaji Dadali, Prof. Ram Joshi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2618 - 2620

A Unified Scheme of Hierarchical Attribute-Based Encryption

Syeda Husna Mehanoor, Syeda Ayesha Thainiath

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 700 - 702

A Secure Decentralized Erasure for Code-Based Cloud Storage System

Shaik Fathima Zahera

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 284 - 287

Survey Paper on Applying Privacy to Healthcare Data Using Cloud

Nikhita Nerkar, Vina M Lomte

Share this Article
Top