International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015

Navigation Query Security through Privacy Preservation and Cryptography in VANETs

Anuradha T, Saba Tahseen

Vehicular Ad hoc Network (VANET) is an autonomous network with dynamic topology where moving vehicles exchange information regarding their position with other vehicles. Depending on the position information of other nodes, nodes can determine their actions like change in route or change in speed and so on. Many navigation methods are provided in order to guide drivers to reach destination. Providing safety to the drivers is a crucial aspect of this paper. In this paper, VANET security is provided by making sure that the nodes are authenticated through a key exchange with server using intermediate road side units (RSU). Instead of sending the complete query at a time, navigation queries are protected by breaking them down into fragments. The identity of the sender is hidden by encrypting it with the symmetric key. The overhead into the communication framework is not added in the system, this can be shown through the simulation results and nodes can manage a good packet delivery ratio with low latency. The system also helps the nodes to maintain their speed by correctly adjusting speed relative to navigation queries.

Keywords: VANET, Public key Cryptography, AODV, Authentication, Security

Edition: Volume 4 Issue 6, June 2015

Pages: 1952 - 1957


How to Cite this Article?

Anuradha T, Saba Tahseen, "Navigation Query Security through Privacy Preservation and Cryptography in VANETs", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155803, Volume 4 Issue 6, June 2015, 1952 - 1957

28 PDF Views | 30 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'VANET'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 100 - 104

IDS System against Gray Hole Attack in VANET

Gurtej Kaur, Amandeep Kaur

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1905 - 1910

Detecting and Avoiding Sybil Attack in OLSR Protocol

Amit Kumar, Varun Singla

Share this article

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 591 - 593

Vehicular Ad-hoc Networks: Address Configuration and Routing Protocols

Shilpa Sharma, Harpreet Kaur

Share this article

Research Paper, Computer Science & Engineering, Bangladesh, Volume 8 Issue 2, February 2019

Pages: 966 - 971

Enhancement of Inter-Vehicular Communication through a New Bandwidth Optimization Technique to Optimize the Performance of VANETs

Md. Torikur Rahman

Share this article



Similar Articles with Keyword 'Public key Cryptography'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2214 - 2220

A Comprehensive Survey on: Quantum Cryptography

Pranav Verma, Ritika Lohiya

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2086 - 2089

Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography

Anagha P. Zele, Avinash P. Wadhe

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1934 - 1936

Trapping Unauthorized Signals in Jammer

Meena Kudande, D. C. Mehetre

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2213 - 2217

Public Key Cryptography based Secured Dynamic Routing in VANET Time Stamp based Key Management System

Shruti Bandak, Rekha Patil

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1952 - 1957

Navigation Query Security through Privacy Preservation and Cryptography in VANETs

Anuradha T, Saba Tahseen

Share this article



Similar Articles with Keyword 'AODV'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1823 - 1826

Impact and Performance Analysis of WORMHOLE Attack on AODV in MANET using NS2

Manju Ojha, Dr. Rajendra Singh Kushwah

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 149 - 153

Evading Flooding Attack in MANET Using Node Authentication

Anup A. Wanjari, Vidya Dhamdhere

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 597 - 602

Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks

Abhishek Kumar, Shweta Kumari

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1586 - 1593

Optimization of Geocast Routing in Vehicular Ad-Hoc Networks

Rajwinder Singh, Amandeep Kaur Virk

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANET's Routing Protocols

Sunita, Sunil Makkar

Share this article



Similar Articles with Keyword 'Authentication'

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013

Pages: 118 - 122

The Design of Web Based Secure Internet Voting System for Corporate Election

Jagdish B. Chakole, P. R. Pardhi

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 456 - 459

Improved Performance Approach for P2P Networks with Network Coding

Aparna Jumde, Shyamsundar Gupta

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 7, July 2014

Pages: 2387 - 2389

Cryptanalysis of Identity Transmission Authentication System

Sattar J. Aboud

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 149 - 153

Evading Flooding Attack in MANET Using Node Authentication

Anup A. Wanjari, Vidya Dhamdhere

Share this article



Similar Articles with Keyword 'Security'

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 2, February 2013

Pages: 171 - 174

Qualitative Analysis of Security Issues using Firewalls

Piyush Kashiyani, Karthik Chawda

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 266 - 270

Data Security through more robust DCT based methodology and Assessment in terms of PSNR

Ajit Singh, Swati Aggarwal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 293 - 296

A Novel Method of Data Encryption and Hiding Scheme Using VPASS Technique

Anand L S, Prajwal S Sanket, Sharath R V, Varun R

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 11, November 2013

Pages: 327 - 330

Automatic Attendance Management System Using Face Recognition

Jomon Joseph, K. P. Zacharia

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 967 - 972

Fault Tolerance in Mobile Computing using Multi Agent Environment for Electronic-Business Applications

Shiv Kumar, Shrawan Kumar

Share this article
Top