Navigation Query Security through Privacy Preservation and Cryptography in VANETs
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 107

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015

Navigation Query Security through Privacy Preservation and Cryptography in VANETs

Anuradha T, Saba Tahseen

Vehicular Ad hoc Network (VANET) is an autonomous network with dynamic topology where moving vehicles exchange information regarding their position with other vehicles. Depending on the position information of other nodes, nodes can determine their actions like change in route or change in speed and so on. Many navigation methods are provided in order to guide drivers to reach destination. Providing safety to the drivers is a crucial aspect of this paper. In this paper, VANET security is provided by making sure that the nodes are authenticated through a key exchange with server using intermediate road side units (RSU). Instead of sending the complete query at a time, navigation queries are protected by breaking them down into fragments. The identity of the sender is hidden by encrypting it with the symmetric key. The overhead into the communication framework is not added in the system, this can be shown through the simulation results and nodes can manage a good packet delivery ratio with low latency. The system also helps the nodes to maintain their speed by correctly adjusting speed relative to navigation queries.

Keywords: VANET, Public key Cryptography, AODV, Authentication, Security

Edition: Volume 4 Issue 6, June 2015

Pages: 1952 - 1957

Share this Article

How to Cite this Article?

Anuradha T, Saba Tahseen, "Navigation Query Security through Privacy Preservation and Cryptography in VANETs", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155803, Volume 4 Issue 6, June 2015, 1952 - 1957

Enter Your Email Address




Similar Articles with Keyword 'VANET'

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 104 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2010 - 2013

Analysis of Road Vehicle Density based VANET Routing Protocol in City Environments using QualNet

Amita Jaiswal, Arun Kumar Shukla

Share this Article

Downloads: 104

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1742 - 1745

A Novel Routing Based Path Planning Using RSU and OBU for Time Critical Information Sharing

Dr. Raafiya Gulmeher, Javeriya Shabnam

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1594 - 1600

Hybrid Solution for Hidden Terminal Problem on VANETS

Sukhjinder Singh, Amandeep Kaur Virk

Share this Article

Downloads: 106 | Monthly Hits: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2048 - 2051

An Analysis & Survey on Quality of Service Improvement in MANET, VANET and WSN

Amit Yogi, Jayesh Surana

Share this Article

Similar Articles with Keyword 'Public key Cryptography'

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1952 - 1957

Navigation Query Security through Privacy Preservation and Cryptography in VANETs

Anuradha T, Saba Tahseen

Share this Article

Downloads: 108

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1934 - 1936

Trapping Unauthorized Signals in Jammer

Meena Kudande, D. C. Mehetre

Share this Article

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2086 - 2089

Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography

Anagha P. Zele, Avinash P. Wadhe

Share this Article

Downloads: 112

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 10, October 2017

Pages: 1778 - 1781

A Novel Message Encryption Strategy using Random Numbers for Point-To-Point Message Transfer

Surya Ahuja, Nishit Angrish

Share this Article

Downloads: 116 | Weekly Hits: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1495 - 1500

Verifiable Attribute-Based Through Text and Image Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud

Nirupama Devangaon, Dr Suvarna Nandyal

Share this Article

Similar Articles with Keyword 'AODV'

Downloads: 79 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Downloads: 102

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 895 - 900

Secured Greedy Geographical Reliable Reactive Routing for WSN

Bhramitha B Shetty, Manimozhi Iyer

Share this Article

Downloads: 105

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Downloads: 106 | Weekly Hits: ⮙5

Comparative Studies, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1262 - 1265

Evaluation of MANET Routing Protocols using OMNeT++

Chand Jain, Jaswinder Singh

Share this Article

Downloads: 106 | Monthly Hits: ⮙10

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 969 - 973

AODV based Secure Algorithm for Detection and Prevention of Sink Hole Attack in WSN

Varpreet Kaur, Pratibha

Share this Article

Similar Articles with Keyword 'Authentication'

Downloads: 1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 99

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 1760 - 1762

A Survey on Existing Password Storage Methods and their Security

Samruddhi Patil, Kumud Wasnik

Share this Article

Downloads: 100

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

Downloads: 100 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Similar Articles with Keyword 'Security'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 866 - 868

Detecting and Blocking of Malicious URL

Muskan V. Jaiswal, Anjali B. Raut

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 863 - 865

Detection of Malicious URLs using Classification Algorithm

Muskan V. Jaiswal, Dr. Anjali B. Raut

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article



Top