International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 114 | Views: 186

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015 | Rating: 6.4 / 10

Large-Scale Cost-Effective Secured Content Distribution in the Cities Using Vehicular Networks

Vinay M Naganur | Anand R [9]

Abstract: In this paper we have practical and cost-effective approach to construct a fully distributed roadside communication infrastructure to provide the secured content distribution to vehicles in the urban area. In this paper we deploy vehicle to infrastructure and vehicle to vehicle data transmission. The proposed infrastructure is composed of distributed lightweight low-cost devices called roadside buffers (RSBs), where each RSB has the limited buffer storage and is able to transmit wirelessly and vehicle buffers to transmit the information from one area to other. To enable the distributed RSBs working toward the global optimal performance (e. g. , minimal average file download delays), we propose a fully distributed algorithm to determine optimally the content replication strategy at RSBs and prioritize the contents such as high priority, average priority and low priority. Where accident messages have high priority are transmitted fast and low priority messages are transmitted later. We secure communication using Trusted Authority which verifies RSU authentication through ECC cryptographic function. The proposed infrastructure is designed to optimize the global network utility, which accounts for the integrated download experience of users and the download demands of files. Using extensive simulations, we validate the effectiveness of the proposed infrastructure and show that the proposed distributed protocol can approach to the optimal performance and secured communication.

Keywords: Vehicular ad-hoc networks, Road-side buffer, vehicular buffer, Cryptography, security

Edition: Volume 4 Issue 5, May 2015,

Pages: 2571 - 2577

How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link

Verification Code will appear in 2 Seconds ... Wait