International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 121 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Information Technology | India | Volume 5 Issue 2, February 2016


Light-Weight Energy Efficient Encryption Scheme for Vehicular Ad Hoc Network

Pooja Mundhe | V. S. Khandekar


Abstract: Vehicular Ad Hoc Networks are a one form of wireless networks in which Road Side Units (RSU) and vehicles are the communicating nodes, providing each other with information such as traffic information and safety warning. They are self-distributed and organized. They can be useful in avoiding accidents and traffic congestion. Providing safety and comfort applications such as information about road block, fuel station, and traffic are main purposes of the VANET. VANETs are highly dynamic and energy constraint in nature, Due to this nature of VANET it is more challenging to achieve the security. Security and energy consumption are important issues in VANET. Previously data confidentiality can be achieved by AES algorithm in VANETs. But AES requires more energy for the process of encryption and decryption. This paper introduces A Light-Weight Energy Efficient Encryption Scheme for achieving security in energy efficient way. Transmission of data is not the only source of energy consumption there are many much like encryption and decryption. Light-Weight Energy Efficient Encryption scheme saves the energy in the process of encryption/decryption of data.


Keywords: Light-Weight Energy Efficient Encryption, Security, Vehicular Ad Hoc Network


Edition: Volume 5 Issue 2, February 2016,


Pages: 1560 - 1565


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Pooja Mundhe, V. S. Khandekar, "Light-Weight Energy Efficient Encryption Scheme for Vehicular Ad Hoc Network", International Journal of Science and Research (IJSR), Volume 5 Issue 2, February 2016, pp. 1560-1565, https://www.ijsr.net/get_abstract.php?paper_id=NOV161455

Similar Articles with Keyword 'Security'

Downloads: 0

Survey Paper, Information Technology, Iraq, Volume 10 Issue 7, July 2021

Pages: 1341 - 1348

Proposed Model to Identify the Influencing Students' Behavioral Intention to Use Mobile Learning: A Perspective from a Different Countries Case Study

Zainab Dalaf Katheeth | Bashar Dheyaa Noor | Ammar Dheyaa Noor [2]

Share this Article

Downloads: 0

Research Paper, Information Technology, India, Volume 11 Issue 7, July 2022

Pages: 133 - 137

Wearable Computers of Leading Edge Generation and their Mystifying Mechanic's

Smital Wagh | Gunjan Behl

Share this Article
Top