Downloads: 145 | Views: 281
Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 1, January 2017 | Popularity: 6.4 / 10
Secure Vehicular Traffic Re-routing System using SCMS in Connected Cars
Prasad Mhatre, Manjushri Mahajan
Abstract: The centralized system encounters two vital issues, the central server needs to perform genuine calculation and communication with the vehicles continuously, which can make such architecture infeasible for extensive zones with various vehicles, and driver security is not guaranteed since the drivers need to share their area furthermore the beginning stages and goal of their excursion with the server, which may keep the acknowledgment of such courses of action. To address these issues, a half and half vehicular rerouting structure is enlivened. The structure off-weights a tremendous part of the rerouting figuring at the vehicles, and therefore, the re-coordinating system gets the opportunity to be useful persistently. To settle on group rerouting decisions, the vehicles exchange messages over vehicular extraordinarily delegated frameworks. The system is hybrid since notwithstanding it uses a server to choose an exact overall point of view of the development more than 2G/3G affiliation. Likewise imperative is that the customer security is balanced with the rerouting ampleness. SCMS issues advanced endorsements to taking an interest vehicles for setting up trust among them, which is imperative for prosperity applications in perspective of vehicle-to vehicle correspondences. It underpins four principal use cases, to be particular, bootstrapping, endorsement provisioning, bad conduct reporting and renouncement. The principle outline goal is to give both security and insurance to the greatest degree sensible and possible. To fulfill the last specified, vehicles are issued pseudonym certificates, and the provisioning of those supports is partitioned among different affiliations. One of the essential challenges is to energize capable renouncement while giving insurance against attacks from insiders.
Keywords: Intelligent vehicles, VANET, SCMS, IOT, P2P Communication, Traffic Re-Routing
Edition: Volume 6 Issue 1, January 2017
Pages: 815 - 819
DOI: https://www.doi.org/10.21275/ART20164240
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 722
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 703
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 690
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera