Downloads: 108 | Views: 260
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015 | Popularity: 7 / 10
Survey on VANET Protocols and Security Techniques
Ashok Shivaji Dadali, Prof. Ram Joshi
Abstract: Recently, vehicular ad hoc network (VANET) becomes increasingly popular in many countries. It is an important element of the Intelligent Transportation Systems (ITS). In a typical VANET, each vehicle is assumed to have an on- board unit (OBU) and there are road-side units (RSU) installed along the roads. A trusted authority (TA), a server is installed in the back end. The OBUs and RSUs communicate using the Dedicated Short Range Communications (DSRC) protocol over the wireless channel while the RSUs, TA, and the application servers communicate using a secure fixed network (e. g. , the Internet). The basic functionality of a VANET is to allow arbitrary vehicles to broadcast safety messages (e. g. , vehicle speed, turning direction, traffic accident information) to other nearby vehicles (denoted as vehicle-vehicle or V2V communications) and to RSU (denoted as vehicle-infrastructure or V2I communications) regularly such that other vehicles may adjust their traveling routes and RSUs may inform the traffic control center to adjust traffic lights for avoiding possible traffic congestion. As such, a VANET can also be interpreted as a sensor network because the traffic control center or some other central servers can collect lots of useful information about road conditions from vehicles. It is natural to investigate how to utilize the collected real-time road conditions to provide useful applications. In this study, proposed application VANET- based secure and privacy-preserving navigation (VSPN), which makes use of the collected data to provide navigation service to users. Based on the destination and the current location of the driver (the query), the system can automatically search for a route that yields minimum traveling delay using the online information of the road condition. In addition of driving guidance, the navigation results can also be used for other purposes like sharing images and videos.
Keywords: Navigation, secure vehicular sensor network, signature verification, pseudo identity, anonymous credential, proxy re-encryption
Edition: Volume 4 Issue 6, June 2015
Pages: 1644 - 1648
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 642 - 647Face Liveness to Identify Between Actual Face and Spoof Face
Lovely Pal, Renuka Singh
Downloads: 107
Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 7, July 2014
Pages: 2387 - 2389Cryptanalysis of Identity Transmission Authentication System
Sattar J. Aboud
Downloads: 112
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 143 - 146Offline Signature Verification Using Contour Tracing
Madhuri, Alok
Downloads: 114
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016
Pages: 997 - 1001Secure and Privacy Preserving Navigation in VANET
Sudarshana A. Abbad, S. P. Godse
Downloads: 119
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 517 - 521Implementation of Digital Signature Verification Using Relative Slope Algorithm
P. N. Ganorkar, Kalyani Pendke, Hemant Turkar