Open Access Open Access  Restricted Access Subscription or Fee Access

Enhanced Context-Aware Network Coded Repetition with Privacy-Preserving Scheme and Traffic Congestion Avoidance in Vehicular Ad-Hoc Network

Dr. P. Boobalan, B. Nivetha, S. Saieswari Goliate, S. Sharmila

Abstract


In vehicular ad hoc networks, safety applications allow people to avoid dangerous situations based on the condition of the vehicles in their proximity. Such proximity awareness is realized by admitting each vehicle to collect safety messages called beacons, which are periodically and locally transmitted from its neighbouring vehicles. The reliability of beacon transmissions is a crucial factor that makes safety applications effective in practice. Due to the open medium of communication in vehicular ad hoc network it is vulnerable to many attacks. Therefore, we provide an efficient anonymous authentication scheme with low computational cost. In addition, we introduce congestion detection algorithms to detect areas of high traffic density with low speeds. Altogether we propose a new scheme called Enhanced Context-Aware Network Coded Repetition with Privacy-Preserving Scheme and Traffic Congestion Avoidance in Vehicular Ad-hoc Network to avoid malicious vehicles entering into the VANET and to avoid traffic congestion by suggesting optimal path to vehicles.


Keywords


Authentication, Beacon, Car Agent, Coded Packet, Privacy Preserving, Road Side Unit, Signal Agent, Security, Traffic Congestion Detection, Trusted Authority, Vehicular Ad Hoc Network.

Full Text:

pdf

References


Hyunwoo Kang1, Hongseok Yoo,Dongkyun Kim, And Yun-Su Chung1 Cancore : Context-Aware Network Coded Repetition For Vanets 10.1109/Access.2017.2681804.

Maria Azees, Pandi Vijayakumar, and Lazarus Jegatha Deboarh Eaap: Efficient Anonymous Authentication with Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks. Ieee Transactions On Intelligent Transportation Systems November 26, 2016.

Dhaval Khatri Professor Dushyantsingh Rathod Professor.Ashish A. Gajjar Dr.Samrat Khanna Traffic Congestion Detection And Avoidance In Vanet International Journal For Scientific Research & Development| Vol. 2, Issue 03, 2014.

Hsiang-Po Wang, Yi-Ta Chuang, Chih-Wei Yi, Yu-Chee Tseng And Pin-Chuan Liu Xor-Forwarding For Wireless .Global Telecommunication conference, 2009. Globe commmunication 2009. IEEE,Issues 04 March 2010.

bFernando Terroso-Sáenz, Mercedes Valdés-Vela, Cristina Sotomayor-Martínez, RafaelToledo-Moreo, And Antonio F. Gómez-Skarmeta A Cooperative Approach To Traffic Congestion Detection With Complex Event Processing And Vanet IEEE Transactions On Intelligent Transportation Systems, Vol. 13, No. 2, June 2016.

Ubaidullah Rajput, Fizza Abbas, Hasoo Eun, And Heekuck Oh A Hybrid Approach For Efficient Privacy-Preserving Authentication In Vanet IEEE Transactions July 17, 2017.

Debiao He, Sherali Zeadally, Baowen Xu And Xinyi Huang An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme For Vehicular Ad-Hoc Networks IEEE Transactions On Information Forensics And Security July 17,2015.

Juan (Susan) Pan, Iulian Sandu Popa, And Cristian Borcea Divert: A Distributed Vehicular Traffic Re-Routing System For Congestion Avoidance IEEE Transactions On Mobile Computing 1536-1233 (C) 2015 IEEE.

V. Kumar, S. Mishra, and N. Chand,``Applications of VANETs:Present & Future,'' Commun. Netw. Sci. Res., vol. 5, no. 1, pp. 12_15, 2013.

R. Lu, X. Lin, T. H. Luan, X. Liang, and X. Shen, “Anonymity analysis on social spot based pseudonym changing for location privacy in VANETs,” in Proc. IEEE ICC, Kyoto, Japan, Jun. 2011, pp. 1–5.

X. Lin, R. Lu, C. Zhang, H. Zhu, P. H. Ho, and X. Shen, “Security in vehicular ad hoc networks,” IEEE Commun. Mag., vol. 46, no. 4, pp. 88–95, Apr. 2008.

M. Azees, P. Vijayakumar, and L. J. Deborah, “Comprehensive surveyon security services in vehicular ad-hoc networks,” IET Intell. Trans. Syst., vol. 10, no. 6, pp. 379–388, 2016, doi: 10.1049/iet-its.2015.0072.

P. Vijayakumar, M. Azees, A. Kannan, and L. J. Deborah, “Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks,” IEEE Trans. Intell. Transp. Syst., vol. 17, no. 4, pp. 1015–1028, Apr. 2016.

X. Cheng, L. Yang, and X. Shen, “D2D for intelligent transportation systems: A feasibility study,” IEEE Trans. Intell. Trans. Syst., vol. 16, no. 4, pp. 1784–1793, Jan. 2015.

X. Cheng et al., “Electrified vehicles and the smart grid: The ITS perspective,” IEEE Trans. Intell. Transp. Syst., vol. 15, no. 4, pp. 1388–1404, Aug. 2014.

P. Vijayakumar, M. Azees, and L. J. Deborah, “CPAV: Computationally efficient privacy preserving anonymous authentication scheme for vehicular ad hoc networks,” in Proc. 2nd IEEE Int. Conf. Cyber Secur. Cloud Comput. (CSCloud), New York, NY, USA, Nov. 2015, pp. 62–67.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.