A Novel Mechanism for Secure and Efficient VANET Communication
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 3
Abstract
A Vehicular Ad hoc NETwork (VANET) is a type of mobile Peer-To-Peer wireless network that allows providing communication among nearby vehicles and between vehicles and nearby fixed roadside equipment. The lack of centralized infrastructure, high node mobility and increasing number of vehicles in VANETs result in several problems discussed in this paper, such as interrupting connections, difficult routing, security of communications and scalability. Existing system for VANET communication is proved to have several drawbacks. We have proposed a mechanism in order to provide secure and efficient communication in VANET environment. We overcome the drawbacks of the existing system by using Malicious Vehicular Analyzer algorithm and Elliptic Curve Cryptography (ECC). Using these algorithms, malicious messages are identified. It also detects the accident and other problems in the path of the vehicles. Elliptic Curve Cryptography (ECC) algorithm is used for stronger security during communication.
Authors and Affiliations
V. Vijayalakshmi , S. Saranya , M. Sathya , C. Selvaroopini
A Procedural Performance Comparison of Soft Thresholding Techniques for Medical Image Denoising
It is still a challenging problem for researchers to remove noise from medical image. To remove Noise from the images is not easy. Several algorithms are published and each approach has its advantages, and limitations. T...
A survey on Human Computer Interaction Mechanism Using Finger Tracking
Human Computer Interaction (HCI) is a field in which developer makes a user friendly system. User can interact with a computer system without using any conventional peripheral devices. Marker is used to recognize hand mo...
A Privacy Preserving of Composite Private/Public Key in Cloud Servers
Security is a term used to provide secrecy of data from the illegal entries. It is used to prevent a user that he/she should not have access to. It is a two step process. The security system in the first step identifies...
Requirement and Result of Verifying the Program Code
The verification of Java/C++ codes is critical, especially for special projects where human life will be at stake. A system is required that uses integrated reasoning to split each verification condition into a conjuncti...
Enhancing Rural Development in Tamilnadu through ICT: An Evaluation of Latest Technologies in the scheme MGNREGS
When e-governance indicates better governance, naturally, rural development becomes an essential part of it. It is so because developing countries like India depend on the villages and their welfare. Keeping this in mind...