Skip to main content
Erschienen in: Wireless Personal Communications 1/2018

10.05.2018

Advanced Secured Routing Algorithm of Vehicular Ad-Hoc Network

Erschienen in: Wireless Personal Communications | Ausgabe 1/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Advances in wireless communication have opened up significant avenues wherein vehicles can themselves communicate with other vehicles and roadside infrastructure strategically placed at critical sections of the road. However, the large-scale acceptance of vehicular ad hoc network (VANET) is still facing challenges and issues that concern the network layer security aspects. There are a lot of attacks which can manipulate the routing in VANETs. Because a lot of efforts are put on finding efficient techniques for finding paths than considering security. In this research a secured AODV routing protocol is proposed to detect malicious nodes, prevent black hole attacks and provide secure data transmission in VANET. The proposed algorithm is based on asymmetric public key infrastructure using elliptic curve cryptographic (ECC) technique. ECC is used for key generation and certificate authority is used to authenticate the vehicle. Each vehicle uses a special data structure (heap) to store routing information. The main objective of this algorithm is to improve security and efficiency in VANET. Whereas road safety can be improved by providing secure and timely information on road traffic conditions, these traffic related messages must be authenticated. We have done the necessary modifications in code of AODV to suit the security requirements as per our proposed algorithm. The performance of proposed Enhanced Secure AODV (ES-AODV) algorithm is compared with different protocols such as AODV and B-AODV (AODV with Black Hole Attack) using NCTUns simulator. Extensive simulation scenarios are considered and final results show that proposed algorithm has 20% higher throughput in comparison to AODV protocol, which makes it more efficient in a sparse vehicular environment having vehicle to vehicle (V2V) and vehicle to infrastructure communication. Also, proposed algorithm has 10% lower packet drop and a lesser number of collisions which renders it more reliable for the V2V environment and also provides high packet delivery ratio. The proposed secured routing algorithm is fast, simple, reliable, and computationally less expensive and less storage cost. It can be implemented in intelligent transportation system for better security and efficiency which is very much required in VANET.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lv, X., & Li, H. (2013). Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks. Information Security, IET, 7, 157.CrossRef Lv, X., & Li, H. (2013). Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks. Information Security, IET, 7, 157.CrossRef
2.
Zurück zum Zitat Zeadally, S., Hunt, R., Chen, Y., Irwin, A., & Hassan, S. (2012). Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommunication Systems, 50(4), 217–241.CrossRef Zeadally, S., Hunt, R., Chen, Y., Irwin, A., & Hassan, S. (2012). Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommunication Systems, 50(4), 217–241.CrossRef
3.
Zurück zum Zitat Azogu, I. K. (2013) A new anti jamming strategy for vanet metrics-direct security defense. In IEEE International Conference on Vehicular Network Evolution (pp. 1344–1349). Azogu, I. K. (2013) A new anti jamming strategy for vanet metrics-direct security defense. In IEEE International Conference on Vehicular Network Evolution (pp. 1344–1349).
5.
Zurück zum Zitat Li, F., & Wang, Y. (2007). Routing in vehicular ad hoc networks: A survey. Vehicular Technology Magazine, IEEE, 2(2), 12–22.CrossRef Li, F., & Wang, Y. (2007). Routing in vehicular ad hoc networks: A survey. Vehicular Technology Magazine, IEEE, 2(2), 12–22.CrossRef
6.
Zurück zum Zitat Nishiyama, H., Ngo, T., Ansari, N., & Kato N. (2012). On minimizing the impact of mobility on topology control in mobile ad hoc networks. IEEE Transactions on Wireless Communications. Nishiyama, H., Ngo, T., Ansari, N., & Kato N. (2012). On minimizing the impact of mobility on topology control in mobile ad hoc networks. IEEE Transactions on Wireless Communications.
7.
Zurück zum Zitat Yi-Chun, Hu, & Perrig, Adrian. (2004). A survey of secure wireless ad hoc routing. IEEE Security and Privacy, 2(3), 28–39.CrossRef Yi-Chun, Hu, & Perrig, Adrian. (2004). A survey of secure wireless ad hoc routing. IEEE Security and Privacy, 2(3), 28–39.CrossRef
8.
Zurück zum Zitat Vijayakumar, P., Azores, M., Kannan, A., & Deborah, L. J. (2016). Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Transaction on Intelligent Transportation systems, 17(4), 1015–1028.CrossRef Vijayakumar, P., Azores, M., Kannan, A., & Deborah, L. J. (2016). Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Transaction on Intelligent Transportation systems, 17(4), 1015–1028.CrossRef
9.
Zurück zum Zitat Kimaya, S., et al. (2005). Authenticated routing for ad hoc networks. Journal on Selected Areas in Communications, 23(3), 598–610.CrossRef Kimaya, S., et al. (2005). Authenticated routing for ad hoc networks. Journal on Selected Areas in Communications, 23(3), 598–610.CrossRef
10.
Zurück zum Zitat Zapata, M.G., & Asokan, N. (2002). Securing ad hoc routing protocols. In Proceedings of the ACM workshop on Wireless security, Atlanta, USA (pp. 1–10). Zapata, M.G., & Asokan, N. (2002). Securing ad hoc routing protocols. In Proceedings of the ACM workshop on Wireless security, Atlanta, USA (pp. 1–10).
11.
Zurück zum Zitat Zhong, H., Wen, J., & Zhang, S. (2016). Efficient conditional privacy-preserving and authentication scheme for secure service provision in VANET. Tsinghua Science and Technology, 21(6), 620–629.CrossRef Zhong, H., Wen, J., & Zhang, S. (2016). Efficient conditional privacy-preserving and authentication scheme for secure service provision in VANET. Tsinghua Science and Technology, 21(6), 620–629.CrossRef
12.
Zurück zum Zitat Hamdy, Mohamed, & Ibrahim, Safi. (2015). A comparison of VANET authentication schemes: Public key vs. symmetric key. IEEE Communications Magazine, 40(10), 70–75. Hamdy, Mohamed, & Ibrahim, Safi. (2015). A comparison of VANET authentication schemes: Public key vs. symmetric key. IEEE Communications Magazine, 40(10), 70–75.
13.
Zurück zum Zitat Sunitha, N. R., MaheshKumar, K. M., Mardini, W., & BaniYasetn, M. (2016). Secure ad-hoc on-demand distance vector routing using identity based symmetric key management. Conference IEEE WiSPNET, 3(1), 1075–1081. Sunitha, N. R., MaheshKumar, K. M., Mardini, W., & BaniYasetn, M. (2016). Secure ad-hoc on-demand distance vector routing using identity based symmetric key management. Conference IEEE WiSPNET, 3(1), 1075–1081.
14.
Zurück zum Zitat Gupta, V., Stebila, D., Fung, S., Shantz, S. C., Gura, N., & Eberle, H. (2004). Speeding up secure web transactions using elliptic curve cryptography. In Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS 2004). The Internet Society (pp. 231–239). Gupta, V., Stebila, D., Fung, S., Shantz, S. C., Gura, N., & Eberle, H. (2004). Speeding up secure web transactions using elliptic curve cryptography. In Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS 2004). The Internet Society (pp. 231–239).
15.
Zurück zum Zitat Lipschutz, S. (2007). Theory and problems of discrete mathematics (3rd ed.). New York: McGraw-Hill. Lipschutz, S. (2007). Theory and problems of discrete mathematics (3rd ed.). New York: McGraw-Hill.
16.
Zurück zum Zitat Tyagi, P., & Dembla, D. (2015) Performance analysis and quality-of-service monitoring of protected and unprotected TCP networks using NCTUns simulator. In Proceedings of the IEEE CSNT 2015, April 4–6, 2015, Organized by- Machine Intelligence Research Labs, IEEE Madhya Pradesh Subsection, Gwalior. Tyagi, P., & Dembla, D. (2015) Performance analysis and quality-of-service monitoring of protected and unprotected TCP networks using NCTUns simulator. In Proceedings of the IEEE CSNT 2015, April 46, 2015, Organized by- Machine Intelligence Research Labs, IEEE Madhya Pradesh Subsection, Gwalior.
17.
Zurück zum Zitat Ezreik, A., & Gheryani, A. (2012). Design and simulation of wireless network using NS-2. ICCSIT-2012, Singapore, April 28–29. Ezreik, A., & Gheryani, A. (2012). Design and simulation of wireless network using NS-2. ICCSIT-2012, Singapore, April 28–29.
18.
Zurück zum Zitat Tyagi, P., Dembla, D. (2014). Investigating the security threats in vehicular Ad hoc networks (VANETs): Towards security engineering for safer on-road transportation. In Proceedings of IEEE ICACCI 2014, Sept 24–27. Tyagi, P., Dembla, D. (2014). Investigating the security threats in vehicular Ad hoc networks (VANETs): Towards security engineering for safer on-road transportation. In Proceedings of IEEE ICACCI 2014, Sept 24–27.
19.
Zurück zum Zitat Esmaili, H. A., Shoji, M. R. K., & Garage, H. (2011). Performance analysis of AODV under black hole attack through use of OPNET simulator. World of Computer Science and Information Technology Journal, 1(2), 493-52. Esmaili, H. A., Shoji, M. R. K., & Garage, H. (2011). Performance analysis of AODV under black hole attack through use of OPNET simulator. World of Computer Science and Information Technology Journal, 1(2), 493-52.
Metadaten
Titel
Advanced Secured Routing Algorithm of Vehicular Ad-Hoc Network
Publikationsdatum
10.05.2018
Erschienen in
Wireless Personal Communications / Ausgabe 1/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5824-0

Weitere Artikel der Ausgabe 1/2018

Wireless Personal Communications 1/2018 Zur Ausgabe

Neuer Inhalt