INVENTION OF GAMMA PROTOCOL FOR VANET USING MODULAR ARITHMETIC TECHNIQUES

Main Article Content

Venkatamangarao Nampally
Dr. S. Ananthi
Dr. K. Padmanabhan
Dr. M. Raghavender Sharma
J Rama
Dr. K. R. balaji
Arun ananthanarayanan

Abstract

Vehicular Ad Hoc Networks (VANETs) are the promising approach to provide traffic, safety and other applications to the drivers as well as passengers. It becomes a key component of the intelligent transport system. Moreover, the security of vehicular ad hoc networks (VANETs) has been receiving a significant amount of attention in the field of wireless mobile networking because VANETs are vulnerable to malicious attacks. Proposed Gamma protocol not only adapts the concept of Transitive Trust Relationships but also improves the performance of the authentication procedure and it provides fast communication with good security than other existing systems. NS2 is open source and discrete event-driven, object-oriented and freely available simulation tool to simulate and analyze dynamic nature of communication networks; it is also a powerful tool to develop new protocols and functions. It provides support for OSI and TCP/IP protocols stack and many standard routing and application protocols for wire and wireless networks. NAM is used to display the process of simulation. We implement Gamma protocol in NS2 Simulator.

Downloads

Download data is not yet available.

Article Details

Section
Articles
Author Biographies

Venkatamangarao Nampally, Osmania University

Department of computer science

Dr. S. Ananthi, University of madras

Dept. of NS & IT

Dr. M. Raghavender Sharma, Osmania University

Dept. of Statistics

J Rama, University of Madras

Dept. of NS & IT

Dr. K. R. balaji, University of Madras

Dept. of NS & IT

Arun ananthanarayanan, University of Madras

Dept. of NS & IT

References

M. Raya and J. P. Hubaux, “Securing Vehicular ad hoc networks ,†J. Compute. Security, vol. 15, no. 1, pp. 39-68, 2007.

Yaseer Toor et al., “Vehicle Ad Hoc Networks:Applications and Related Technical Issuesâ€, IEEE Communictions Surveys & Tutorials, 3rd quarter 2008, vol. 10, no. 3, pp.74-78.

Maxim Raya et al., “The Security of Vehicular Ad Hoc Networks,†SASN’05, Nov 7 20005, Alaxandria, Verginia, USA, pp. 11-21.

Dedicated Short Range Communications (DSRC) [Online]. Available: http://grouper.ieee.org/groups/scc32/dsrc/index.html.

J. P. Hubaux, S. Capkun, and J.Leo, “The security and privacy of smart vehicles,†IEEE Security Privacy Mag., vol. 2, no. 3, pp. 49-55, May-Jun. 2004.

M. Nekovee and B. B. Bogason, “Reliable and efficient information dissemination in intermittently connected vehicular ad hoc networks,†in Proc. IEEE Vehicular Technol. Conf., Apr. 2007, pp. 2486-2490.

C. Zhang, X. Lin, R. Lu and P.-H. Ho, “RAISE: An effiient RSU—aided message authentication scheme in vehicular communication networks,†in Proc. IEEE Int. Conf. Commun., May 2008, pp. 1451-1457.

Jose Maria de Fuentes, Ana Isabel Gonzalez-Tables, and Arturo Ribagorda , “An Overview of Security issues in Vehicular Ad Hoc Networks,†Handbook of Research on Mobility and Computing, 2010.

Mousafa. H, Zhang. Y, “Vehicular Networks:Techniques, Standards, and Applications,†CRC Press, (2009).

Dahill, B. N. Levine, E. Royer and Clay Shields, “A Secure Routing protocol for Ad Hoc Networks,†Proceedings of IEEE ICNP 2002, pp. 78-87, Nov. 2002.

P. Papaadministrators and Z. J Haas, “Secure Data Transmission in Mobile Ad Hoc Networks,†ACM Workshop on Wireless Security, San Diago, CA, September 2003.

J. Zhao, Y. Zhang, and G. Cao, “Data pouring and buffering o the road: A new data dissemination paradigm in vehicular ad hoc networks,†IEEE Trans. Vehicular Technol. Vol. 56, no. 6, pp. 3266-3277, Nov. 2007.

Kevin Fall, Kannan Vardhan, “The ns manual,†The VINT project, December 2008.

Brent Welch, “Practical programming in TCL and Tk,†Prentice Hall, May 1994.

Vehicle Safety Communications Project, Final Report, DOT HS 810 591, April 2006.

www.roadtraffic-technology.com

G.Gowtham , E.Samlinson, â€A Secured Trust Creation in VANET Environment Using Random Password Generator,†International Conference on Computing, Electronics and Electrical Technologies [ICCEET]. PP:781-784, 2012.

www.researchgate.net

Shyr-Long Jeng, Wei-Hua Chieng, and Hsiang-Pin Lu, “Estimating Speed Using a Side-Looking Single-Radar Vehicle Detector,†IEEE transactions on intelligent transportation systems, volume 15, No. 2, (2014).

H. Zhu, R. Lu, X. Shen, and X. Lin, “Security in service-oriented vehicular networks,†IEEE Wireless Commun. Vol. 16, no. 4, pp. 16-22, Aug.2009.

http://www.isi.edu/nanam/ns/tutorial/index.html

http://www.nile.wpi.edu/ns

Menezes, S. Vnstone, and D. Hankerson, “Guide to elliptic curve cryptography,†Spinger Professional Computing (Springer, New York 2004)

Sirwan A Mohammad and Dr. Sattar, “Design of wireless network based on ns2,†Journal of Global Research in Computr Science, vol. 3, no. 12, pp. 1-8, (2012)