SlideShare a Scribd company logo
1 of 6
Download to read offline
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 6, June 2013
www.ijarcet.org 1987
Abstract—To achieve efficient routing protocol for vehicular
ad hoc networks (VANETs) existing system employs intersection-
based Geographical Routing Protocol (IGRP) in city
environments. IGRP is based on an effective selection of road
intersections through which a packet must pass to reach the
gateway to the Internet. The selection is made in a way that
guarantees with high probability, network connectivity among
the road intersections while satisfying quality-of-service (QoS)
constraints on tolerable delay, bandwidth usage and error rate.
Geographical forwarding is used to transfer packets between any
two intersections on the path reducing the path’s sensitivity to
individual node movements. To achieve QoS routing problem as
a constrained optimization problem, the existing system uses
genetic algorithm to solve the optimization problem. To deal with
security and privacy issues in VANET the proposed scheme build
a secure environment for value-added services in VANETs using
An Anonymous Batch Authenticated and Key Agreement
Scheme for Value-Added Services in Vehicular Ad Hoc
Networks(ABAKA). ABAKA can efficiently authenticate
multiple requests by one verification operation and negotiate a
session key with each vehicle by one broadcast message. Elliptic
curve cryptography is adopted to reduce the verification delay
and transmission overhead. The security of ABAKA is based on
the elliptic curve discrete logarithm problem, which is an
unsolved NP complete problem. To deal with the invalid request
problem, which may cause the batch verification fail, a detection
algorithm has been proposed.
Index Terms— Message routing, Authentication, batch
verification, elliptic curve cryptographic.
I. INTRODUCTION
VEHICULAR ad hoc networks (VANETs) represent a
rapidly emerging and challenging class of mobile ad hoc
networks (MANETs). In such networks, each node operates
Manuscript received June, 2013.
Suvya P, PG Scholar, Computer Science and Engineering, Coimbatore
Institute of Engineering and Technology., . Narasipuram, Coimbatore, Tamil
Nadu, ,India,08547162187
Prabhu c, Asst Professor, Computer Science and Engineering, Coimbatore
Institute of Engineering and Technology, Narasipuram, Coimbatore, Tamil
Nadu,,India,
not only as a host but also as a router, forwarding packets
for other mobile nodes. Vehicles form a decentralized
communication network by means of wireless multihop
routing and forwarding protocols. Most existing research
considers vehicular ad hoc networks(VANETs) as a vehicle-
to-vehicle or a vehicle-to road-side-unit network architecture
that can be easily deployed without relying on expensive
network infrastructure. VANET-based applications can be
classified into two categories:1) Applications that are delay
sensitive ,e.g., downloading a multimedia application and
connecting to a virtual personal network (VPN) for video or
voice conferencing, and video streaming from the closest
Internet gateway; and 2) Applications that are delay tolerant,
e.g., sending simple text messages or an advertisement.
VANET is a special type of MANET, in which vehicles act
as nodes. Unlike MANET, vehicles move on predefined
roads, vehicles velocity depends on the speed signs and in
addition these vehicles also have to follow traffic signs and
traffic signals. There are many challenges in VANET that are
needed to be solved in order to provide reliable services.
Stable & reliable routing in VANET is one of the major
issues. Hence more research is needed to be conducted in
order to make VANET more applicable. As vehicles have
dynamic behavior, high speed and mobility that make routing
even more challenging.
VANETs are susceptible to intruders ranging from passive
eavesdropping to active spamming, tampering, and interfering
due to the absence of basic infrastructure and centralized
administration. Moreover, the main challenge facing vehicular
ad hoc networks is user privacy. Whenever vehicular nodes
attempt to access some services from roadside infrastructure
nodes, they want to maintain the necessary privacy without
being tracked down for whoever they are, wherever they are
and whatever they are doing. It is considered as one of the
important security requirements that should be paid more
attention for secure VANET schemes, especially in privacy-
vital environment.
According to the DSRC standard, avehicle sends a safety-
related message to its neighboring RSU every 100–300 ms,
which means that an RSU has to verify some 600 safety-
related message/s if there are roughly 180 vehicles kept within
the communication range of the RSU. In other words, the
security scheme for value-added applications should not pose
a heavy burden on RSUs. Therefore, the burden may gather at
a single authentication server, which incurs a bottleneck
problem. Obviously, it is critical to develop an efficient and
secure authentication scheme before value-added applications
Secured Intersection based Geographical
Routing Protocol for VANET
Suvya P, Prabhu C
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 6, June 2013
www.ijarcet.org 1988
can take effect.
To tackle the aforementioned problems, including security,
efficiency, and scalability problems, we proposed an
anonymous batch authentication and key agreement
(ABAKA) scheme with intersection based geographical
routing protocol to build a secure environment for value-
added services in VANETs.
II. RELATED WORK
Message routing protocols are classified into two
categories, i.e., topology and position based. Topology based
routing protocol use links information that exists in the
network to perform packet forwarding. Each node has
information about the entire network topology before the node
begins forwarding messages. In position-based routing
protocols, messages are routed based on knowledge of the
geographical location of the source, intermediate nodes, and
final destination. One advantage of geographical routing
protocols is that they can find a suboptimal route from source
to destination without the use of routing tables; therefore,
there is no need to flood the network and store routing
information at each node.
Recently, several related studies have been proposed,
addressing the security and privacy preservation issues for
safety related applications in VANETs [1].
To deal with the scalability issues, Lin et al. proposed a
time-efficient and secure vehicular communications (TSVC)
based on TESLA to address the scalability issue. In TSVC, a
vehicle first broadcasts a commitment of hash chain to its
neighbors. By the use of the elements of the hash chain, the
neighbors can authenticate this vehicle’s following
messages.Owing to the rapid verification of MAC, TSVC can
greatly alleviate the message LR. However, the weakness of
TSVC is not robust enough. The larger the dynamics of traffic
becomes, the more Loss Ratio TSVC has [4].
Analysis of traditional routing protocols for mobile ad hoc
networks (MANETs) demonstrated that their performance is
poor in VANETs. The main problem with these topology
based routing protocols (e.g., optimized link-state routing
(OLSR) , dynamic source routing, and ad-hoc on demand
distance vector routing (AODV) in VANET environments is
their route instability. Indeed, the traditional node-centric
view of the routes (i.e., an established route is a fixed
succession of nodes between the source and destination) leads
to frequent broken routes in the presence of VANETs’ high
mobility. Consequently, many packets are dropped, and the
overhead due to route repairs or failure notifications
significantly increases, leading to low delivery ratios and high
transmission delays.
Despite better path stability, geographical forwarding does
not perform well in a city environment. Its problem is that,
many times, it cannot find a next hop (i.e., a node closer to the
destination than the current node).
The recovery strategies proposed in the literature are often
based on planar graph traversals, which were shown not to be
as effective in VANETs due to radio obstacles and high node
mobility[3].
A number of road-based routing protocols [6] [7] have been
designed to address this issue. However, they fail to factor in
vehicular traffic flow by using the shortest road path between
source and destination.It is possible indeed that the road
segments on the shortest path are empty.
III. METHODOLOGY
GENETIC ALGORITHM
As in the selection of backbone route is formulated as an
optimization
problem with the objective function given as
max Pc(y) (1)
pc(y)= (y) (2)
D(y)= (3)
Hc(y)= (4)
BER(y)= (5)
where Pc(y) is the connectivity probability of route y, and Dth,
Hth, and BERth are thresholds on the tolerable end-to-end
delay, hop count, and BER, respectively.
Fig 1 shows the flowchart of the proposed GA, which includes
the following components: solution representation,
initialization, evaluation, selection, crossover, mutation, and
termination.
Fig 1. GA Flowchart.
Solution Representation and Initialization
In our approach, a natural encoding scheme would be to
define each intersection in the backbone route as a gene. The
backbone route consists of the identification number of each
selected intersection. Then, the ordered intersections in one
route can be represented as a chromosome. Therefore, each
feasible solution y consists of one chromosome, which is
denoted as v1, v2. . . vm. For example, routes 1-2-7-8-25, 1-
28-27-26-25, and 3-6-9-8-25 in Fig 2 are chromosomes. Thus,
an individual (or chromosome) is a vector containing the
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 6, June 2013
www.ijarcet.org 1989
ordered intersections. The initial population is generated by
randomly selecting feasible solutions. Each solution or
chromosome begins with the intersection adjacent to the MN.
The next gene is constructed from a randomly selected
intermediate intersection. Then, the process randomly chooses
the next intermediate intersection in the backbone route, and
the process stops when the next intersection corresponds to
that adjacent to the Internet gateway. It is important to ensure
that the solution is feasible, i.e., it satisfies the following two
conditions: 1) Each of the two consecutive intersections in the
route are connected by a backbone link. 2) The route satisfies
the QoS constraints.
Fig 2. Road map used in the simulation.
Fitness calculation
A value for fitness function f(y) is used to select the best
individuals. This is to maximize the connectivity probability
which is defined as follows:
f(y)=Pc(y) (6)
Selection
During the selection operation, the quality of the population
is improved by giving the high-quality solutions a better
chance to produce offspring’s which will be part of the next
generation.
(7)
Crossover
One possible crossover operator is the one point crossover
where two chromosomes are selected from the current
population and common intermediate gene is randomly
selected. That is the one point crossover operator finds an
intermediate intersection called point of crossover which is
common to two selected routes as shown in Fig 3 . Then it
swaps the second part of each selected route beyond the point
of crossover to form two new offspring’s.
Fig 3. One point crossover operator. (a) Two chromosomes
with 7 as crossover point. (b) Two new offspring’s.
Mutation
Mutation is an operator that causes random changes in the
genes inside one chromosome. Therefore mutation causes
diversion in the genes of the current population which
prevents the solution from being trapped in a local optimum.
Mutation is performed on the current population with rate µ.
In our implementation, we use a uniform mutation operator.
Thus, after choosing any individual from the population with
equal probabilities, we randomly pick an intermediate gene
(intersection) and then randomly choose the adjacent
intersection as in Fig 4. It is important to verify that the new
individual is a feasible solution.
Fig 4. Uniform mutation operator. (a) Chromosome with 1 as
a point of mutation. (b) New offspring
Termination
The termination criteria can be based on the total number of
generations between feasible solutions in one population.
ABAKA
To deal with security and privacy issues in VANET the
proposed scheme build a secure environment for value-added
services in VANETs using An Anonymous Batch
Authenticated and Key Agreement Scheme for Value-Added
Services in Vehicular Ad Hoc Networks(ABAKA). ABAKA
can efficiently authenticate multiple requests by one
verification operation and negotiate a session key with each
vehicle by one broadcast message. Elliptic curve cryptography
is adopted to reduce the verification delay and transmission
overhead. The security of ABAKA is based on the elliptic
curve discrete logarithm problem, which is an unsolved NP
complete problem. To deal with the invalid request problem,
which may cause the batch verification fail, a detection
algorithm has been proposed.
IV. PROPOSED WORK
In this project we provide a secured intersected based
geographical routing using An Anonymous Batch
Authenticated and Key Agreement Scheme for Value-Added
Services in Vehicular Ad Hoc Networks(ABAKA). Here each
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 6, June 2013
www.ijarcet.org 1990
mobile node request for the backbone route which information
can be retrieved from the neighbor MN or from the Gateway
as in Figure 5 Proposed work. Here the Gateway acts as a
location server where it is responsible for saving current
location information about all vehicles in its vicinity. This can
be addressed using proposed location service management
protocol called Region based Location-Service-Management
Protocol (RLSMP).Each vehicle reports its location
information to the gateway each time it moves one
transmission range farther from its previous location. This
information contains the node ID, transmission range Tr, X
and Y coordinates of the node location, time of the last
update, and the velocity and direction of the node’s
movement. Based on these location information, the Internet
gateway constructs a set of routes between itself and the MNs.
To increase their stability, IGRP builds routes based on
intermediate and adjacent road intersections toward the
gateway. These routes, which are called backbone routes, are
represented as sequences of intersections.IGRP runs an
intersection based routing protocol using GA to find the
optimal route. For securing the network the system uses
ABAKA scheme. With ABAKA, an SP can simultaneously
authenticate multiple requests and establish different session
keys with vehicles using Gateway. ABAKA considers not
only scalability and security issues but privacy preservation as
well. To deal with the invalid request problem, a detection
algorithm has been used.
Figure 5. Proposed work
V. ALGORITHM
IGRP Algorithm
In the network
if (a gateway) then
if there is a significant change in the node density
then
Recalculate the transmission range.
Recalculate the routes between the different
intersections and the gateway.
Send this data to the nodes in the network;
end if
end if
if (an MN) then
if has data to transmit then
Queries its neighbors about the optimal backbone
route before forwarding its messages.
if the required information is available then
A positive response will be sent back to the source
node including the optimal route.
else
The query will be relayed to the local gateway using
normal geographical routing.
Receive the required information from the gateway;
end if
end if
Save the updated route information;
Adjust the transmission range;
Use this route to forward the data packets to the
required destination;
end if
ECDSA - Elliptic Curve Digital Signature Algorithm
Signature Generation
For signing a message m by sender A, using A’s
private key dA
Step 1: Calculate e = HASH (m), where HASH is a
cryptographic hash function, such as
SHA-1
Step 2: Select a random integer k from [1,n − 1]
Step 3: Calculate r = x1 (mod n), where (x1, y1) = k * G. If r
= 0, go to step 2
Step 4: Calculate s = k − 1(e + dAr)(mod n). If s = 0, go to
step 2
Step 5: The signature is the pair (r, s)
Signature Verification
For B to authenticate A's signature, B must have A’s
public key QA
Step 1: Verify that r and s are integers in [1,n − 1]. If not, the
signature is invalid
Step 2: Calculate e = HASH (m), where HASH is the same
function used in the signature generation
Step 3: Calculate w = s −1 (mod n)
Step 4: Calculate u1 = ew (mod n) and u2 = rw (mod n)
Step 5: Calculate (x1, y1) = u1G + u2QA
Step 6: The signature is valid if x1 = r(mod n), invalid
otherwise
ECDH – Elliptic Curve Diffie Hellman
Let (dA, QA) be the private key - public key pair of
A and (dB, QB) be the private key public key pair of B.
Step 1: The end A computes K = (xK, yK) = dA * QB
Backbone constructionMobile Node
Message Routing
Using GA
Intersection-Based
Geographical Routing
Protocol (IGRP)
ABAKA Scheme
Gateway
Service Provider Destination
Region based Location Service
Management Protocol (RLSMP)
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 6, June 2013
www.ijarcet.org 1991
Step 2: The end B computes L = (xL, yL) = dB * QA
Step 3: Since dAQB = dAdBG = dBdAG = dBQA. Therefore
K = L and hence xK = xL
Step 4: Hence the shared secret is xK
Detection algorithm
Step 1: DetAlg(BR):
Step 2: begin
Step 3: if BatchV erify(BR) then
Step 4: return True;
Step 5: elseifNum(BR) == 1 then
Step 6: return IDi BR as an invalid request;
Step 7: else
Step 8: setBRFront = {Req1,Req2, . . . , Req_n/2_};
Step 9: setBRRear = {Req_n/2_+1,Req_n/2_+2, . . . , Reqn};
Step 10: DetAlg(BRFront);
Step 11: DetAlg(BRRear);
Step 12: end if
Step 13: end
VI. IMPLEMENTATION
The proposed method implemented using ns2. The
simulation results are fairly impressive.To implement SIGRP
For VANETS, we implemented first the location service
management protocol RLSMP [5]. In our experiments, we
consider different scenarios such as Number of request vs.
Rebatch Verification delay, No of compromised vehicle vs.
Expected verification delay, No of request vs. Transmission
overhead, Number of request vs. Verification delay.
Number of request vs. Rebatch Verification delay
In Figure 6 we verify the rebatch delay of the system
between based on the number of request for intersection-based
Geographical Routing Protocol (IGRP) in city environments
and Elliptic curve digital signature algorithm
(ECDSA).Compared to ECDSA ,proposed IGRP system have
less rebatch delay verification .When the number of request
is high , verification delay also high in existing system .
Fig 6. Number of request vs. Rebatch Verification delay
No of compromised vehicle vs. Expected verification delay
In Figure 7 we verify expected verification delay of
the system between based on the number of compromised
vehicle used for intersection-based Geographical Routing
Protocol (IGRP) in city environments and Elliptic curve
digital signature algorithm (ECDSA).Compared to ECDSA,
proposed IGRP system have less expected verification delay
(ms) .When the number of request is high, expected
verification delay also high in existing system.
Fig 7. No of compromised vehicle vs. Expected verification
delay
Number of request vs. Transmission overhead
In Figure 8 we measure the transmission overhead of
the system between based on the number of request used for
intersection-based Geographical Routing Protocol (IGRP) in
city environments and Elliptic curve digital signature
algorithm (ECDSA).Compared to ECDSA, proposed IGRP
system have less transmission overhead .When the number of
request is high, transmission overhead is also high in existing
system.
Fig 8. No of Request vs. Transmission Overhead
Number of request vs. Verification delay
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 6, June 2013
www.ijarcet.org 1992
In Figure 9 we verify the delay of the system
between based on the number of request for intersection-based
Geographical Routing Protocol (IGRP) in city environments
and Elliptic curve digital signature algorithm
(ECDSA).Compared to ECDSA ,proposed IGRP system have
less verification delay (ms) .When the number of request is
high , verification delay also high in existing system.
Fig 9. Number of Request vs. Verification Delay
VII. CONCLUSION
The approach for routing messages using IGRP improves
the performance of routing in VANETs. It satisfies QoS
constraints as a constrained optimization problem. IGRP
achieves better performance in such a way it selects routes
that are connected and at the same time, satisfies thresholds on
the end-to-end delay, hop count and BER. The proposed
trusted routing framework is developed using ABAKA
scheme. With ABAKA, an SP can simultaneously authenticate
multiple requests and establish different session keys with
vehicles. ABAKA considers not only scalability and security
issues but privacy preservation as well. To deal with the
invalid request problem, a detection algorithm has been used.
REFERENCES
[1] A. Perrig, R. Canetti, J. D. Tygar, and D. Song, “The TESLA broadcast
authentication protocol,” RSA Crypto., vol. 5, no. 2, pp. 2–13, 2002.
[2] B. Ducourthial, Y. Khaled, and M. Shawky, “Conditional
transmissions:Performance study of a new communication strategy in
VANET,” IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3348–3357,
Nov. 2007.
[3] J. Nzouonta, N. Rajgure, G. Wang, and C. Borcea, “VANET routing on
city roads using real-time vehicular traffic information,” IEEE Trans.
Veh.Technol., vol. 58, no. 7, pp. 3609–3626, Sep. 2009.
[4] X. Lin, X. Sun, X. Wang, C. Zhang, P.-H. Ho, and X. Shen, “TSVC:
efficient and secure vehicular communications with privacy
preserving,” IEEE Trans. Wireless Commun., vol. 7, no. 12, pp. 4987–
4998, Dec. 2008.
[5] H. Saleet, O. Basir, R. Langar, and R. Boutaba, “Region-based
locationservice-management protocol for VANETs,” IEEE Trans. Veh.
Technol.,vol. 59, no. 2, pp. 917–931, Feb. 2010.
[6] H. Su and X. Zhang, “Clustering-based multichannel MAC protocols
for QoS provisioning over vehicular ad hoc networks,” IEEE Trans.
Veh. Technol., vol. 56, no. 6, pp. 3309–3323, Nov. 2007.
[7] V. Naumov and T. Gross, “Connectivity-Aware Routing (CAR) in
vehicular adhoc networks,” in Proc. IEEE INFOCOM, 2007, pp. 1919–
1927.
Suvya P is currently pursuing M.E Computer Science and Engineering at
Coimbatore Institute of Engineering and Technology, Coimbatore, Tamil
Nadu, (Anna University, Chennai). She has about 6 years experience in
industry.Her research interests include wirelesss networking, Cryptography,
Data Structures.
Prabhu C is currently Asst Professor in the Department of Computer
Science, at Coimbatore Institute of Engineering and Technology, Coimbatore,
Tamil Nadu, (Anna University, Chennai). His research interests include wired
and wirelesss networking, Cryptography.

More Related Content

What's hot

Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...CSCJournals
 
Evaluation The Performance of MAODV and AODV Protocols In VANETs Models
Evaluation The Performance of MAODV and AODV Protocols In VANETs ModelsEvaluation The Performance of MAODV and AODV Protocols In VANETs Models
Evaluation The Performance of MAODV and AODV Protocols In VANETs ModelsCSCJournals
 
POSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETSPOSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETSIJCNCJournal
 
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSEFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSijwmn
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksMohammad Siraj
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
 
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...IOSR Journals
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444IJRAT
 
Improved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANETImproved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANETpaperpublications3
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...IRJET Journal
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS cscpconf
 
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...Rakesh Behera
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...IRJET Journal
 
A Novel De Routing Scheme for Vehicular Ad-Hoc Network
A Novel De Routing Scheme for Vehicular Ad-Hoc NetworkA Novel De Routing Scheme for Vehicular Ad-Hoc Network
A Novel De Routing Scheme for Vehicular Ad-Hoc NetworkIRJET Journal
 
IRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
IRJET - A Review on Congestion Control Methods in Mobile Adhoc NetworksIRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
IRJET - A Review on Congestion Control Methods in Mobile Adhoc NetworksIRJET Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 

What's hot (18)

Cm34531538
Cm34531538Cm34531538
Cm34531538
 
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...
 
Ij3415561561
Ij3415561561Ij3415561561
Ij3415561561
 
Evaluation The Performance of MAODV and AODV Protocols In VANETs Models
Evaluation The Performance of MAODV and AODV Protocols In VANETs ModelsEvaluation The Performance of MAODV and AODV Protocols In VANETs Models
Evaluation The Performance of MAODV and AODV Protocols In VANETs Models
 
POSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETSPOSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETS
 
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSEFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocol
 
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444
 
Improved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANETImproved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANET
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
 
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
 
A Novel De Routing Scheme for Vehicular Ad-Hoc Network
A Novel De Routing Scheme for Vehicular Ad-Hoc NetworkA Novel De Routing Scheme for Vehicular Ad-Hoc Network
A Novel De Routing Scheme for Vehicular Ad-Hoc Network
 
IRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
IRJET - A Review on Congestion Control Methods in Mobile Adhoc NetworksIRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
IRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 

Viewers also liked

Volume 2-issue-6-2061-2063
Volume 2-issue-6-2061-2063Volume 2-issue-6-2061-2063
Volume 2-issue-6-2061-2063Editor IJARCET
 
Ijarcet vol-2-issue-7-2363-2368
Ijarcet vol-2-issue-7-2363-2368Ijarcet vol-2-issue-7-2363-2368
Ijarcet vol-2-issue-7-2363-2368Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Ijarcet vol-2-issue-7-2333-2336
Ijarcet vol-2-issue-7-2333-2336Ijarcet vol-2-issue-7-2333-2336
Ijarcet vol-2-issue-7-2333-2336Editor IJARCET
 
Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084Editor IJARCET
 
Ijarcet vol-2-issue-7-2252-2257
Ijarcet vol-2-issue-7-2252-2257Ijarcet vol-2-issue-7-2252-2257
Ijarcet vol-2-issue-7-2252-2257Editor IJARCET
 
Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097Editor IJARCET
 

Viewers also liked (9)

Volume 2-issue-6-2061-2063
Volume 2-issue-6-2061-2063Volume 2-issue-6-2061-2063
Volume 2-issue-6-2061-2063
 
Ijarcet vol-2-issue-7-2363-2368
Ijarcet vol-2-issue-7-2363-2368Ijarcet vol-2-issue-7-2363-2368
Ijarcet vol-2-issue-7-2363-2368
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Ijarcet vol-2-issue-7-2333-2336
Ijarcet vol-2-issue-7-2333-2336Ijarcet vol-2-issue-7-2333-2336
Ijarcet vol-2-issue-7-2333-2336
 
1861 1865
1861 18651861 1865
1861 1865
 
Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084
 
Ijarcet vol-2-issue-7-2252-2257
Ijarcet vol-2-issue-7-2252-2257Ijarcet vol-2-issue-7-2252-2257
Ijarcet vol-2-issue-7-2252-2257
 
Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097
 
1904 1908
1904 19081904 1908
1904 1908
 

Similar to Volume 2-issue-6-1987-1992

A Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETsA Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETsIRJET Journal
 
Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANETEditor IJCATR
 
Performance evaluation of vanets
Performance evaluation of vanetsPerformance evaluation of vanets
Performance evaluation of vanetscsandit
 
Predictive Data Dissemination in Vanet
Predictive Data Dissemination in VanetPredictive Data Dissemination in Vanet
Predictive Data Dissemination in VanetDhruvMarothi
 
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksCross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksIJCNCJournal
 
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSCROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSIJCNCJournal
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...IOSR Journals
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSEditor IJMTER
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...IOSR Journals
 
Multicast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc NetworksMulticast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc NetworksIOSR Journals
 
Multicast routing protocol for advanced vehicular ad hoc networks
Multicast routing protocol for advanced vehicular ad hoc networksMulticast routing protocol for advanced vehicular ad hoc networks
Multicast routing protocol for advanced vehicular ad hoc networksTELKOMNIKA JOURNAL
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIJCNCJournal
 
Qualitative based comparison of routing protocols for vanet1212final
Qualitative based comparison of routing protocols for vanet1212finalQualitative based comparison of routing protocols for vanet1212final
Qualitative based comparison of routing protocols for vanet1212finalAlexander Decker
 
11.qualitative based comparison of routing protocols for vanet1212www.iiste.o...
11.qualitative based comparison of routing protocols for vanet1212www.iiste.o...11.qualitative based comparison of routing protocols for vanet1212www.iiste.o...
11.qualitative based comparison of routing protocols for vanet1212www.iiste.o...Alexander Decker
 
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSIJCNCJournal
 
Back-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETBack-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETijsrd.com
 
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...ijwmn
 

Similar to Volume 2-issue-6-1987-1992 (20)

A Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETsA Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETs
 
Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANET
 
Performance evaluation of vanets
Performance evaluation of vanetsPerformance evaluation of vanets
Performance evaluation of vanets
 
Predictive Data Dissemination in Vanet
Predictive Data Dissemination in VanetPredictive Data Dissemination in Vanet
Predictive Data Dissemination in Vanet
 
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksCross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
 
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSCROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
 
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
 
Multicast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc NetworksMulticast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc Networks
 
Multicast routing protocol for advanced vehicular ad hoc networks
Multicast routing protocol for advanced vehicular ad hoc networksMulticast routing protocol for advanced vehicular ad hoc networks
Multicast routing protocol for advanced vehicular ad hoc networks
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
 
Qualitative based comparison of routing protocols for vanet1212final
Qualitative based comparison of routing protocols for vanet1212finalQualitative based comparison of routing protocols for vanet1212final
Qualitative based comparison of routing protocols for vanet1212final
 
11.qualitative based comparison of routing protocols for vanet1212www.iiste.o...
11.qualitative based comparison of routing protocols for vanet1212www.iiste.o...11.qualitative based comparison of routing protocols for vanet1212www.iiste.o...
11.qualitative based comparison of routing protocols for vanet1212www.iiste.o...
 
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
 
Back-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETBack-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANET
 
VANET Clustering
VANET ClusteringVANET Clustering
VANET Clustering
 
VANET
VANETVANET
VANET
 
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
 

More from Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Editor IJARCET
 

More from Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Volume 2-issue-6-1987-1992

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 6, June 2013 www.ijarcet.org 1987 Abstract—To achieve efficient routing protocol for vehicular ad hoc networks (VANETs) existing system employs intersection- based Geographical Routing Protocol (IGRP) in city environments. IGRP is based on an effective selection of road intersections through which a packet must pass to reach the gateway to the Internet. The selection is made in a way that guarantees with high probability, network connectivity among the road intersections while satisfying quality-of-service (QoS) constraints on tolerable delay, bandwidth usage and error rate. Geographical forwarding is used to transfer packets between any two intersections on the path reducing the path’s sensitivity to individual node movements. To achieve QoS routing problem as a constrained optimization problem, the existing system uses genetic algorithm to solve the optimization problem. To deal with security and privacy issues in VANET the proposed scheme build a secure environment for value-added services in VANETs using An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks(ABAKA). ABAKA can efficiently authenticate multiple requests by one verification operation and negotiate a session key with each vehicle by one broadcast message. Elliptic curve cryptography is adopted to reduce the verification delay and transmission overhead. The security of ABAKA is based on the elliptic curve discrete logarithm problem, which is an unsolved NP complete problem. To deal with the invalid request problem, which may cause the batch verification fail, a detection algorithm has been proposed. Index Terms— Message routing, Authentication, batch verification, elliptic curve cryptographic. I. INTRODUCTION VEHICULAR ad hoc networks (VANETs) represent a rapidly emerging and challenging class of mobile ad hoc networks (MANETs). In such networks, each node operates Manuscript received June, 2013. Suvya P, PG Scholar, Computer Science and Engineering, Coimbatore Institute of Engineering and Technology., . Narasipuram, Coimbatore, Tamil Nadu, ,India,08547162187 Prabhu c, Asst Professor, Computer Science and Engineering, Coimbatore Institute of Engineering and Technology, Narasipuram, Coimbatore, Tamil Nadu,,India, not only as a host but also as a router, forwarding packets for other mobile nodes. Vehicles form a decentralized communication network by means of wireless multihop routing and forwarding protocols. Most existing research considers vehicular ad hoc networks(VANETs) as a vehicle- to-vehicle or a vehicle-to road-side-unit network architecture that can be easily deployed without relying on expensive network infrastructure. VANET-based applications can be classified into two categories:1) Applications that are delay sensitive ,e.g., downloading a multimedia application and connecting to a virtual personal network (VPN) for video or voice conferencing, and video streaming from the closest Internet gateway; and 2) Applications that are delay tolerant, e.g., sending simple text messages or an advertisement. VANET is a special type of MANET, in which vehicles act as nodes. Unlike MANET, vehicles move on predefined roads, vehicles velocity depends on the speed signs and in addition these vehicles also have to follow traffic signs and traffic signals. There are many challenges in VANET that are needed to be solved in order to provide reliable services. Stable & reliable routing in VANET is one of the major issues. Hence more research is needed to be conducted in order to make VANET more applicable. As vehicles have dynamic behavior, high speed and mobility that make routing even more challenging. VANETs are susceptible to intruders ranging from passive eavesdropping to active spamming, tampering, and interfering due to the absence of basic infrastructure and centralized administration. Moreover, the main challenge facing vehicular ad hoc networks is user privacy. Whenever vehicular nodes attempt to access some services from roadside infrastructure nodes, they want to maintain the necessary privacy without being tracked down for whoever they are, wherever they are and whatever they are doing. It is considered as one of the important security requirements that should be paid more attention for secure VANET schemes, especially in privacy- vital environment. According to the DSRC standard, avehicle sends a safety- related message to its neighboring RSU every 100–300 ms, which means that an RSU has to verify some 600 safety- related message/s if there are roughly 180 vehicles kept within the communication range of the RSU. In other words, the security scheme for value-added applications should not pose a heavy burden on RSUs. Therefore, the burden may gather at a single authentication server, which incurs a bottleneck problem. Obviously, it is critical to develop an efficient and secure authentication scheme before value-added applications Secured Intersection based Geographical Routing Protocol for VANET Suvya P, Prabhu C
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 6, June 2013 www.ijarcet.org 1988 can take effect. To tackle the aforementioned problems, including security, efficiency, and scalability problems, we proposed an anonymous batch authentication and key agreement (ABAKA) scheme with intersection based geographical routing protocol to build a secure environment for value- added services in VANETs. II. RELATED WORK Message routing protocols are classified into two categories, i.e., topology and position based. Topology based routing protocol use links information that exists in the network to perform packet forwarding. Each node has information about the entire network topology before the node begins forwarding messages. In position-based routing protocols, messages are routed based on knowledge of the geographical location of the source, intermediate nodes, and final destination. One advantage of geographical routing protocols is that they can find a suboptimal route from source to destination without the use of routing tables; therefore, there is no need to flood the network and store routing information at each node. Recently, several related studies have been proposed, addressing the security and privacy preservation issues for safety related applications in VANETs [1]. To deal with the scalability issues, Lin et al. proposed a time-efficient and secure vehicular communications (TSVC) based on TESLA to address the scalability issue. In TSVC, a vehicle first broadcasts a commitment of hash chain to its neighbors. By the use of the elements of the hash chain, the neighbors can authenticate this vehicle’s following messages.Owing to the rapid verification of MAC, TSVC can greatly alleviate the message LR. However, the weakness of TSVC is not robust enough. The larger the dynamics of traffic becomes, the more Loss Ratio TSVC has [4]. Analysis of traditional routing protocols for mobile ad hoc networks (MANETs) demonstrated that their performance is poor in VANETs. The main problem with these topology based routing protocols (e.g., optimized link-state routing (OLSR) , dynamic source routing, and ad-hoc on demand distance vector routing (AODV) in VANET environments is their route instability. Indeed, the traditional node-centric view of the routes (i.e., an established route is a fixed succession of nodes between the source and destination) leads to frequent broken routes in the presence of VANETs’ high mobility. Consequently, many packets are dropped, and the overhead due to route repairs or failure notifications significantly increases, leading to low delivery ratios and high transmission delays. Despite better path stability, geographical forwarding does not perform well in a city environment. Its problem is that, many times, it cannot find a next hop (i.e., a node closer to the destination than the current node). The recovery strategies proposed in the literature are often based on planar graph traversals, which were shown not to be as effective in VANETs due to radio obstacles and high node mobility[3]. A number of road-based routing protocols [6] [7] have been designed to address this issue. However, they fail to factor in vehicular traffic flow by using the shortest road path between source and destination.It is possible indeed that the road segments on the shortest path are empty. III. METHODOLOGY GENETIC ALGORITHM As in the selection of backbone route is formulated as an optimization problem with the objective function given as max Pc(y) (1) pc(y)= (y) (2) D(y)= (3) Hc(y)= (4) BER(y)= (5) where Pc(y) is the connectivity probability of route y, and Dth, Hth, and BERth are thresholds on the tolerable end-to-end delay, hop count, and BER, respectively. Fig 1 shows the flowchart of the proposed GA, which includes the following components: solution representation, initialization, evaluation, selection, crossover, mutation, and termination. Fig 1. GA Flowchart. Solution Representation and Initialization In our approach, a natural encoding scheme would be to define each intersection in the backbone route as a gene. The backbone route consists of the identification number of each selected intersection. Then, the ordered intersections in one route can be represented as a chromosome. Therefore, each feasible solution y consists of one chromosome, which is denoted as v1, v2. . . vm. For example, routes 1-2-7-8-25, 1- 28-27-26-25, and 3-6-9-8-25 in Fig 2 are chromosomes. Thus, an individual (or chromosome) is a vector containing the
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 6, June 2013 www.ijarcet.org 1989 ordered intersections. The initial population is generated by randomly selecting feasible solutions. Each solution or chromosome begins with the intersection adjacent to the MN. The next gene is constructed from a randomly selected intermediate intersection. Then, the process randomly chooses the next intermediate intersection in the backbone route, and the process stops when the next intersection corresponds to that adjacent to the Internet gateway. It is important to ensure that the solution is feasible, i.e., it satisfies the following two conditions: 1) Each of the two consecutive intersections in the route are connected by a backbone link. 2) The route satisfies the QoS constraints. Fig 2. Road map used in the simulation. Fitness calculation A value for fitness function f(y) is used to select the best individuals. This is to maximize the connectivity probability which is defined as follows: f(y)=Pc(y) (6) Selection During the selection operation, the quality of the population is improved by giving the high-quality solutions a better chance to produce offspring’s which will be part of the next generation. (7) Crossover One possible crossover operator is the one point crossover where two chromosomes are selected from the current population and common intermediate gene is randomly selected. That is the one point crossover operator finds an intermediate intersection called point of crossover which is common to two selected routes as shown in Fig 3 . Then it swaps the second part of each selected route beyond the point of crossover to form two new offspring’s. Fig 3. One point crossover operator. (a) Two chromosomes with 7 as crossover point. (b) Two new offspring’s. Mutation Mutation is an operator that causes random changes in the genes inside one chromosome. Therefore mutation causes diversion in the genes of the current population which prevents the solution from being trapped in a local optimum. Mutation is performed on the current population with rate µ. In our implementation, we use a uniform mutation operator. Thus, after choosing any individual from the population with equal probabilities, we randomly pick an intermediate gene (intersection) and then randomly choose the adjacent intersection as in Fig 4. It is important to verify that the new individual is a feasible solution. Fig 4. Uniform mutation operator. (a) Chromosome with 1 as a point of mutation. (b) New offspring Termination The termination criteria can be based on the total number of generations between feasible solutions in one population. ABAKA To deal with security and privacy issues in VANET the proposed scheme build a secure environment for value-added services in VANETs using An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks(ABAKA). ABAKA can efficiently authenticate multiple requests by one verification operation and negotiate a session key with each vehicle by one broadcast message. Elliptic curve cryptography is adopted to reduce the verification delay and transmission overhead. The security of ABAKA is based on the elliptic curve discrete logarithm problem, which is an unsolved NP complete problem. To deal with the invalid request problem, which may cause the batch verification fail, a detection algorithm has been proposed. IV. PROPOSED WORK In this project we provide a secured intersected based geographical routing using An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks(ABAKA). Here each
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 6, June 2013 www.ijarcet.org 1990 mobile node request for the backbone route which information can be retrieved from the neighbor MN or from the Gateway as in Figure 5 Proposed work. Here the Gateway acts as a location server where it is responsible for saving current location information about all vehicles in its vicinity. This can be addressed using proposed location service management protocol called Region based Location-Service-Management Protocol (RLSMP).Each vehicle reports its location information to the gateway each time it moves one transmission range farther from its previous location. This information contains the node ID, transmission range Tr, X and Y coordinates of the node location, time of the last update, and the velocity and direction of the node’s movement. Based on these location information, the Internet gateway constructs a set of routes between itself and the MNs. To increase their stability, IGRP builds routes based on intermediate and adjacent road intersections toward the gateway. These routes, which are called backbone routes, are represented as sequences of intersections.IGRP runs an intersection based routing protocol using GA to find the optimal route. For securing the network the system uses ABAKA scheme. With ABAKA, an SP can simultaneously authenticate multiple requests and establish different session keys with vehicles using Gateway. ABAKA considers not only scalability and security issues but privacy preservation as well. To deal with the invalid request problem, a detection algorithm has been used. Figure 5. Proposed work V. ALGORITHM IGRP Algorithm In the network if (a gateway) then if there is a significant change in the node density then Recalculate the transmission range. Recalculate the routes between the different intersections and the gateway. Send this data to the nodes in the network; end if end if if (an MN) then if has data to transmit then Queries its neighbors about the optimal backbone route before forwarding its messages. if the required information is available then A positive response will be sent back to the source node including the optimal route. else The query will be relayed to the local gateway using normal geographical routing. Receive the required information from the gateway; end if end if Save the updated route information; Adjust the transmission range; Use this route to forward the data packets to the required destination; end if ECDSA - Elliptic Curve Digital Signature Algorithm Signature Generation For signing a message m by sender A, using A’s private key dA Step 1: Calculate e = HASH (m), where HASH is a cryptographic hash function, such as SHA-1 Step 2: Select a random integer k from [1,n − 1] Step 3: Calculate r = x1 (mod n), where (x1, y1) = k * G. If r = 0, go to step 2 Step 4: Calculate s = k − 1(e + dAr)(mod n). If s = 0, go to step 2 Step 5: The signature is the pair (r, s) Signature Verification For B to authenticate A's signature, B must have A’s public key QA Step 1: Verify that r and s are integers in [1,n − 1]. If not, the signature is invalid Step 2: Calculate e = HASH (m), where HASH is the same function used in the signature generation Step 3: Calculate w = s −1 (mod n) Step 4: Calculate u1 = ew (mod n) and u2 = rw (mod n) Step 5: Calculate (x1, y1) = u1G + u2QA Step 6: The signature is valid if x1 = r(mod n), invalid otherwise ECDH – Elliptic Curve Diffie Hellman Let (dA, QA) be the private key - public key pair of A and (dB, QB) be the private key public key pair of B. Step 1: The end A computes K = (xK, yK) = dA * QB Backbone constructionMobile Node Message Routing Using GA Intersection-Based Geographical Routing Protocol (IGRP) ABAKA Scheme Gateway Service Provider Destination Region based Location Service Management Protocol (RLSMP)
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 6, June 2013 www.ijarcet.org 1991 Step 2: The end B computes L = (xL, yL) = dB * QA Step 3: Since dAQB = dAdBG = dBdAG = dBQA. Therefore K = L and hence xK = xL Step 4: Hence the shared secret is xK Detection algorithm Step 1: DetAlg(BR): Step 2: begin Step 3: if BatchV erify(BR) then Step 4: return True; Step 5: elseifNum(BR) == 1 then Step 6: return IDi BR as an invalid request; Step 7: else Step 8: setBRFront = {Req1,Req2, . . . , Req_n/2_}; Step 9: setBRRear = {Req_n/2_+1,Req_n/2_+2, . . . , Reqn}; Step 10: DetAlg(BRFront); Step 11: DetAlg(BRRear); Step 12: end if Step 13: end VI. IMPLEMENTATION The proposed method implemented using ns2. The simulation results are fairly impressive.To implement SIGRP For VANETS, we implemented first the location service management protocol RLSMP [5]. In our experiments, we consider different scenarios such as Number of request vs. Rebatch Verification delay, No of compromised vehicle vs. Expected verification delay, No of request vs. Transmission overhead, Number of request vs. Verification delay. Number of request vs. Rebatch Verification delay In Figure 6 we verify the rebatch delay of the system between based on the number of request for intersection-based Geographical Routing Protocol (IGRP) in city environments and Elliptic curve digital signature algorithm (ECDSA).Compared to ECDSA ,proposed IGRP system have less rebatch delay verification .When the number of request is high , verification delay also high in existing system . Fig 6. Number of request vs. Rebatch Verification delay No of compromised vehicle vs. Expected verification delay In Figure 7 we verify expected verification delay of the system between based on the number of compromised vehicle used for intersection-based Geographical Routing Protocol (IGRP) in city environments and Elliptic curve digital signature algorithm (ECDSA).Compared to ECDSA, proposed IGRP system have less expected verification delay (ms) .When the number of request is high, expected verification delay also high in existing system. Fig 7. No of compromised vehicle vs. Expected verification delay Number of request vs. Transmission overhead In Figure 8 we measure the transmission overhead of the system between based on the number of request used for intersection-based Geographical Routing Protocol (IGRP) in city environments and Elliptic curve digital signature algorithm (ECDSA).Compared to ECDSA, proposed IGRP system have less transmission overhead .When the number of request is high, transmission overhead is also high in existing system. Fig 8. No of Request vs. Transmission Overhead Number of request vs. Verification delay
  • 6. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 6, June 2013 www.ijarcet.org 1992 In Figure 9 we verify the delay of the system between based on the number of request for intersection-based Geographical Routing Protocol (IGRP) in city environments and Elliptic curve digital signature algorithm (ECDSA).Compared to ECDSA ,proposed IGRP system have less verification delay (ms) .When the number of request is high , verification delay also high in existing system. Fig 9. Number of Request vs. Verification Delay VII. CONCLUSION The approach for routing messages using IGRP improves the performance of routing in VANETs. It satisfies QoS constraints as a constrained optimization problem. IGRP achieves better performance in such a way it selects routes that are connected and at the same time, satisfies thresholds on the end-to-end delay, hop count and BER. The proposed trusted routing framework is developed using ABAKA scheme. With ABAKA, an SP can simultaneously authenticate multiple requests and establish different session keys with vehicles. ABAKA considers not only scalability and security issues but privacy preservation as well. To deal with the invalid request problem, a detection algorithm has been used. REFERENCES [1] A. Perrig, R. Canetti, J. D. Tygar, and D. Song, “The TESLA broadcast authentication protocol,” RSA Crypto., vol. 5, no. 2, pp. 2–13, 2002. [2] B. Ducourthial, Y. Khaled, and M. Shawky, “Conditional transmissions:Performance study of a new communication strategy in VANET,” IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3348–3357, Nov. 2007. [3] J. Nzouonta, N. Rajgure, G. Wang, and C. Borcea, “VANET routing on city roads using real-time vehicular traffic information,” IEEE Trans. Veh.Technol., vol. 58, no. 7, pp. 3609–3626, Sep. 2009. [4] X. Lin, X. Sun, X. Wang, C. Zhang, P.-H. Ho, and X. Shen, “TSVC: efficient and secure vehicular communications with privacy preserving,” IEEE Trans. Wireless Commun., vol. 7, no. 12, pp. 4987– 4998, Dec. 2008. [5] H. Saleet, O. Basir, R. Langar, and R. Boutaba, “Region-based locationservice-management protocol for VANETs,” IEEE Trans. Veh. Technol.,vol. 59, no. 2, pp. 917–931, Feb. 2010. [6] H. Su and X. Zhang, “Clustering-based multichannel MAC protocols for QoS provisioning over vehicular ad hoc networks,” IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3309–3323, Nov. 2007. [7] V. Naumov and T. Gross, “Connectivity-Aware Routing (CAR) in vehicular adhoc networks,” in Proc. IEEE INFOCOM, 2007, pp. 1919– 1927. Suvya P is currently pursuing M.E Computer Science and Engineering at Coimbatore Institute of Engineering and Technology, Coimbatore, Tamil Nadu, (Anna University, Chennai). She has about 6 years experience in industry.Her research interests include wirelesss networking, Cryptography, Data Structures. Prabhu C is currently Asst Professor in the Department of Computer Science, at Coimbatore Institute of Engineering and Technology, Coimbatore, Tamil Nadu, (Anna University, Chennai). His research interests include wired and wirelesss networking, Cryptography.