A Survey on Secure Clustering Approaches for VANET

Authors(3) :-Venkatatamangarao Nampally, Dr. M. Raghavender Sharma, Arun Ananthanarayanan

Secure achievements are not only reliable data delivery but also the fast authenticity and reliability in security. The invasion of wireless communication technology has revolutionized human lifestyles in providing the most convenience and flexibility over accessing internet services and reliable services offered for privacy and security. Security is an important issue in deployment of ad hoc networks; secure clustering is necessary when there is a time of collecting and aggregating data from other nodes. In order to provide a comprehensive understanding of security techniques, which designed for VANETs and pave the way for the further research, a survey of the secure clustering techniques are discussed in detail in this paper.

Authors and Affiliations

Venkatatamangarao Nampally
Department of Computer Science, University College of Science, Osmania University, Hyderabad, Telangana, India
Dr. M. Raghavender Sharma
Department of Statistics, University College of Science, Osmania University, Saifabad, Hyderabad, Telangana, India
Arun Ananthanarayanan
Department of Network Systems and Information Technology, University of Madras, Guindy Campus, Chennai, Tamil Nadu, India

Invasion, Security, VANET, Cryptographic, Simulation and RHCN.

  1. M. Raya and J. P. Hubaux, “Securing Vehicular ad hoc networks ,”HVVVJVVV J. Compute. Security, vol. 15, no. 1, pp. 39-68, 2007.
  2. Mohamed Elhoucine Elhdhili, Lamia Ben Azzouz and Farouk Kamoun:A Totally Distributed Cluster Based Key Management Model for Ad hoc Networks
  3. X. Lin, R. Lu, C. Zhang, H. Zhu, P.H. Ho, and X. Shen, "Security in Vehicular Ad Hoc Networks", IEEE Communications Magazine, Vol. 46, No. 4, 88-95, 2008
  4. Nai-Wei Lo and Hsiao-Chien Tsai, "Illusion Attack on VANET Applications", IEEE Globecom Workshops, pp. 18 (2007).
  5. IEEE Std. 1609.2-2006, “IEEE Trial-Use Standard forWireless access in Vehicular Environments-Security Services for Applications and Management Messages,” 2006.
  6. P. Wohlmacher, “Digital Certificates: A Survey of Revocation Methods,” Proc. ACM Wksp. Multimedia, Los Angeles, CA, Oct. 2000, pp. 11114.
  7. M. Raya and J. P. Hubaux, “Securing Vehicular ad hoc networks ,” J. Compute. Security, vol. 15, no. 1, pp. 39-68, 2007.
  8. Pradeep B, Manohara Pai M.M and M. Boussedjra, J.Mouzna, Global Public Key Algorithm for secure location service in VANET, IEEE 2009
  9. P. S. L. M. Barreto et al., “Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps,” Proc. Advances in Cryptology ASIACRYPT 2005, Taj Coromandel, Chennai, India, Dec. 2005, pp. 51532
  10. Xiaodong Lin, Student Member, IEEE, Xiaoting Sun, Pin-Han Ho Member, IEEE, and Xuemin (Sherman) Shen, Senior Member, IEEE “GSIS: A Secure and Privacy Preserving Protocol for Vehicular Communications”, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 6, NOVEMBER 2007
  11. Rajaram Ayyasamy and Palaniswami Subramani: An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad-hoc Networks, The International Arab Journal of Information Technology, Volume 9, pages 291-298, 2012.
  12. M. Bechler, H.-J. Hofi, D. Kraftt, E Pmket and L. Wolf: A Cluster-Based Security Architecture for Ad Hoc Networks, Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, Volume 4, pages 2393 2403, 2004
  13. Maxim Raya, Adel Aziz and Jean-Pierre: Efficient Secure Aggregation in VANETs, Proceedings of the 3rd international workshop on Vehicular ad hoc networks, Pages 67-75, 2006
  14. B. Kadri, A. M’hamed, M. Feham: Secured Clustering Algorithm for Mobile Ad Hoc Networks, IJCSNS International Journal of Computer Science and Network Security, volume 7, pages 27-34, 2007
  15. Ameneh Daeinabi, Akbar Ghaffar Pour Rahbar and Ahmad Khademzadeh: VWCA: An efficient clustering algorithm in vehicular ad hoc networks, Journal of Network and Computer Applications, Volume 34, Pages 207222, 2011
  16. Tahani Gazdar, Abderrahim Benslimane, Abdelfettah Belghith and Abderrezak Rachedi: A secure cluster-based architecture for certificates management in vehicular networks, 2013
  17. Leinmuller T, Buttyan L et al (2006) SEVECOM-Secure Vehicle Communication. Proc of IST Mob Summit.
  18. Lin, X., Sun, X., Shen, X.: GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Transaction on Vechicular Technology 56(6), 34423456 (2007)
  19. Lu, R., Lin, X., Zhu, H., Ho, P.-H., Shen, X.: ECPP: Efficient conditional privacy preservation protocol for secure vehilce communications. In: Proceedings of The IEEE INFOCOM 2008, pp. 12291237 (2008)
  20. D. Boneh and H. Shacham. (2004). Group signatures with verifier-local revocation, in Proc.ACM CCS’ 04, pp. 168-177
  21. http://media.springernature.com/full/springerstatic/image/art%3A10.1186%2Fs13638-016-0573-9/MediaObjects/13638_2016_573_Fig1_HTML.gif
  22. https://www.researchgate.net/profile/Chaudhary_Muhammad_Asim_Rasheed/publication/315512136/figure/fig1/AS:476526849335296@1490624262514/Fig-1-Categorization-of-VANET-Attacks.ppm
  23. https://cdn.intechopen.com/pdfs-wm/42787.pdf
  24. www.roadtraffic-technology.com
  25. https://www.researchgate.net/profile/Raik_Aissaoui/publication/305149984/figure/fig5/AS:382635986702342@1468238936844/Figure-25-Location-service-taxonomy.ppm

Publication Details

Published in : Volume 2 | Issue 5 | September-October 2017
Date of Publication : 2017-10-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 508-517
Manuscript Number : CSEIT1725114
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Venkatatamangarao Nampally, Dr. M. Raghavender Sharma, Arun Ananthanarayanan, "A Survey on Secure Clustering Approaches for VANET", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.508-517, September-October-2017.
Journal URL : http://ijsrcseit.com/CSEIT1725114

Article Preview

Follow Us

Contact Us