A Survey on Secure Clustering Approaches for VANET

Authors

  • Venkatatamangarao Nampally  Department of Computer Science, University College of Science, Osmania University, Hyderabad, Telangana, India
  • Dr. M. Raghavender Sharma  Department of Statistics, University College of Science, Osmania University, Saifabad, Hyderabad, Telangana, India
  • Arun Ananthanarayanan  Department of Network Systems and Information Technology, University of Madras, Guindy Campus, Chennai, Tamil Nadu, India

Keywords:

Invasion, Security, VANET, Cryptographic, Simulation and RHCN.

Abstract

Secure achievements are not only reliable data delivery but also the fast authenticity and reliability in security. The invasion of wireless communication technology has revolutionized human lifestyles in providing the most convenience and flexibility over accessing internet services and reliable services offered for privacy and security. Security is an important issue in deployment of ad hoc networks; secure clustering is necessary when there is a time of collecting and aggregating data from other nodes. In order to provide a comprehensive understanding of security techniques, which designed for VANETs and pave the way for the further research, a survey of the secure clustering techniques are discussed in detail in this paper.

References

  1. M. Raya and J. P. Hubaux, “Securing Vehicular ad hoc networks ,”HVVVJVVV J. Compute. Security, vol. 15, no. 1, pp. 39-68, 2007.
  2. Mohamed Elhoucine Elhdhili, Lamia Ben Azzouz and Farouk Kamoun:A  Totally  Distributed  Cluster  Based  Key  Management  Model  for  Ad hoc Networks
  3. X. Lin, R. Lu, C. Zhang, H. Zhu, P.H. Ho, and X. Shen, "Security in Vehicular Ad Hoc Networks", IEEE Communications Magazine, Vol. 46, No. 4, 88-95, 2008
  4. Nai-Wei Lo and Hsiao-Chien Tsai, "Illusion Attack on VANET Applications", IEEE Globecom Workshops, pp. 1–8 (2007).
  5. IEEE Std. 1609.2-2006, “IEEE Trial-Use Standard forWireless access in Vehicular Environments-Security Services for Applications and Management Messages,” 2006.
  6. P. Wohlmacher, “Digital Certificates: A Survey of Revocation Methods,” Proc. ACM Wksp. Multimedia, Los Angeles, CA, Oct. 2000, pp. 111–14.
  7. M. Raya and J. P. Hubaux, “Securing Vehicular ad hoc networks ,” J. Compute. Security, vol. 15, no. 1, pp. 39-68, 2007.
  8. Pradeep B, Manohara Pai M.M and M. Boussedjra, J.Mouzna, Global Public Key Algorithm for secure location service in VANET, IEEE 2009
  9. P. S. L. M. Barreto et al., “Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps,” Proc. Advances in Cryptology — ASIACRYPT 2005, Taj Coromandel, Chennai, India, Dec. 2005, pp. 515–32
  10. Xiaodong Lin, Student Member, IEEE, Xiaoting Sun, Pin-Han Ho Member, IEEE, and Xuemin (Sherman) Shen, Senior Member, IEEE “GSIS: A Secure and Privacy Preserving Protocol for Vehicular Communications”, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 6, NOVEMBER 2007
  11. Rajaram Ayyasamy and Palaniswami Subramani: An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad-hoc Networks, The International Arab Journal of Information Technology, Volume 9, pages 291-298, 2012.
  12. M. Bechler, H.-J. Hofi, D. Kraftt, E Pmket and L. Wolf: A Cluster-Based Security Architecture for Ad Hoc Networks, Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, Volume 4, pages 2393 – 2403, 2004
  13. Maxim Raya, Adel Aziz and Jean-Pierre: Efficient Secure Aggregation in VANETs, Proceedings of the 3rd international workshop on Vehicular ad hoc networks, Pages 67-75, 2006
  14. B. Kadri, A. M’hamed, M. Feham: Secured Clustering Algorithm for Mobile Ad Hoc Networks, IJCSNS International Journal of Computer Science and Network Security, volume 7, pages 27-34, 2007
  15. Ameneh Daeinabi, Akbar Ghaffar Pour Rahbar and Ahmad Khademzadeh: VWCA: An efficient clustering algorithm in vehicular ad hoc networks, Journal of Network and Computer Applications, Volume 34, Pages 207–222, 2011
  16. Tahani Gazdar, Abderrahim Benslimane, Abdelfettah Belghith and Abderrezak Rachedi: A secure cluster-based architecture for certificates management in vehicular networks, 2013
  17. Leinmuller T, Buttyan L et al (2006) SEVECOM-Secure Vehicle Communication. Proc of IST Mob Summit.
  18. Lin, X., Sun, X., Shen, X.: GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Transaction on Vechicular Technology 56(6), 3442–3456 (2007)
  19. Lu, R., Lin, X., Zhu, H., Ho, P.-H., Shen, X.: ECPP: Efficient conditional privacy preservation protocol for secure vehilce communications. In: Proceedings of The IEEE INFOCOM 2008, pp. 1229–1237 (2008)
  20. D. Boneh and H. Shacham. (2004). Group signatures with verifier-local revocation, in Proc.ACM CCS’ 04, pp. 168-177
  21. http://media.springernature.com/full/springerstatic/image/art%3A10.1186%2Fs13638-016-0573-9/MediaObjects/13638_2016_573_Fig1_HTML.gif
  22. https://www.researchgate.net/profile/Chaudhary_Muhammad_Asim_Rasheed/publication/315512136/figure/fig1/AS:476526849335296@1490624262514/Fig-1-Categorization-of-VANET-Attacks.ppm
  23. https://cdn.intechopen.com/pdfs-wm/42787.pdf
  24. www.roadtraffic-technology.com
  25. https://www.researchgate.net/profile/Raik_Aissaoui/publication/305149984/figure/fig5/AS:382635986702342@1468238936844/Figure-25-Location-service-taxonomy.ppm

Downloads

Published

2017-10-31

Issue

Section

Research Articles

How to Cite

[1]
Venkatatamangarao Nampally, Dr. M. Raghavender Sharma, Arun Ananthanarayanan, " A Survey on Secure Clustering Approaches for VANET, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.508-517, September-October-2017.