A Survey on Secure Clustering Approaches for VANET
Keywords:
Invasion, Security, VANET, Cryptographic, Simulation and RHCN.Abstract
Secure achievements are not only reliable data delivery but also the fast authenticity and reliability in security. The invasion of wireless communication technology has revolutionized human lifestyles in providing the most convenience and flexibility over accessing internet services and reliable services offered for privacy and security. Security is an important issue in deployment of ad hoc networks; secure clustering is necessary when there is a time of collecting and aggregating data from other nodes. In order to provide a comprehensive understanding of security techniques, which designed for VANETs and pave the way for the further research, a survey of the secure clustering techniques are discussed in detail in this paper.
References
- M. Raya and J. P. Hubaux, “Securing Vehicular ad hoc networks ,”HVVVJVVV J. Compute. Security, vol. 15, no. 1, pp. 39-68, 2007.
- Mohamed Elhoucine Elhdhili, Lamia Ben Azzouz and Farouk Kamoun:A Totally Distributed Cluster Based Key Management Model for Ad hoc Networks
- X. Lin, R. Lu, C. Zhang, H. Zhu, P.H. Ho, and X. Shen, "Security in Vehicular Ad Hoc Networks", IEEE Communications Magazine, Vol. 46, No. 4, 88-95, 2008
- Nai-Wei Lo and Hsiao-Chien Tsai, "Illusion Attack on VANET Applications", IEEE Globecom Workshops, pp. 1–8 (2007).
- IEEE Std. 1609.2-2006, “IEEE Trial-Use Standard forWireless access in Vehicular Environments-Security Services for Applications and Management Messages,” 2006.
- P. Wohlmacher, “Digital Certificates: A Survey of Revocation Methods,” Proc. ACM Wksp. Multimedia, Los Angeles, CA, Oct. 2000, pp. 111–14.
- M. Raya and J. P. Hubaux, “Securing Vehicular ad hoc networks ,” J. Compute. Security, vol. 15, no. 1, pp. 39-68, 2007.
- Pradeep B, Manohara Pai M.M and M. Boussedjra, J.Mouzna, Global Public Key Algorithm for secure location service in VANET, IEEE 2009
- P. S. L. M. Barreto et al., “Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps,” Proc. Advances in Cryptology — ASIACRYPT 2005, Taj Coromandel, Chennai, India, Dec. 2005, pp. 515–32
- Xiaodong Lin, Student Member, IEEE, Xiaoting Sun, Pin-Han Ho Member, IEEE, and Xuemin (Sherman) Shen, Senior Member, IEEE “GSIS: A Secure and Privacy Preserving Protocol for Vehicular Communications”, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 6, NOVEMBER 2007
- Rajaram Ayyasamy and Palaniswami Subramani: An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad-hoc Networks, The International Arab Journal of Information Technology, Volume 9, pages 291-298, 2012.
- M. Bechler, H.-J. Hofi, D. Kraftt, E Pmket and L. Wolf: A Cluster-Based Security Architecture for Ad Hoc Networks, Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, Volume 4, pages 2393 – 2403, 2004
- Maxim Raya, Adel Aziz and Jean-Pierre: Efficient Secure Aggregation in VANETs, Proceedings of the 3rd international workshop on Vehicular ad hoc networks, Pages 67-75, 2006
- B. Kadri, A. M’hamed, M. Feham: Secured Clustering Algorithm for Mobile Ad Hoc Networks, IJCSNS International Journal of Computer Science and Network Security, volume 7, pages 27-34, 2007
- Ameneh Daeinabi, Akbar Ghaffar Pour Rahbar and Ahmad Khademzadeh: VWCA: An efficient clustering algorithm in vehicular ad hoc networks, Journal of Network and Computer Applications, Volume 34, Pages 207–222, 2011
- Tahani Gazdar, Abderrahim Benslimane, Abdelfettah Belghith and Abderrezak Rachedi: A secure cluster-based architecture for certificates management in vehicular networks, 2013
- Leinmuller T, Buttyan L et al (2006) SEVECOM-Secure Vehicle Communication. Proc of IST Mob Summit.
- Lin, X., Sun, X., Shen, X.: GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Transaction on Vechicular Technology 56(6), 3442–3456 (2007)
- Lu, R., Lin, X., Zhu, H., Ho, P.-H., Shen, X.: ECPP: Efficient conditional privacy preservation protocol for secure vehilce communications. In: Proceedings of The IEEE INFOCOM 2008, pp. 1229–1237 (2008)
- D. Boneh and H. Shacham. (2004). Group signatures with verifier-local revocation, in Proc.ACM CCS’ 04, pp. 168-177
- http://media.springernature.com/full/springerstatic/image/art%3A10.1186%2Fs13638-016-0573-9/MediaObjects/13638_2016_573_Fig1_HTML.gif
- https://www.researchgate.net/profile/Chaudhary_Muhammad_Asim_Rasheed/publication/315512136/figure/fig1/AS:476526849335296@1490624262514/Fig-1-Categorization-of-VANET-Attacks.ppm
- https://cdn.intechopen.com/pdfs-wm/42787.pdf
- www.roadtraffic-technology.com
- https://www.researchgate.net/profile/Raik_Aissaoui/publication/305149984/figure/fig5/AS:382635986702342@1468238936844/Figure-25-Location-service-taxonomy.ppm
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.