Skip to main content

V2V-DDS Approach to Provide Sheltered Communication Over ALTERATION ATTACK to Control Against Vehicular Traffic

  • Conference paper
  • First Online:
Information and Communication Technology for Sustainable Development

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 9))

  • 882 Accesses

Abstract

The objective of this paper is to focus on secure communication over VANET which is a more questioning issue nowadays. Vehicular adhoc networks mainly focus on road safety which is used to provide a way to prevent road accidents, to pass information about road traffic etc. In vehicular to Infrastructure (V2I) scenario, an RSU unit is used to provide security by giving certification in order to identify authorized users and also uses digital signature approach to provide confidentiality and authentication for secure communication. But in case of vehicular to vehicular (V2V) scenario, no such security is provided between the communicating parties and so there might arise a situation in which the nodes act maliciously over other nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ghassan S, Al-Salihy WAH, Sures R (2010) Security analysis of vehicular ad hoc networks (VANET). In: 2010 second international conference on network applications, protocols and services, national advanced IPv6 center. Universiti Sains Malaysia Penang, Malaysia

    Google Scholar 

  2. Raya M, Papadimitratos P, Hubaux JP (2006) Securing vehicular communications. IEEE Wirel Commun 13

    Google Scholar 

  3. Parno B, Perrig A (2005) Challenges in securing vehicular networks. In: Proceedings of HotNets-IV

    Google Scholar 

  4. Aad I, Hubaux JP, Knightly EW (2008) Impact of denial of service attacks on ad hoc networks. IEEE/ACM Trans Network 16

    Google Scholar 

  5. Raya M, Pierre Hubaux J (2005) The security of VANETs. In: Proceedings of the 2nd ACM international workshop on vehicular adhoc networks

    Google Scholar 

  6. Security & Privacy for DSRC-based Automotive Collision Reporting (2010) In: Second international conference on network applications, protocols and services

    Google Scholar 

  7. Douceur J (2003) The Sybil attack. In: First international workshop on peer-to-peer systems, 1st edn. Springer, USA

    Google Scholar 

  8. Corson S, Batsell S, Macker J (1996) Architectural considerations for mobile mesh networking (Internet draft RFC, version 2). In: Mobile ad-hoc network (MANET) working group, IETF

    Google Scholar 

  9. Ramanathan S, Steenstrup M (1996) A survey of routing techniques for mobile communication networks. Mobile Netw Appl 89–104

    Google Scholar 

  10. Ko Y-B, Vaidya NH (1997) Using location information to improver outing in ad hoc networks. Technical report 97–013, Texas A&M University

    Google Scholar 

  11. Ko Y-B, Vaidya NH (1998) Location-aided routing in mobile ad hoc networks. Technical report 98-012, Texas A&M University

    Google Scholar 

  12. Ko Y-B, Vaidya NH (1998) Location-aided routing (LAR) in mobile ad hoc networks. In: Proceedings of MOBICOM’98 (1998)

    Google Scholar 

  13. Dommety G, Jain R (1996) Potential networking applications of global positioning systems (GPS). Technical report TR-24, The Ohio State University

    Google Scholar 

  14. Parkinson BW, Gilbert SW (1983) NAVSTAR: global positioning system—ten years later. Proc IEEE 71(10):1177–1186

    Article  Google Scholar 

  15. Ko Y-B, Vaidya NH (2000) Location-aided routing (LAR) in mobile ad hoc networks in wireless networks vol 6, pp 307–321

    Google Scholar 

  16. Golle P, Greene D, Staddon J (2004) Detecting and correcting malicious data in vanets. In: VANET’04: proceedings of the 1st ACM international workshop on vehicular ad hoc networks. ACM, New York, NY, USA, pp 29–37

    Google Scholar 

  17. IEEE, IEEE 1609.2-Standard for Wireless Access in Vehicular Environments (WAVE)—Security Services for Applications and Management Messages, available from ITS Standards Program

    Google Scholar 

  18. Djenouri D, Khelladi L (2005) A survey of security issues in mobile ad hoc and sensor networks. IEEE Commun Surv Tutor 7(4):2–28

    Article  Google Scholar 

  19. Stallings W (2003) Cryptography and network security, principles and practices, 3rd edn. Prentice Hall, pp 67–68 and 317–375

    Google Scholar 

  20. Forouzan BA (2008) Cryptography and network security. McGraw Hill, Boston

    Google Scholar 

  21. Kaur P, Arora N (2015) A comprehensive study of cryptography and digital signature. Int J Comput Sci Eng Technol (IJCSET)

    Google Scholar 

  22. Shiva Rama Krishna D (2015) Providing security to confidential information using digital signature. Int J Adv Res Comput Sci Manag Stud

    Google Scholar 

  23. Rehman S, Arif Khan M, Zia TA, Zheng L (2013) Vehicular ad-hoc networks (VANETs): an overview and challenges. J Wirel Network Commun

    Google Scholar 

  24. Zeadally S, Hunt R, Chen Y-S, Irwin A, Hassan A (2010) Vehicular ad hoc networks (VANETS): status, results and challenges. Springer Science + Business Media, LLC

    Google Scholar 

  25. Agrawal A, Garg A, Chaudhiri N, Gupta S, Pandey D, Roy T (2013) Security on vehicular ad hoc networks (VANET): a review paper. Int J Emerg Technol Adv Eng

    Google Scholar 

  26. Husain A, Kumar B, Doegar A (2010) A study of location aided routing (LAR) protocol for vehicular adhoc networks in highway scenario. Int J Eng Inform Technol (IJEIT)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Prittopaul .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Prittopaul, P., Usha, M., Santhosh, M.V.S., Sharath, R., Kughan, E. (2018). V2V-DDS Approach to Provide Sheltered Communication Over ALTERATION ATTACK to Control Against Vehicular Traffic. In: Mishra, D., Nayak, M., Joshi, A. (eds) Information and Communication Technology for Sustainable Development. Lecture Notes in Networks and Systems, vol 9. Springer, Singapore. https://doi.org/10.1007/978-981-10-3932-4_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3932-4_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3931-7

  • Online ISBN: 978-981-10-3932-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics