Secure Routing in Cognitive Radio Vehicular Ad Hoc Networks

Author(s):  
Ying He
Author(s):  
Jennifer S. Raj

The recent technology development increases the opportunity to create valuable network services to user. Flying ad-hoc networks (FANET) in one among them which evolved recently with enhanced value added services with common features similar to its predecessor ad-hoc networks like vehicular ad hoc networks (VANET) and mobile ad hoc networks (MANET). Due to its distinctive features FANETs are widely preferred in recent telecommunication services which requires high quality of services, efficiency, environment adaptability and scalability. In order to achieve high efficiency multiple aerial vehicles are used in general architectures. The Communication in such vehicles are progressed directly between the nodes or through relay nodes. Routing is an important process to establish a connection link between the nodes in the architecture. This research work proposed a routing strategy suitable for dynamic and static environments as a hybrid optimization model which reduces the issues in link establishment. Nature inspired bee colony optimization is used along with conventional routing algorithms such as optimized link state routing protocol and Dynamic Source Routing Protocol to improve the link discovery. The proposed optimized routing outperforms well in reduced delay and communication overhead of the network.


2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Zhiyan Xu ◽  
Debiao He ◽  
Neeraj Kumar ◽  
Kim-Kwang Raymond Choo

Certificateless public key cryptosystem solves both the complex certificate management problem in the public key cryptosystem based on the PKI and the key escrow issue in the public key cryptosystem based on identity. The aggregator can compress n different signatures with respect to n messages from n signers into an aggregate signature, which can help communication equipments to save a lot of bandwidth and computing resources. Therefore, the certificateless aggregate signature (CLAS) scheme is particularly well suited to address secure routing authentication issues in resource-constrained vehicular ad hoc networks. Unfortunately, most of the existing CLAS schemes have problems with security vulnerabilities or high computation and communication overheads. To avoid the above issues and better solve the secure routing authentication problem in vehicular ad hoc networks, we present a new CLAS scheme and give the formal security proof of our scheme under the CDH assumption in the random oracle model. We then evaluate the performance of our proposed CLAS scheme, and the results demonstrate that our proposal is more practical in resource-constrained vehicular ad hoc networks.


Sign in / Sign up

Export Citation Format

Share Document