scholarly journals Enhancing Security Protection using Elliptic Curve Encryption and Digital Signature in Vehicular Ad-Hoc Network

2018 ◽  
Vol 7 (4.10) ◽  
pp. 837
Author(s):  
K. Selvakumar ◽  
S. Naveen Kumar

The Vehicular Ad-Hoc Network (VANET) is a liberality vehicle acts as remote switch or node in a cellular system. The VANET is much reasonable because of the single framework attributes agree to the system to be unbolted to metro. In this paper, we propose a Secure Hash Algorithm (SHA-1) to make an interesting key to every message. Likewise, prescribe capable and reasonable alias convention with prohibitive disconnection propagation. We set forward prime pseudonyms reasonably make a long time cycle that are worn to interact with semi-confided in experts and alternate pseudonyms with a minor lifetime which are utilized to talk with different nodes. Likewise, suggestion in the digital signature utilized in VANET is the basic, ECEDS (Elliptic Curve Encryption and Digital Signature). ECEDS enrich with system security by using a digital signature for the messages actually communicated with the system.  

2018 ◽  
Vol 7 (4.10) ◽  
pp. 832
Author(s):  
K. Selvakumar ◽  
S. Naveen Kumar

Vehicular Ad-hoc Network (VANET) is a developing transmission system to abet in the everyday organization of vehicular traffic and safety of vehicles (nodes). Unsigned verification is one of the key necessities in VANET gives the confidentiality of the root of the message. Current security conventions in VANET’s gives unsigned verification depends on the two-tier architecture, comprises of two VANET components, particularly nodes and Roadside Units (RsU’s) functioning as the key developing server (KDS). This protocol depends densely on RsU’s to give unsigned identification to the nodes. In this paper, we propose the K-means Cluster Head algorithm which is utilized for guide assortment, for both personal-best (’pbest’) and global-best (’gbest’), are observed a tremendously successful and complete well evaluate to the before existing methods. Here, we also propose an asymmetric encryption algorithm, with emphasis on Multivariate Quadratic Quasigroups (MVQQ) algorithm, in a circumstance of VANET. We set forward prime pseudonyms reasonably make a long time cycle that are worn to interact with semi-confided in experts and alternate pseudonyms with a minor lifetime which are utilized to talk with different nodes.    


Sign in / Sign up

Export Citation Format

Share Document