scholarly journals Lightweight VANET Architecture for Efficient Secure Data Transmission using CPABE & IBOOS

Author(s):  
Dr. J. Suguna ◽  
◽  
G. Keerthana ◽  

Cloud computing is a network access concept that provides simple, on-demand network access to a shared pool of customizable computing resources (such as networks, servers, storage, applications, and services) that can be quickly provided and released with minimal administrative effort or service provider involvement. The idea of having a communication node on-board a vehicle that may make wireless connections with other adjacent communication nodes visible in the radio range is referred to as a Vehicular Adhoc Network (VANET). The main focus of this paper is to design lightweight Vehicular Adhoc Network architecture for efficient secure data transmission. An improved Ciphertext Policy Attribute Based Encryption scheme and Identity Based offline/online Signature scheme are proposed to reduce the computational cost, storage overhead and communication overhead in vehicular ad-hoc network. Finally, concluded that the proposed work yields high performance than the existing work.

2020 ◽  
Vol 8 (6) ◽  
pp. 3463-3471

Vehicular ad hoc networks (VANETs) is an Intelligent Transportation System and a part of MANETS. VANETs communication is wireless between vehicles and different nodes along the road to increase efficiency and human safety. VANETs embedded all the features of MANETs and almost any Ad Hoc Network. We have discussed various features of VANET and different types of attacks, since the VANET communication is open in nature; they are prone to various types of attacks. Although various attractive features, VANETs also face some challenges like communication with different types of nodes and sensors and gather information or data. Our major focus is on securing this data or information sent by the sender node before transmitting on the network to another node in the network. We intend to solve this by using a wireless LoRa module and cryptography algorithm like ECDH for secure data transmission and solve the security risks and privacy problems. Our work discusses VANET communication method and structure. We provide a simple communication method using P2P topology method and ECDH cryptographic algorithm for keeping the data secure.


2019 ◽  
Vol 8 (3) ◽  
pp. 8707-8714

Ad hoc system is a self-sufficient accumulation of versatile hubs imparting over remote connections where the hub sweep speak with one another in brief way with no unified administration and in a unique topology that changes habitually. A pernicious hub can always report mistaken data to different hubs in the system, which can lead to entire system down. Security is the principle issue of the versatile adhoc organize, as a result of portable hubs conduct. The topology of MANET changes regularly because of hubs versatility, by this property recently hub effectively enters or exit from a specific territory. Hubs in MANET will speak with each elective hubs if and gave that every one of the hubs square measure inside the equivalent change. This appropriation of hubs makes MANET helpless against fluctuated assaults, parcel dropping assault or dark gap assault and replay are a portion of the potential assaults. It is extremely substantial to see and block. To keep from bundle dropping assault, location of misconduct joins and self important hubs assumes a vital job in MANETs. Within this paper, all of us experience the analysis about flexible ad-hoc program and work of sensitive registering within this system. Within our proposed function we use Dempster Shafer hypothesis with regard to computing the actual trust associated with hubs. this particular trust really worth fills within as an open up key from the hubs to ensure that at what ever point 1 hub transfers the pack to another centre it decode the package utilizing the open crucial this procedure safe our transmitting over the method. by utilizing this specific crypto strategy we foresee our system through detached approaches or through the use of trust confidence we find out noxious carry out of hubs


Sign in / Sign up

Export Citation Format

Share Document