SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 2, June 2013
DOI:10.5121/ijcis.2013.3202 15
AN ENCRYPTION ALGORITHM TO EVALUATE
PERFORMANCE OF V2V COMMUNICATION IN VANET
Manpreet Kaur1
, Rajni2
and Parminder Singh3
1
Department of Electronics & Communication, Research Scholar, S.B.S.S.T.C, Ferozepur
er_rimpi@rediffmail.com
2
Assistant Professor, S.B.S.S.T.C, Ferozepur
rajni_c123@yahoo.co.in
3
Senior Lecturer, Chandigarh Group of Colleges, Landran
Singh.parminder06@gmail.com
ABSTRACT
Wireless Communications are gaining more importance because they have opened new research fields by
extending data networks connectivity to environments where wired solutions are difficult to install. The
networks which are deployed in the areas where the needed infrastructure is not feasible to install are
adhoc networks. Mobile Adhoc Networks (MANETs), in which each node acts as both data terminal and
router uses wireless medium without the need of any centralized control. Vehicular Adhoc Networks
(VANETs) are subset of MANETs. The successful deployment of vehicular communication requires Vehicle-
to-Vehicle (V2V) & Vehicle–to-Infrastructure (V2I) communication with security to improve road safety
and optimize road traffic. The technique used for secure communication in the presence of adversaries is
known as cryptography. Cryptography refers to encryption in which a plaintext message is converted into a
ciphertext and this can be done with private-key or public-key. In this paper, an algorithm based on
private key encryption is used to make communication possible between two people with QualNet
simulator.
KEYWORDS
Mobile Adhoc Networks (MANETs), Vehicular Adhoc Networks (VANETs), Intelligent Transport System
(ITS), Security, Vehicle-to-Vehicle (V2V), Vehicle –to-Infrastructure (V2I).
1. INTRODUCTION
The process in which exchange of information via some transmission media takes place is known
as network. VANETs are used for V2V and V2I communication considering all the aspects
required by the process of cryptography. In Safety and non-safety applications of VANET, there
is a requirement of V2V & V2I communication.
B.Karp in 2000 [1] discussed Greedy Perimeter Stateless Routing (GPSR) scheme in which the
default packet forwarding strategy is the greedy strategy, where the sender selects the closest
vehicle to the destination as the next hop. If the sender cannot find a forwarder based on the
greedy strategy, it forwards the packet around the perimeter of the region containing itself and the
destination. Giuseppe Ateniese in 2005 [2] presented a new re-encryption schemes that realizes a
stronger notion of security and demonstrated the usefulness of proxy re-encryption as a method of
adding access control to a secure file system. Maxim Raya in 2006 [3] described the security
problems of the emerging vehicular networks and it outlined the solution architecture and several
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 2, June 2013
16
of its components. Tim Leinmuller in 2006 [4] aimed to define a consistent & future-proof
solution to the problem of V2V/V2I security by focusing on SEVECOM (Secure Vehicle
Communication). Pandurang Kamat in 2006 [5] proposed a security framework for vehicular
networks using Identity-Based Cryptography (IBC), that provides authentication, confidentiality,
message integrity, non repudiation and pseudonymity.
Xiaonan Liu in 2007 [6] described an Intelligent Transport System (ITS) which can be used under
the security pattern to provide the appropriate solving measures in concern with the security
issues of VANETs from some aspects. Department for Transport in 2008 [7] concluded that it had
been seen from various studies that the number of lives lost in motor vehicle crashes worldwide
every year is by far the highest among all the categories of accidental deaths. P.Caballero-Gil in
2009 [8] analyzed the features of inter-vehicle and vehicle-to-roadside communications to
propose differentiated services for node authentication, according to privacy and efficiency needs.
Zuowen in 2010 [9] proposed an improved privacy-preserving mutual authentication protocol for
vehicle ad hoc networks by using secure identity-based group blind signature, the private
encryption system and the public encryption system. Surabhi Mahajan in 2010 [10] discussed a
comparison between the two schemes that are used to reduce the overhead in authentication,
when roaming – proxy re-encryption scheme and new proxy re encryption scheme. Hatem Hamad
in 2010 [11] proposed a new method of message security by using the coordinates in GPS (Global
Positioning System) service.
Sandhaya Kohli, Bandanjot Kaur in 2010 [12] discussed that vehicular adhoc networks are
subclass of mobile adhoc networks which provides a distinguish approach for intelligent transport
system (ITS). The survey of routing protocols in VANET is important and necessary issue for
smart ITS. The proposed work discusses the advantages and disadvantages of these routing
protocols. Umar Farooq Minhas in 2011 [13] described an important methodology required to
enable effective V2V communication via intelligent agents. Nizar Alsharif in 2011 [14] explained
that the reliability of position-based routing (PBR) in VANETs is ensured by proposing a set of
plausibility checks that can mitigate the impact of PBR attacks without extra hardware
requirement.
2. SECURITY CHALLENGES
The necessities required to provide security in VANETs are:
1. Authentication: An authentication framework is necessary to identify and ensure that the
participants are whom they claim to be to operate securely in VANETs.
2. Integrity: Integrity is required between two communicating nodes to protect data
accuracy which is main security issue desirable in VANETs.
3. Confidentiality: The challenge to protect data content from the adversaries is
confidentiality.
4. Non-Repudiation: Non-Repudiation refers to somebody who possesses the private key
corresponding to the signing certificate with reasonable certainity but if the key is not
properly safeguarded by the original owner, a major concern can be digital forgery.
5. Pseudonymity: Pseudonomity is the state of describing a disguised identity. A holder that
is one or more human beings are identified but don’t disclose their true names.
6. Privacy: The protection of personal information of drivers within the network from other
nodes but extracted by authorities in case of accidents is a major privacy issue which is
desirable for VANETs.
7. Scalability: The ability of a network to handle growing amount of work in a capable
manner securely is Scalability, which is the main challenge in VANETs.
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 2, June 2013
17
8. Mobility: The nodes communicating in VANETs constantly change their locations with
different directions and speeds making the network dynamic in nature. So, in order to
make communication successful, it is challenging to establish security protocols.
9. Key-Management: The key is used to encrypt and decrypt information during
communication process. When designing security protocols for networks like VANET,
the issue of key management must be resolved.
10. Location-verification: This is necessary to prevent many attacks and is helpful in data
validation process. Thus to improve the security of VANETs, a solid method is required
to verify the nodes positions.
3. SCENARIO USED
The choice of algorithm should be dictated by the purpose of the encryption when encryption is
implemented. Private Key encryption is used because it is faster than public key encryption.
However, private key encryption does not provide for digital signatures or the signing of
information. It is also important to choose well-known and well-reviewed algorithms. Such
algorithms are less likely to include back doors that may compromise the information being
protected.
The security policy should define acceptable encryption algorithms for use within the VANET
System. The security policy should also specify the required procedures for key management. In
order to successfully gain access to the information transmitted over the VANET, an attacker
must capture the entire session and use a substantial amount of computer power and time to brute-
force the key and decrypt the traffic. Unless the information is extremely valuable, any well-
known, strong algorithm is appropriate for use in the VANET System.
Figure 1. V2V Communication in VANET
4. ALGORITHM DESCRIPTION
The Algorithm implemented here in VANET system in a straight road is Private Key Encryption
in which i and j remain secret. Vehicles V1 and V2 are assumed so as to communicate securely
and thus need to agree on an encryption key.
1. V1 and V2 agree on two large integers a and b such that 1 < a < b.
2. V1 then chooses a random number i and computes I = ai mod b. V1 sends I to V2.
3. V2 then chooses a random number j and computes J = aj mod b. V2 sends J to V1.
4. V1 computes k1 = Ji mod b.
5. V2 computes k2 = Ij mod b.
6. We have k1 = k2 = aij mod b and thus k1 and k2 are the secret keys to use for the other
transmission.
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 2, June 2013
18
5. IMPLEMENTATION TOOL
The performance results have been evaluated using QualNet Simulator. QualNet is network
evaluation software, which is written purely in C++ and is entirely modeled as Finite State
Machine (FSM). It can run on a variety of operating systems like UNIX, Windows, MAC and
Linux. It is equipped with an extensive range of libraries for simulating a variety of networks.
The architecture of QualNet comprises of Application, Transport, Medium Access Control
(MAC), Physical layer. A unique capability for accurate, efficient simulation of large-scale,
heterogeneous networks can be provided by the features of QualNet. A robust set of wired and
wireless networks can be simulated by QualNet. ITM (Irregular Terrain Model) can be supported
with the QualNet. QualNet executes scenarios 5-10x times faster than commercial alternatives.
6. RESULTS AND DISCUSSIONS
In this paper, the different results have been evaluated using QualNet simulator. The results
shown indicate that the packet is sent between sender and receiver by using private key
encryption algorithm. This means the same key is used for encryption and decryption. This leads
to increase in throughput with reduce delay.
Figure 2. First packet received during transmission.
From the figure 2, we have measured the throughput of moving Vehicles communicating with
each other via Access Point (A.P) already shown in figure 1. V1 Communicates with V2 via
Access Point which leads to the calculation of the throughput of V1. From the Figure1, when the
communication starts between AP and V2 then the throughput of first packet is calculated at its
arrival. The first packet arrives from V1 having Node ID 1=2.8 seconds. The simulation carried
from the help of QualNet Simulator and the length of Packet = 1024 Bytes.
From the Figure 3, the throughput of Last Packet received by the AP from V1 (called Source
Node) =100 Seconds approximately is calculated. After the Packet is received, the Vehicle Node
sends the termination signal to do end of communication between two Vehicles with the Base
Station (AP) Node.
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 2, June 2013
19
Figure 3. Last packet received during transmission.
Figure 4. Throughput observed during transmission (with private key).
The figure 4 represents the Throughput of Two Nodes with AP by applying Security Algorithm
and also calculates the speed at which the two vehicles move when sharing the data. The speed at
which the Vehicles move was 60m/s with a packet size of 1024 Bytes and approximately
calculated value was 4200bits/s.
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 2, June 2013
20
Figure 5. Average End-to-End Delay during transmission (with private key).
The average end-to-end delay in a VANET means that the source node (V1) sends packet to
destination Node (V2) and total average time to reach the packet to destination Node. In this
Figure 5 the total average time was 0.007 seconds approximately. This delay was due to
retransmission and applying security Algorithm at 802.11 networks.
Figure 6. Signals transmitted between node to node.
The signal transmission in between node to node or vehicle to vehicle has been shown in the
Figure 6.This has been shown that each node sends packet to the other node and the sequence
number updates. This way the vehicles communicate at the transport layer when the transmission
starts between both ends.
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 2, June 2013
21
7. CONCLUSION
Security measures guarantees that the transmissions of data are authentic that is data is accessible
only by authorized parties. The security techniques can be applied to vehicular users in Vehicular
Adhoc Networks. The algorithm used in the paper is private key encryption in which sender and
receiver communicate securely with the help of encryption key. The algorithm reduces delay,
increases throughput, provides authentication and higher security level in VANETs.
8. FUTURE WORK
The solution of the security problems is discussed (by the use of algorithm) that are encountered
in VANET. The performances of data transmission in VANETs can be tested by applying more
encryption algorithms to provide more security with increased throughput and reduced delay.
REFERENCES
[1] Karp B, Kung H T (2000) GPRS: Greedy Perimeter Stateless Routing for wireless networks. Proc 6th
Annual Int Conf on Mob Computing and Netw: 243-254.
[2] Ateniese G, Fu K, Green M, Hohenberger S (2005) Improved Proxy Re-Encryption Schemes with
Applications to Secure Distributed Storage. Proc of the 12th Annual Netw and Distributed Syst
Security Symp: 29-44.
[3] Raya M, Papadimitratos P, Hubaux J P (2006) Securing Vehicular Networks. J IEEE wirel commun.
[4] Leinmuller T, Buttyan L et al (2006) SEVECOM-Secure Vehicle Communication. Proc of IST Mob
Summit.
[5] Kamat P, Baliga A, Trappe W (2006) An Identity-Based Security Framework for VANETs. Proc of
the 3rd Int workshop on Vehicular adhoc netw: 94-95.
[6] Liu X, Fang Z, Shi L (2007) Securing Vehicular Ad Hoc netw.IEEE.
[7] Department for Transport (2008) Reported road casualties Great Britain: 2008 Annual Report. Road
Casualties G. B. UK.
[8] Caballero-Gil P, Hernandez-Goya C, Fuster-Sabater A (2009) Differentiated Services to Provide
Efficient Node Authentication in VANETs.
[9] Zuowen, Tan (2010) A Privacy-Preserving Mutual Authentication Protocol for Vehicle Ad Hoc
Networks. J of Convergence Inf Technology.
[10] Mahajan S, Jindal A (2010) Security and Privacy in VANET to reduce Authentiation Overhead for
Rapid Roaming Networks.Int J of Comput Applications.
[11] Hamad H, Elkourd S (2010) Data Encryption using the dynamic location and speed of mobile node. J
Media and Commun Stud: 067-075.
[12] Sandhaya, Bandanjot ", A comparative Study of Routing Protocols in VANET", ISCET 10, pp.173
[13] Minhas U F et al (2011) A Multifaceted Approach to Modeling Agent Trust for Effective
Communication in the Application of Mobile Ad Hoc Vehicular Networks. IEEE:407-20.
[14] Alsharif N, Wasef, Shen X (2011) Mitigating the effects of Position-Based Routing Attacks in
Vehicular Ad Hoc Networks. IEEE ICC Proc.
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 2, June 2013
22
AUTHORS
MANPREET KAUR is B.Tech in Electronics & Communication Engineering (2009)
from AIET, India. She is pursuing M.Tech in Electronics & Communication
Engineering from SBSSTC, India. Her research interests are Wireless, Networks,
Adhoc Networks, etc.
Ms. Rajni is currently Assistant Professor at SBSSTC, Punjab, India. She has
completed her M.E. from NITTTR, Chandigarh, India, B.Tech from NIT,
Kurukshetra, India. Ms. Rajni has about fourteen years of academic experience. She
has authored a number of research papers in national, international conferences and
reputed journals. Her areas of interest includes Wireless communication, and Antenna
design .
Parminder Singh is B.Tech in Information Technology (2006) from Punjab Technical
University, India. He has done M.Tech in computer science and Engineering from
Punjab Technical University, India. His research interests are TCP/IP, Wireless,
Networks issues, etc.

Más contenido relacionado

La actualidad más candente

Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329
Editor IJARCET
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
IJTET Journal
 
Security of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanismSecurity of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanism
Conference Papers
 
Software engineering based self-checking process for cyber security system in...
Software engineering based self-checking process for cyber security system in...Software engineering based self-checking process for cyber security system in...
Software engineering based self-checking process for cyber security system in...
IJECEIAES
 
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
IJCNCJournal
 

La actualidad más candente (18)

ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
 
Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
 
Research paper
Research paperResearch paper
Research paper
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
Ijretm 2014-sp-043
Ijretm 2014-sp-043Ijretm 2014-sp-043
Ijretm 2014-sp-043
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
A novel paradigm in authentication system
A novel paradigm in authentication systemA novel paradigm in authentication system
A novel paradigm in authentication system
 
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...
 
Security of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanismSecurity of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanism
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
A novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud securityA novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud security
 
Software engineering based self-checking process for cyber security system in...
Software engineering based self-checking process for cyber security system in...Software engineering based self-checking process for cyber security system in...
Software engineering based self-checking process for cyber security system in...
 
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation UnitMIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET -  	  Securing Communication among IoT Devices using Blockchain ProxyIRJET -  	  Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
 
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
 

Destacado

A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
ijcisjournal
 

Destacado (14)

اللباس
اللباساللباس
اللباس
 
Manajemen kelas
Manajemen kelasManajemen kelas
Manajemen kelas
 
Amazon and Twitter Launch: #AmazonCart
Amazon and Twitter Launch: #AmazonCartAmazon and Twitter Launch: #AmazonCart
Amazon and Twitter Launch: #AmazonCart
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
BLIND AND ROBUST IMAGES WATERMARKING BASED ON WAVELET AND EDGE INSERTION
BLIND AND ROBUST IMAGES WATERMARKING BASED ON WAVELET AND EDGE INSERTIONBLIND AND ROBUST IMAGES WATERMARKING BASED ON WAVELET AND EDGE INSERTION
BLIND AND ROBUST IMAGES WATERMARKING BASED ON WAVELET AND EDGE INSERTION
 
phrasel verbs
phrasel verbsphrasel verbs
phrasel verbs
 
Content Marketing: Moving From Theory To Practice
Content Marketing: Moving From Theory To PracticeContent Marketing: Moving From Theory To Practice
Content Marketing: Moving From Theory To Practice
 
Facebook and Global Pages
Facebook and Global PagesFacebook and Global Pages
Facebook and Global Pages
 
How to be an Instagram Ninja
How to be an Instagram NinjaHow to be an Instagram Ninja
How to be an Instagram Ninja
 
Top Three Trends at SXSW 2016
Top Three Trends at SXSW 2016Top Three Trends at SXSW 2016
Top Three Trends at SXSW 2016
 
ELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATION
ELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATIONELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATION
ELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATION
 
Bimbingan dan konseling
Bimbingan dan konselingBimbingan dan konseling
Bimbingan dan konseling
 
Warna warna dalam bahasa arab
Warna warna dalam bahasa arabWarna warna dalam bahasa arab
Warna warna dalam bahasa arab
 
Top Social Trends in Early 2016
Top Social Trends in Early 2016 Top Social Trends in Early 2016
Top Social Trends in Early 2016
 

Similar a An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet

Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_NetworksPaper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Zainab Nayyar
 
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsBlockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
IJCNCJournal
 
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSBLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
IJCNCJournal
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
Editor IJMTER
 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Ijcem Journal
 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Ijcem Journal
 
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
IJCNCJournal
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
Editor IJCATR
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communication
eSAT Journals
 

Similar a An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet (20)

Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_NetworksPaper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
 
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsBlockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
 
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSBLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
 
710201940
710201940710201940
710201940
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
 
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
 
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communication
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communication
 
IRJET - Security and Privacy by IDS System
IRJET -  	  Security and Privacy by IDS SystemIRJET -  	  Security and Privacy by IDS System
IRJET - Security and Privacy by IDS System
 
Security.pptx
Security.pptxSecurity.pptx
Security.pptx
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet

  • 1. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 2, June 2013 DOI:10.5121/ijcis.2013.3202 15 AN ENCRYPTION ALGORITHM TO EVALUATE PERFORMANCE OF V2V COMMUNICATION IN VANET Manpreet Kaur1 , Rajni2 and Parminder Singh3 1 Department of Electronics & Communication, Research Scholar, S.B.S.S.T.C, Ferozepur er_rimpi@rediffmail.com 2 Assistant Professor, S.B.S.S.T.C, Ferozepur rajni_c123@yahoo.co.in 3 Senior Lecturer, Chandigarh Group of Colleges, Landran Singh.parminder06@gmail.com ABSTRACT Wireless Communications are gaining more importance because they have opened new research fields by extending data networks connectivity to environments where wired solutions are difficult to install. The networks which are deployed in the areas where the needed infrastructure is not feasible to install are adhoc networks. Mobile Adhoc Networks (MANETs), in which each node acts as both data terminal and router uses wireless medium without the need of any centralized control. Vehicular Adhoc Networks (VANETs) are subset of MANETs. The successful deployment of vehicular communication requires Vehicle- to-Vehicle (V2V) & Vehicle–to-Infrastructure (V2I) communication with security to improve road safety and optimize road traffic. The technique used for secure communication in the presence of adversaries is known as cryptography. Cryptography refers to encryption in which a plaintext message is converted into a ciphertext and this can be done with private-key or public-key. In this paper, an algorithm based on private key encryption is used to make communication possible between two people with QualNet simulator. KEYWORDS Mobile Adhoc Networks (MANETs), Vehicular Adhoc Networks (VANETs), Intelligent Transport System (ITS), Security, Vehicle-to-Vehicle (V2V), Vehicle –to-Infrastructure (V2I). 1. INTRODUCTION The process in which exchange of information via some transmission media takes place is known as network. VANETs are used for V2V and V2I communication considering all the aspects required by the process of cryptography. In Safety and non-safety applications of VANET, there is a requirement of V2V & V2I communication. B.Karp in 2000 [1] discussed Greedy Perimeter Stateless Routing (GPSR) scheme in which the default packet forwarding strategy is the greedy strategy, where the sender selects the closest vehicle to the destination as the next hop. If the sender cannot find a forwarder based on the greedy strategy, it forwards the packet around the perimeter of the region containing itself and the destination. Giuseppe Ateniese in 2005 [2] presented a new re-encryption schemes that realizes a stronger notion of security and demonstrated the usefulness of proxy re-encryption as a method of adding access control to a secure file system. Maxim Raya in 2006 [3] described the security problems of the emerging vehicular networks and it outlined the solution architecture and several
  • 2. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 2, June 2013 16 of its components. Tim Leinmuller in 2006 [4] aimed to define a consistent & future-proof solution to the problem of V2V/V2I security by focusing on SEVECOM (Secure Vehicle Communication). Pandurang Kamat in 2006 [5] proposed a security framework for vehicular networks using Identity-Based Cryptography (IBC), that provides authentication, confidentiality, message integrity, non repudiation and pseudonymity. Xiaonan Liu in 2007 [6] described an Intelligent Transport System (ITS) which can be used under the security pattern to provide the appropriate solving measures in concern with the security issues of VANETs from some aspects. Department for Transport in 2008 [7] concluded that it had been seen from various studies that the number of lives lost in motor vehicle crashes worldwide every year is by far the highest among all the categories of accidental deaths. P.Caballero-Gil in 2009 [8] analyzed the features of inter-vehicle and vehicle-to-roadside communications to propose differentiated services for node authentication, according to privacy and efficiency needs. Zuowen in 2010 [9] proposed an improved privacy-preserving mutual authentication protocol for vehicle ad hoc networks by using secure identity-based group blind signature, the private encryption system and the public encryption system. Surabhi Mahajan in 2010 [10] discussed a comparison between the two schemes that are used to reduce the overhead in authentication, when roaming – proxy re-encryption scheme and new proxy re encryption scheme. Hatem Hamad in 2010 [11] proposed a new method of message security by using the coordinates in GPS (Global Positioning System) service. Sandhaya Kohli, Bandanjot Kaur in 2010 [12] discussed that vehicular adhoc networks are subclass of mobile adhoc networks which provides a distinguish approach for intelligent transport system (ITS). The survey of routing protocols in VANET is important and necessary issue for smart ITS. The proposed work discusses the advantages and disadvantages of these routing protocols. Umar Farooq Minhas in 2011 [13] described an important methodology required to enable effective V2V communication via intelligent agents. Nizar Alsharif in 2011 [14] explained that the reliability of position-based routing (PBR) in VANETs is ensured by proposing a set of plausibility checks that can mitigate the impact of PBR attacks without extra hardware requirement. 2. SECURITY CHALLENGES The necessities required to provide security in VANETs are: 1. Authentication: An authentication framework is necessary to identify and ensure that the participants are whom they claim to be to operate securely in VANETs. 2. Integrity: Integrity is required between two communicating nodes to protect data accuracy which is main security issue desirable in VANETs. 3. Confidentiality: The challenge to protect data content from the adversaries is confidentiality. 4. Non-Repudiation: Non-Repudiation refers to somebody who possesses the private key corresponding to the signing certificate with reasonable certainity but if the key is not properly safeguarded by the original owner, a major concern can be digital forgery. 5. Pseudonymity: Pseudonomity is the state of describing a disguised identity. A holder that is one or more human beings are identified but don’t disclose their true names. 6. Privacy: The protection of personal information of drivers within the network from other nodes but extracted by authorities in case of accidents is a major privacy issue which is desirable for VANETs. 7. Scalability: The ability of a network to handle growing amount of work in a capable manner securely is Scalability, which is the main challenge in VANETs.
  • 3. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 2, June 2013 17 8. Mobility: The nodes communicating in VANETs constantly change their locations with different directions and speeds making the network dynamic in nature. So, in order to make communication successful, it is challenging to establish security protocols. 9. Key-Management: The key is used to encrypt and decrypt information during communication process. When designing security protocols for networks like VANET, the issue of key management must be resolved. 10. Location-verification: This is necessary to prevent many attacks and is helpful in data validation process. Thus to improve the security of VANETs, a solid method is required to verify the nodes positions. 3. SCENARIO USED The choice of algorithm should be dictated by the purpose of the encryption when encryption is implemented. Private Key encryption is used because it is faster than public key encryption. However, private key encryption does not provide for digital signatures or the signing of information. It is also important to choose well-known and well-reviewed algorithms. Such algorithms are less likely to include back doors that may compromise the information being protected. The security policy should define acceptable encryption algorithms for use within the VANET System. The security policy should also specify the required procedures for key management. In order to successfully gain access to the information transmitted over the VANET, an attacker must capture the entire session and use a substantial amount of computer power and time to brute- force the key and decrypt the traffic. Unless the information is extremely valuable, any well- known, strong algorithm is appropriate for use in the VANET System. Figure 1. V2V Communication in VANET 4. ALGORITHM DESCRIPTION The Algorithm implemented here in VANET system in a straight road is Private Key Encryption in which i and j remain secret. Vehicles V1 and V2 are assumed so as to communicate securely and thus need to agree on an encryption key. 1. V1 and V2 agree on two large integers a and b such that 1 < a < b. 2. V1 then chooses a random number i and computes I = ai mod b. V1 sends I to V2. 3. V2 then chooses a random number j and computes J = aj mod b. V2 sends J to V1. 4. V1 computes k1 = Ji mod b. 5. V2 computes k2 = Ij mod b. 6. We have k1 = k2 = aij mod b and thus k1 and k2 are the secret keys to use for the other transmission.
  • 4. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 2, June 2013 18 5. IMPLEMENTATION TOOL The performance results have been evaluated using QualNet Simulator. QualNet is network evaluation software, which is written purely in C++ and is entirely modeled as Finite State Machine (FSM). It can run on a variety of operating systems like UNIX, Windows, MAC and Linux. It is equipped with an extensive range of libraries for simulating a variety of networks. The architecture of QualNet comprises of Application, Transport, Medium Access Control (MAC), Physical layer. A unique capability for accurate, efficient simulation of large-scale, heterogeneous networks can be provided by the features of QualNet. A robust set of wired and wireless networks can be simulated by QualNet. ITM (Irregular Terrain Model) can be supported with the QualNet. QualNet executes scenarios 5-10x times faster than commercial alternatives. 6. RESULTS AND DISCUSSIONS In this paper, the different results have been evaluated using QualNet simulator. The results shown indicate that the packet is sent between sender and receiver by using private key encryption algorithm. This means the same key is used for encryption and decryption. This leads to increase in throughput with reduce delay. Figure 2. First packet received during transmission. From the figure 2, we have measured the throughput of moving Vehicles communicating with each other via Access Point (A.P) already shown in figure 1. V1 Communicates with V2 via Access Point which leads to the calculation of the throughput of V1. From the Figure1, when the communication starts between AP and V2 then the throughput of first packet is calculated at its arrival. The first packet arrives from V1 having Node ID 1=2.8 seconds. The simulation carried from the help of QualNet Simulator and the length of Packet = 1024 Bytes. From the Figure 3, the throughput of Last Packet received by the AP from V1 (called Source Node) =100 Seconds approximately is calculated. After the Packet is received, the Vehicle Node sends the termination signal to do end of communication between two Vehicles with the Base Station (AP) Node.
  • 5. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 2, June 2013 19 Figure 3. Last packet received during transmission. Figure 4. Throughput observed during transmission (with private key). The figure 4 represents the Throughput of Two Nodes with AP by applying Security Algorithm and also calculates the speed at which the two vehicles move when sharing the data. The speed at which the Vehicles move was 60m/s with a packet size of 1024 Bytes and approximately calculated value was 4200bits/s.
  • 6. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 2, June 2013 20 Figure 5. Average End-to-End Delay during transmission (with private key). The average end-to-end delay in a VANET means that the source node (V1) sends packet to destination Node (V2) and total average time to reach the packet to destination Node. In this Figure 5 the total average time was 0.007 seconds approximately. This delay was due to retransmission and applying security Algorithm at 802.11 networks. Figure 6. Signals transmitted between node to node. The signal transmission in between node to node or vehicle to vehicle has been shown in the Figure 6.This has been shown that each node sends packet to the other node and the sequence number updates. This way the vehicles communicate at the transport layer when the transmission starts between both ends.
  • 7. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 2, June 2013 21 7. CONCLUSION Security measures guarantees that the transmissions of data are authentic that is data is accessible only by authorized parties. The security techniques can be applied to vehicular users in Vehicular Adhoc Networks. The algorithm used in the paper is private key encryption in which sender and receiver communicate securely with the help of encryption key. The algorithm reduces delay, increases throughput, provides authentication and higher security level in VANETs. 8. FUTURE WORK The solution of the security problems is discussed (by the use of algorithm) that are encountered in VANET. The performances of data transmission in VANETs can be tested by applying more encryption algorithms to provide more security with increased throughput and reduced delay. REFERENCES [1] Karp B, Kung H T (2000) GPRS: Greedy Perimeter Stateless Routing for wireless networks. Proc 6th Annual Int Conf on Mob Computing and Netw: 243-254. [2] Ateniese G, Fu K, Green M, Hohenberger S (2005) Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. Proc of the 12th Annual Netw and Distributed Syst Security Symp: 29-44. [3] Raya M, Papadimitratos P, Hubaux J P (2006) Securing Vehicular Networks. J IEEE wirel commun. [4] Leinmuller T, Buttyan L et al (2006) SEVECOM-Secure Vehicle Communication. Proc of IST Mob Summit. [5] Kamat P, Baliga A, Trappe W (2006) An Identity-Based Security Framework for VANETs. Proc of the 3rd Int workshop on Vehicular adhoc netw: 94-95. [6] Liu X, Fang Z, Shi L (2007) Securing Vehicular Ad Hoc netw.IEEE. [7] Department for Transport (2008) Reported road casualties Great Britain: 2008 Annual Report. Road Casualties G. B. UK. [8] Caballero-Gil P, Hernandez-Goya C, Fuster-Sabater A (2009) Differentiated Services to Provide Efficient Node Authentication in VANETs. [9] Zuowen, Tan (2010) A Privacy-Preserving Mutual Authentication Protocol for Vehicle Ad Hoc Networks. J of Convergence Inf Technology. [10] Mahajan S, Jindal A (2010) Security and Privacy in VANET to reduce Authentiation Overhead for Rapid Roaming Networks.Int J of Comput Applications. [11] Hamad H, Elkourd S (2010) Data Encryption using the dynamic location and speed of mobile node. J Media and Commun Stud: 067-075. [12] Sandhaya, Bandanjot ", A comparative Study of Routing Protocols in VANET", ISCET 10, pp.173 [13] Minhas U F et al (2011) A Multifaceted Approach to Modeling Agent Trust for Effective Communication in the Application of Mobile Ad Hoc Vehicular Networks. IEEE:407-20. [14] Alsharif N, Wasef, Shen X (2011) Mitigating the effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks. IEEE ICC Proc.
  • 8. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 2, June 2013 22 AUTHORS MANPREET KAUR is B.Tech in Electronics & Communication Engineering (2009) from AIET, India. She is pursuing M.Tech in Electronics & Communication Engineering from SBSSTC, India. Her research interests are Wireless, Networks, Adhoc Networks, etc. Ms. Rajni is currently Assistant Professor at SBSSTC, Punjab, India. She has completed her M.E. from NITTTR, Chandigarh, India, B.Tech from NIT, Kurukshetra, India. Ms. Rajni has about fourteen years of academic experience. She has authored a number of research papers in national, international conferences and reputed journals. Her areas of interest includes Wireless communication, and Antenna design . Parminder Singh is B.Tech in Information Technology (2006) from Punjab Technical University, India. He has done M.Tech in computer science and Engineering from Punjab Technical University, India. His research interests are TCP/IP, Wireless, Networks issues, etc.