Performance Evaluation of V2VCommunication by Implementing Security Algorithm in VANET

  • Manpreet Kaur
  • Rajni
  • Parminder Singh
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 176)


Adhoc networks are the networks, deployed in the areas where the needed infrastructure is not feasible to install. Mobile Adhoc Networks (MANETs) use wireless medium in which each node acts as both data terminal and router without the need of any centralized control. Vehicular Adhoc Networks (VANETs) are subset of MANETs. The successful deployment of vehicular communication requires Vehicle-to-Vehicle (V2V) & Vehicle–to-Infrastructure (V2I) communication with security which requires confidentiality, integrity, availability and authenticity to improve road safety and optimize road traffic. The technique used for secure communication in the presence of unauthorized parties (adversaries) is known as cryptography. Cryptography refers to encryption in which a plaintext message is converted into a ciphertext. Encryption can be done with private-key or public-key. In this paper, an algorithm based on private key encryption is used to make communication possible between two people with QualNet simulator.


Mobile Adhoc Networks (MANETs) Vehicular Adhoc Networks (VANETs) Intelligent Transport System (ITS) Security Vehicle-to-Vehicle (V2V) Vehicle –to-Infrastructure (V2I) 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Karp, B., Kung, H.T.: GPRS: Greedy Perimeter Stateless Routing for wireless networks. In: Proc. 6th Annual Int. Conf. on Mob. Computing and Netw., pp. 243–254 (2000)Google Scholar
  2. 2.
    Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. In: Proc. of the 12th Annual Netw. and Distributed Syst. Security Symp., pp. 29–44 (2005)Google Scholar
  3. 3.
    Raya, M., Papadimitratos, P., Hubaux, J.P.: Securing Vehicular Networks. J. IEEE Wirel. Commun. (2006)Google Scholar
  4. 4.
    Leinmuller, T., Buttyan, L., et al.: SEVECOM-Secure Vehicle Communication. In: Proc of IST Mob. Summit (2006)Google Scholar
  5. 5.
    Kamat, P., Baliga, A., Trappe, W.: An Identity-Based Security Framework for VANETs. In: Proc of the 3rd Int. Workshop on Vehicular Adhoc Netw., pp. 94–95 (2006)Google Scholar
  6. 6.
    Liu, X., Fang, Z., Shi, L.: Securing Vehicular Ad Hoc netw. IEEE (2007)Google Scholar
  7. 7.
    Department for Transport, Reported road casualties Great Britain: 2008 Annual Report. Road Casualties G. B. UK (2008)Google Scholar
  8. 8.
    Caballero-Gil, P., Hernandez-Goya, C., Fuster-Sabater, A.: Differentiated Services to Provide Efficient Node Authentication in VANETs (2009)Google Scholar
  9. 9.
    Zuowen, T.: A Privacy-Preserving Mutual Authentication Protocol for Vehicle Ad Hoc Networks. J. of Convergence Inf. Technology (2010)Google Scholar
  10. 10.
    Mahajan, S., Jindal, A.: Security and Privacy in VANET to reduce Authentication Overhead for Rapid Roaming Networks. Int. J. of Comput. Applications (2010)Google Scholar
  11. 11.
    Hamad, H., Elkourd, S.: Data Encryption using the dynamic location and speed of mobile node. J. Media and Commun. Stud., pp. 067-075 (2010)Google Scholar
  12. 12.
    Minhas, U.F., et al.: A Multifaceted Approach to Modeling Agent Trust for Effective Communication in the Application of Mobile Ad Hoc Vehicular Networks, pp. 407–420. IEEE (2011)Google Scholar
  13. 13.
    Wasef, A.N., Shen, X.: Mitigating the effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks. In: IEEE ICC Proc. (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.SBSCETFerozepurIndia
  2. 2.CGCLandranIndia

Personalised recommendations