Secured Time Stable Geocast (S-TSG) Routing for VANETs

  • Durga Prasada Dora
  • Sushil Kumar
  • Omprakash Kaiwartya
  • Shiv Prakash
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 44)


Enhancement of safety and security on road, and reduction in traffic congestion is the theme of Intelligent Transportation System (ITS). Vehicular Ad hoc Network as an integral part of ITS protects from Denial of Service attack and maintain Security Associations (SA) due to decentralized, open, dynamic, limited bandwidth and control overhead. Dynamic Time Stable Geocast (DTSG) routing protocol unable to protect from attacks of the intruder. Data authentication, Data integrity and non-repudiation are some security features which need to be taken into account for making geocast protocol robust and critically secured. This paper proposes algorithms for achieving the above mentioned goal of securing time stable geocast routing protocol in vehicular traffic environment. The proposed protocol is simulated in Network Simulator (ns2) and the results are compared with DTSG. The comparative analysis of results reveals the usefulness of the proposed protocol under security attack.


Geocast routing Security attack Vehicular ad hoc networks 


  1. 1.
    Li, F., Wang, Y.: Routing in vehicular Ad Hoc networks: a survey. IEEE Veh. Technol. Mag. 2, 12–22 (2007)Google Scholar
  2. 2.
    Abdalla, G.M.T., Abu-Rgheff, M.A., Senouci, S.M.: Current trends in vehicular ad-hoc networks. In: IEEE Global Information Infrastructure Symposium, Morocco (2007)Google Scholar
  3. 3.
    Maihöfer, C., Leinmüller, T., Schoch, E.: Abiding geocast: time–stable geocast for ad hoc networks. In: Proceedings of the 2nd ACM International Workshop on Vehicular Ad Hoc Networks. Cologne, Germany, 02 Sept 2005Google Scholar
  4. 4.
    Mahofer, C., Eberhard, R.: Geocast in vehicular environment: caching and transmission range control for improved efficiency. In: IEEE Intelligent Vehicles Symposium (2004)Google Scholar
  5. 5.
    Rahbar, H., Naik, K., Nayak, A.: DTSG: dynamic time stable geocast routing in vehicular ad hoc networks. In: 2010 The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), pp. 1–7, 23–25 June 2010Google Scholar
  6. 6.
    Chaurasia, B.K., Verma, S.: Infrastructure based Authentication Scheme for VANETs. Int. J. Multimedia Ubiquitous Eng. 6(2), 41–53 (2011)Google Scholar
  7. 7.
    Raya, M., Hubaux, J.P.: The security of vehicular ad hoc networks. In: Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks (2005)Google Scholar
  8. 8.
    Syamsuddin, I., A survey of RFID authentication protocols based on hash chain method. In: Proceedings of Third International Conference on Convergence and Hybrid Information Technology (2008)Google Scholar
  9. 9.
    Ma, D., Tsudik, G.: Security and privacy in emerging wireless networks. IEEE Wirel. Commun. 17(5), 12–21 (2010)CrossRefGoogle Scholar

Copyright information

© Springer India 2016

Authors and Affiliations

  • Durga Prasada Dora
    • 1
  • Sushil Kumar
    • 1
  • Omprakash Kaiwartya
    • 1
  • Shiv Prakash
    • 2
  1. 1.Wireless Communication and Networking Research LabSchool of Computer and Systems Sciences, Jawaharlal Nehru UniversityNew DelhiIndia
  2. 2.Department of Chemical EngineeringIndian Institute of TechnologyNew DelhiIndia

Personalised recommendations