V2V-DDS Approach to Provide Sheltered Communication Over ALTERATION ATTACK to Control Against Vehicular Traffic

  • P. Prittopaul
  • M. Usha
  • M. V. S. Santhosh
  • R. Sharath
  • E. Kughan
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 9)


The objective of this paper is to focus on secure communication over VANET which is a more questioning issue nowadays. Vehicular adhoc networks mainly focus on road safety which is used to provide a way to prevent road accidents, to pass information about road traffic etc. In vehicular to Infrastructure (V2I) scenario, an RSU unit is used to provide security by giving certification in order to identify authorized users and also uses digital signature approach to provide confidentiality and authentication for secure communication. But in case of vehicular to vehicular (V2V) scenario, no such security is provided between the communicating parties and so there might arise a situation in which the nodes act maliciously over other nodes.


Vehicular-to-vehicular Vanet Digital signature Authentication Malicious node 


  1. 1.
    Ghassan S, Al-Salihy WAH, Sures R (2010) Security analysis of vehicular ad hoc networks (VANET). In: 2010 second international conference on network applications, protocols and services, national advanced IPv6 center. Universiti Sains Malaysia Penang, MalaysiaGoogle Scholar
  2. 2.
    Raya M, Papadimitratos P, Hubaux JP (2006) Securing vehicular communications. IEEE Wirel Commun 13Google Scholar
  3. 3.
    Parno B, Perrig A (2005) Challenges in securing vehicular networks. In: Proceedings of HotNets-IVGoogle Scholar
  4. 4.
    Aad I, Hubaux JP, Knightly EW (2008) Impact of denial of service attacks on ad hoc networks. IEEE/ACM Trans Network 16Google Scholar
  5. 5.
    Raya M, Pierre Hubaux J (2005) The security of VANETs. In: Proceedings of the 2nd ACM international workshop on vehicular adhoc networksGoogle Scholar
  6. 6.
    Security & Privacy for DSRC-based Automotive Collision Reporting (2010) In: Second international conference on network applications, protocols and servicesGoogle Scholar
  7. 7.
    Douceur J (2003) The Sybil attack. In: First international workshop on peer-to-peer systems, 1st edn. Springer, USAGoogle Scholar
  8. 8.
    Corson S, Batsell S, Macker J (1996) Architectural considerations for mobile mesh networking (Internet draft RFC, version 2). In: Mobile ad-hoc network (MANET) working group, IETFGoogle Scholar
  9. 9.
    Ramanathan S, Steenstrup M (1996) A survey of routing techniques for mobile communication networks. Mobile Netw Appl 89–104Google Scholar
  10. 10.
    Ko Y-B, Vaidya NH (1997) Using location information to improver outing in ad hoc networks. Technical report 97–013, Texas A&M UniversityGoogle Scholar
  11. 11.
    Ko Y-B, Vaidya NH (1998) Location-aided routing in mobile ad hoc networks. Technical report 98-012, Texas A&M UniversityGoogle Scholar
  12. 12.
    Ko Y-B, Vaidya NH (1998) Location-aided routing (LAR) in mobile ad hoc networks. In: Proceedings of MOBICOM’98 (1998)Google Scholar
  13. 13.
    Dommety G, Jain R (1996) Potential networking applications of global positioning systems (GPS). Technical report TR-24, The Ohio State UniversityGoogle Scholar
  14. 14.
    Parkinson BW, Gilbert SW (1983) NAVSTAR: global positioning system—ten years later. Proc IEEE 71(10):1177–1186CrossRefGoogle Scholar
  15. 15.
    Ko Y-B, Vaidya NH (2000) Location-aided routing (LAR) in mobile ad hoc networks in wireless networks vol 6, pp 307–321Google Scholar
  16. 16.
    Golle P, Greene D, Staddon J (2004) Detecting and correcting malicious data in vanets. In: VANET’04: proceedings of the 1st ACM international workshop on vehicular ad hoc networks. ACM, New York, NY, USA, pp 29–37Google Scholar
  17. 17.
    IEEE, IEEE 1609.2-Standard for Wireless Access in Vehicular Environments (WAVE)—Security Services for Applications and Management Messages, available from ITS Standards ProgramGoogle Scholar
  18. 18.
    Djenouri D, Khelladi L (2005) A survey of security issues in mobile ad hoc and sensor networks. IEEE Commun Surv Tutor 7(4):2–28CrossRefGoogle Scholar
  19. 19.
    Stallings W (2003) Cryptography and network security, principles and practices, 3rd edn. Prentice Hall, pp 67–68 and 317–375Google Scholar
  20. 20.
    Forouzan BA (2008) Cryptography and network security. McGraw Hill, BostonGoogle Scholar
  21. 21.
    Kaur P, Arora N (2015) A comprehensive study of cryptography and digital signature. Int J Comput Sci Eng Technol (IJCSET)Google Scholar
  22. 22.
    Shiva Rama Krishna D (2015) Providing security to confidential information using digital signature. Int J Adv Res Comput Sci Manag StudGoogle Scholar
  23. 23.
    Rehman S, Arif Khan M, Zia TA, Zheng L (2013) Vehicular ad-hoc networks (VANETs): an overview and challenges. J Wirel Network CommunGoogle Scholar
  24. 24.
    Zeadally S, Hunt R, Chen Y-S, Irwin A, Hassan A (2010) Vehicular ad hoc networks (VANETS): status, results and challenges. Springer Science + Business Media, LLCGoogle Scholar
  25. 25.
    Agrawal A, Garg A, Chaudhiri N, Gupta S, Pandey D, Roy T (2013) Security on vehicular ad hoc networks (VANET): a review paper. Int J Emerg Technol Adv EngGoogle Scholar
  26. 26.
    Husain A, Kumar B, Doegar A (2010) A study of location aided routing (LAR) protocol for vehicular adhoc networks in highway scenario. Int J Eng Inform Technol (IJEIT)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • P. Prittopaul
    • 1
  • M. Usha
    • 1
  • M. V. S. Santhosh
    • 1
  • R. Sharath
    • 1
  • E. Kughan
    • 1
  1. 1.Velammal Engineering CollegeChennaiIndia

Personalised recommendations