Skip to main content

EPSMS-ORR: Ensure Privacy and Security of Message Dissemination Scheme Using Symmetric Key and Overhead Reduced Routing in VANET

  • Conference paper
  • First Online:
Proceedings of International Conference on Communication and Computational Technologies (ICCCT 2023)

Abstract

Vehicular ad hoc network is a new development wireless communication. Vehicular ad hoc networks have produced the idea of the Internet of Vehicles (IoV) (VANETs). VANETs play role in Intelligent Transportation Systems (ITS). Message authentications between vehicles and roadside units are essential for VANET security. The security of VANETs depends on the message authentications between car and roadside equipment. Before dissemination of messages in the network, that could be trusted, it needed to be signed and authenticated with cluster head (CH) to reduce the overhead of RSUs. The EPSMS-ORR model’s experimental outcome analysis is tested and compared to existing models. The simulation results highlighted the EASMS-OR to improve the quality of service over previous models.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Jothy MKA, Murugesan D (2016) An enhanced self-scheduled access control in vehicular ad hoc networks (VANET). In: International conference on information communication and embedded systems (ICICES). Chennai, pp 1–5

    Google Scholar 

  2. Avcil MN, Gurle MC, Soyturk M (2016) Collision resolution MAC algorithm for vehicular Ad Hoc networks. In: IEEE 21st international workshop on computer aided modelling and design of communication links and networks (CAMAD). Toronto, pp 248–253

    Google Scholar 

  3. Balador A, Böhm A, Calafate CT, Cano J (2016) A reliable token-based MAC protocol for V2V communication in urban VANET. In: IEEE 27th annual international symposium on personal, indoor, and mobile radio communications (PIMRC). Valencia, pp 1–6

    Google Scholar 

  4. Barkouk H, En-Naimi EM (2016) Development of an alert message dissemination protocol based on LEACH protocol to improve VANET road safety. In: 4th IEEE international colloquium on information science and technology (CiSt). Tangier, pp 923–928

    Google Scholar 

  5. Cao Y, Wang N (2017) Toward efficient electric-vehicle charging using VANET-based information dissemination. IEEE Trans Veh Technol 66(4):2886–2901

    Google Scholar 

  6. Chen Y, Fang M, Shi S, Guo W (2015) Distributed multi-hop clustering algorithm for VANETs based on neighborhood follow. EURASIP J Wirel Commun Netw. https://doi.org/10.1186/s13638-015-03270

    Article  Google Scholar 

  7. Shetty A (2015) A review on asymmetric cryptography—RSA and ElGamal algorithm. Int J Innov Res Comput Commun Eng 2(5):98–105

    Google Scholar 

  8. Tripathi R, Sanjay A (2014) Comparative study of symmetric and asymmetric cryptography techniques: comparative study of symmetric and asymmetric cryptography techniques. Int J Adv Foundation Res Comput 1(6):68–76

    Google Scholar 

  9. Mittal M (2012) Performance evaluation of cryptographic algorithms. Int J Comput Appl 41(7):1–6

    Google Scholar 

  10. Kumar Y (2011) Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures. Int J Comput Sci Manage Stud 11(03):60–63

    Google Scholar 

  11. Thambiraja E (2012) A survey on various most common encryption techniques. Int J Adv Res Comput Sci Softw Eng 2(7):226–233

    Google Scholar 

  12. Alanazi H (2010) New comparative study between DES, 3DES and AES within nine factors. J Comput 2(3):152–157

    Google Scholar 

  13. Marwaha M (2013) Comparative analysis of cryptographic algorithms. Int J Adv Eng Technol 16–18

    Google Scholar 

  14. Tony MD (2009) A brief history of cryptography. Inquiries J 1(11)

    Google Scholar 

  15. Dooley JF (2018) History of cryptography and cryptanalysis. Springer

    Google Scholar 

  16. Fekair MEA, Lakas A, Korichi A (2016) An efficient QoS-compliant routing scheme for VANET. In: 5th international conference on electronic devices, systems and applications (ICEDSA). Ras Al Khaimah, pp 1–4

    Google Scholar 

  17. Gandhi M, Khan MA (2014) Performance analysis of metrics of broadcasting protocols in VANET. In: Innovative applications of computational intelligence on power, energy and controls with their impact on humanity (CIPECH). Ghaziabad, pp 315–321

    Google Scholar 

  18. Guo C, Li D, Zhang G, Cui Z (2016) Data delivery delay reduction for VANETs on bidirectional roadway. IEEE Access 1–1. https://doi.org/10.1109/ACCESS.2016.2640193

  19. Hafeez KA, Anpalagan A, Zhao L (2016) Optimizing the control channel interval of the DSRC for vehicular safety applications. IEEE Trans Veh Technol 65(5):3377–3388

    Article  Google Scholar 

  20. Hassan A, Ahmed MH, Rahman MA (2011) Performance evaluation for multicast transmissions in VANET. In: 24th Canadian conference on electrical and computer engineering (CCECE). Niagara Falls, ON, pp 001105–0011089

    Google Scholar 

  21. Hubballi P, Sutagundar AV, Belagali R (2016) Agent based dynamic clustering for hybrid VANET (ADCHV). In: EEE international conference on recent trends in electronics, information & communication technology (RTEICT), Bangalore, pp 382–386

    Google Scholar 

  22. Wang Z, Xu Y (2022) Edge intelligence for 6G-enabled industrial internet of things. 2022 Article ID 5031112. https://doi.org/10.1155/2022/5031112

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Karthikeyini .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Karthikeyini, S., Rupa, M., Athira, S., Ravikumar, M. (2023). EPSMS-ORR: Ensure Privacy and Security of Message Dissemination Scheme Using Symmetric Key and Overhead Reduced Routing in VANET. In: Kumar, S., Hiranwal, S., Purohit, S., Prasad, M. (eds) Proceedings of International Conference on Communication and Computational Technologies. ICCCT 2023. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-99-3485-0_3

Download citation

Publish with us

Policies and ethics