A Novel Work for Improving Security and Challenges using Fuzzy Logic Approach in VANETS
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 4
Abstract
Vehicular AdHoc networks are the most emerging technologies in now-a-days. VANETs have many challenges like security and time latency when users are travelling in the roadways. There are many techniques available to overcome this kind of problems. One of the efficient methods is Prediction Based Authentication (PBA), in this scheme vehicle users must generate keys using symmetric cryptography for transmitting the information from one vehicle to another vehicle, Sometimes the generated keys are mismatched or hacked by the users due to key replication. In symmetric cryptography the sender and receiver share the common key for data transmission the security of the network and data are not protected. It will lead to malicious attack, resource cannot be efficiently used, and authentication based on signature will be mismatch. In order to achieve authentication, integrity and improve the validity of the network we proposed a localization algorithm based on fuzzy set. In this approach we use binary values that lie in the range between 0 to1. Due to this location of the vehicles can be traced easily by dividing the location into zones using localization algorithm. Fuzzy set using two parameters of vehicles namely speed and distance by using best hops node selection from the current forwarding node. The requirements of security like authentication of messages, privacy and tracing of location can be improved.
Authors and Affiliations
B. Gopinath, B. Purushothaman
A Study on Knowledge Management with the Employees SIPCOT & SIDCO Phase II Entrepreneur Finished Leather Effluent Treatment Company (P) Ltd
Knowledge Management is the establishment of a system that captures knowledge purposefully forin corporating into business strategies, policies, and practices at all levels of the company. This course will teach the lea...
Seismic Performance of Different Types of Infills – A Review
Masonry infilled RC frame buildings are commonly constructed for commercial, residential and industrial buildings in seismic regions. The main aim of these papers investigates the seismic performance of different types...
RDBMS on Digital Watermarking Technology
Digital watermarking technology is the technology that is often used in the field of digital multimedia copyright protection. It has also been gradually applied in the ownership management of relational database in orde...
Energy Meter Power Theft Detection in Distribution System
Currently, we are seeing that in distribution system the technologies are improving and advancing day by day. Due to increase in the demand the consumption of energy also increases .As we know that the generated electri...
Analysis of Compressive Strength of Concrete Partially Using Stone Dust
In the presented Research, a fraction of fine aggregate used in concrete is replaced by stone dust, a by-product of stone crushing and the sample cube is tested to determine the compressive strength of concrete. Tests t...