Apply Different Techniques to Face Vehicular Ad-Hoc Network Challenges for Making Secure Systems
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2012, Vol 12, Issue 0
Abstract
In this paper, the concept of VANET is discussed in detail. The different concepts used in VANET are explained with very good style. The applications of VANET are also discussed here. In the near future, most new vehicles will be equipped with short range radios capable of communicating with other vehicles or with highway infrastructure at distances of at least one kilometer. The radios will allow new applications that will revolutionize the driving experience, providing everything from instant, localized traffic updates to warning signals when the car ahead abruptly brakes. While resembling traditional sensor and ad hoc networks in some respects, vehicular networks pose a number of unique challenges. The different challenges of VANET are explained and explained in detail in this paper.
Authors and Affiliations
Parveen Kumar
A Novel Security Approach in Mobile Agent Using Encryption
The appearance of software agents has given rise too much discussion of what such an agent is and how it differs from programs in general. An agent is anything that can be viewed as perceiving its environment through sen...
Securing Route Discovery in MANETs: Analysis and Improvement
In this paper, we show that the security proof for the route discovery algorithm end air A is flawed, and moreover, this algorithm is vulnerable to a hidden channel attack. We also analyze the security framework that was...
STRENGTH DETERMINATION OF ALUMINIUM AT DIFFERENT TEMPRATURES
The necking of specimen is specifically related to the decrease in cross section when specimen is subjected to tensile strength greater than ultimate tensile strength (UTS). The strain distribution no longer hold uniform...
REVIEW OF ARTIFICIAL IMMUNE SYSTEM TO ENHANCE SECURITY IN MOBILE AD-HOC SYSTEMS
Mobile Ad-hoc Networks consist of wireless host that communicate with each other. The routes in a Mobile Ad-hoc Network may consist of many hops through other hosts between source and destination. The hosts are not...
Criticality Analysis of GTPPS
The paper is concerned with the study of criticality analysis of components of Gas Turbine Power Plant Systems (GTPPS) and the failures occurring in the plant. Failure mode and effect and criticality analysis (FMECA) is...