Secure Clustering in Vehicular Ad Hoc Networks
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 9
Abstract
A vehicular Ad-hoc network is composed of moving cars as nodes without any infrastructure. Nodes self-organize to form a network over radio links. Security issues are commonly observed in vehicular ad hoc networks; like authentication and authorization issues. Secure Clustering plays a significant role in VANETs. In recent years, various secure clustering techniques with distinguishing feature have been newly proposed. In order to provide a comprehensive understanding of these techniques are designed for VANETs and pave the way for the further research, a survey of the secure clustering techniques is discussed in detail in this paper. Qualitatively, as a result of highlighting various techniques of secure clustering certain conclusions are drawn which will enhance the availability and security of vehicular ad hoc networks. Nodes present in the clusters will work more efficiently and the message passing within the nodes will also get more authenticated from the cluster heads.
Authors and Affiliations
Zainab Nayyar, Dr. Muazzam Khattak, Dr. Nazar Saqib, Nazish Rafique
Object Contour in Low Quality Medical Images in Curvelet Domain
The diagnosis and treatment are very important for extending the life of patients. The small abnormalities may also be manifestations of the diseases. One of the abnormalities is the contour of each object in medical ima...
Coordinated Resource Management Models in Hierarchical Systems
In response to the trend of efficient global economy, constructing a global logistic model has garnered much attention from the industry .Location selection is an important issue for those international companies that ar...
Studying Applicability Feasibility of OFDM in Upcoming 5G Network
Orthogonal frequency-division multiplexing (OFDM) is one of unbeatable multiplexing technique till date. However with increasing version of next generation mobile standards like 5G, the applicability of OFDM is quite que...
Similarity Calculation Method of Chinese Short Text Based on Semantic Feature Space
In order to improve the accuracy of short text similarity calculation, this paper presents the idea that use the history of short text messages to construct semantic feature space, then use the vector in semantic feature...
E2-Invisible Watermarking for Protecting Intellectual Rights of Medical Images and Records
In today’s digital era, practice of telemedicine has become common which involves the transmission of medical images and Myhealthrecord (MHR) for higher diagnosis in case of emergency and maintaining integrity, robustnes...