INVENTION OF GAMMA PROTOCOL FOR VANET USING MODULAR ARITHMETIC TECHNIQUES
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
M. Raya and J. P. Hubaux, “Securing Vehicular ad hoc networks ,†J. Compute. Security, vol. 15, no. 1, pp. 39-68, 2007.
Yaseer Toor et al., “Vehicle Ad Hoc Networks:Applications and Related Technical Issuesâ€, IEEE Communictions Surveys & Tutorials, 3rd quarter 2008, vol. 10, no. 3, pp.74-78.
Maxim Raya et al., “The Security of Vehicular Ad Hoc Networks,†SASN’05, Nov 7 20005, Alaxandria, Verginia, USA, pp. 11-21.
Dedicated Short Range Communications (DSRC) [Online]. Available: http://grouper.ieee.org/groups/scc32/dsrc/index.html.
J. P. Hubaux, S. Capkun, and J.Leo, “The security and privacy of smart vehicles,†IEEE Security Privacy Mag., vol. 2, no. 3, pp. 49-55, May-Jun. 2004.
M. Nekovee and B. B. Bogason, “Reliable and efficient information dissemination in intermittently connected vehicular ad hoc networks,†in Proc. IEEE Vehicular Technol. Conf., Apr. 2007, pp. 2486-2490.
C. Zhang, X. Lin, R. Lu and P.-H. Ho, “RAISE: An effiient RSU—aided message authentication scheme in vehicular communication networks,†in Proc. IEEE Int. Conf. Commun., May 2008, pp. 1451-1457.
Jose Maria de Fuentes, Ana Isabel Gonzalez-Tables, and Arturo Ribagorda , “An Overview of Security issues in Vehicular Ad Hoc Networks,†Handbook of Research on Mobility and Computing, 2010.
Mousafa. H, Zhang. Y, “Vehicular Networks:Techniques, Standards, and Applications,†CRC Press, (2009).
Dahill, B. N. Levine, E. Royer and Clay Shields, “A Secure Routing protocol for Ad Hoc Networks,†Proceedings of IEEE ICNP 2002, pp. 78-87, Nov. 2002.
P. Papaadministrators and Z. J Haas, “Secure Data Transmission in Mobile Ad Hoc Networks,†ACM Workshop on Wireless Security, San Diago, CA, September 2003.
J. Zhao, Y. Zhang, and G. Cao, “Data pouring and buffering o the road: A new data dissemination paradigm in vehicular ad hoc networks,†IEEE Trans. Vehicular Technol. Vol. 56, no. 6, pp. 3266-3277, Nov. 2007.
Kevin Fall, Kannan Vardhan, “The ns manual,†The VINT project, December 2008.
Brent Welch, “Practical programming in TCL and Tk,†Prentice Hall, May 1994.
Vehicle Safety Communications Project, Final Report, DOT HS 810 591, April 2006.
www.roadtraffic-technology.com
G.Gowtham , E.Samlinson, â€A Secured Trust Creation in VANET Environment Using Random Password Generator,†International Conference on Computing, Electronics and Electrical Technologies [ICCEET]. PP:781-784, 2012.
www.researchgate.net
Shyr-Long Jeng, Wei-Hua Chieng, and Hsiang-Pin Lu, “Estimating Speed Using a Side-Looking Single-Radar Vehicle Detector,†IEEE transactions on intelligent transportation systems, volume 15, No. 2, (2014).
H. Zhu, R. Lu, X. Shen, and X. Lin, “Security in service-oriented vehicular networks,†IEEE Wireless Commun. Vol. 16, no. 4, pp. 16-22, Aug.2009.
http://www.isi.edu/nanam/ns/tutorial/index.html
Menezes, S. Vnstone, and D. Hankerson, “Guide to elliptic curve cryptography,†Spinger Professional Computing (Springer, New York 2004)
Sirwan A Mohammad and Dr. Sattar, “Design of wireless network based on ns2,†Journal of Global Research in Computr Science, vol. 3, no. 12, pp. 1-8, (2012)