Literature survey on the DESTRUCTION OF ATTACKS WITH MH HOP to HOP-AODV ROUTING PROTOCOL IN VEHICULAR AD-HOC NETWORK
Author(s):
K Phani Srinivas, Dr.K.Sai Manoj, Mrudula Kudaravalli
Keywords:
AODV, Ad-hoc network, multi hop
Abstract
This paper proposed an Identity based Batch Verification (IBV) scheme for the purpose of securing the vehicular nodes from attacks. This scheme consists of three major phases they are system initialization, anonymous identity generation, and message signing and message authentication. In the first system initialization phase the trusted authority computes private key and public key. Then it chooses two hash functions and assigns a real identity and password for each vehicle. In second phase the unique real identity is verified. After completion of this verification it generates an anonymous identity which contains two parts. Next, third phase involves with single verification of one message and Batch verification of multiple messages.
Article Details
Unique Paper ID: 145037

Publication Volume & Issue: Volume 4, Issue 7

Page(s): 81 - 83
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews