Literature survey on the DESTRUCTION OF ATTACKS WITH MH HOP to HOP-AODV ROUTING PROTOCOL IN VEHICULAR AD-HOC NETWORK
Author(s):
K Phani Srinivas, Dr.K.Sai Manoj, Mrudula Kudaravalli
Keywords:
AODV, Ad-hoc network, multi hop
Abstract
This paper proposed an Identity based Batch Verification (IBV) scheme for the purpose of securing the vehicular nodes from attacks. This scheme consists of three major phases they are system initialization, anonymous identity generation, and message signing and message authentication. In the first system initialization phase the trusted authority computes private key and public key. Then it chooses two hash functions and assigns a real identity and password for each vehicle. In second phase the unique real identity is verified. After completion of this verification it generates an anonymous identity which contains two parts. Next, third phase involves with single verification of one message and Batch verification of multiple messages.
Article Details
Unique Paper ID: 145037
Publication Volume & Issue: Volume 4, Issue 7
Page(s): 81 - 83
Article Preview & Download
Share This Article
Conference Alert
NCSST-2021
AICTE Sponsored National Conference on Smart Systems and Technologies
Last Date: 25th November 2021
SWEC- Management
LATEST INNOVATION’S AND FUTURE TRENDS IN MANAGEMENT