Literature survey on the DESTRUCTION OF ATTACKS WITH MH HOP to HOP-AODV ROUTING PROTOCOL IN VEHICULAR AD-HOC NETWORK

  • Unique Paper ID: 145037
  • Volume: 4
  • Issue: 7
  • PageNo: 81-83
  • Abstract:
  • This paper proposed an Identity based Batch Verification (IBV) scheme for the purpose of securing the vehicular nodes from attacks. This scheme consists of three major phases they are system initialization, anonymous identity generation, and message signing and message authentication. In the first system initialization phase the trusted authority computes private key and public key. Then it chooses two hash functions and assigns a real identity and password for each vehicle. In second phase the unique real identity is verified. After completion of this verification it generates an anonymous identity which contains two parts. Next, third phase involves with single verification of one message and Batch verification of multiple messages.

Related Articles