Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{145037, author = {K Phani Srinivas and Dr.K.Sai Manoj and Mrudula Kudaravalli}, title = {Literature survey on the DESTRUCTION OF ATTACKS WITH MH HOP to HOP-AODV ROUTING PROTOCOL IN VEHICULAR AD-HOC NETWORK}, journal = {International Journal of Innovative Research in Technology}, year = {}, volume = {4}, number = {7}, pages = {81-83}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=145037}, abstract = {This paper proposed an Identity based Batch Verification (IBV) scheme for the purpose of securing the vehicular nodes from attacks. This scheme consists of three major phases they are system initialization, anonymous identity generation, and message signing and message authentication. In the first system initialization phase the trusted authority computes private key and public key. Then it chooses two hash functions and assigns a real identity and password for each vehicle. In second phase the unique real identity is verified. After completion of this verification it generates an anonymous identity which contains two parts. Next, third phase involves with single verification of one message and Batch verification of multiple messages.}, keywords = {AODV, Ad-hoc network, multi hop}, month = {}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry