Impact Factor:6.549
 Scopus Suggested Journal: UNDER REVIEW for TITLE INCLUSSION

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary


Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

Advance EMAP for Vehicular Ad Hoc Networks

Pocha Nageswara Reddy , I.S.Raghuram, Dr.S.Prem Kumar, ,
Affiliations
M.Tech Research Scholar
Assistant Professor
Head of the Department Department Of CSE, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
:NOT ASSIGNED


Abstract
A Vehicular Ad hoc Network (VANET) is a sort of mobile Peer-To-Peer wireless network that permits giving communication among adjacent vehicles and in the middle of vehicles and close-by settled roadside gear. The absence of concentrated framework, high node portability and expanding number of vehicles in VANET bring about a few issues examined in this paper, for example, interfering with associations, troublesome routing, security of correspondences and adaptability. Existing framework for VANET correspondence is demonstrated to have a few disadvantages. We have proposed a component so as to give secure and effective communication in VANET environment. We conquer the disadvantages of the current framework by utilizing Malicious Vehicular Analyzer algorithm and Elliptic Curve Cryptography (ECC). Utilizing these algorithms, vindictive messages are recognized. It likewise recognizes the mishap and different issues in the way of the vehicles. Elliptic Curve Cryptography (ECC) calculation is utilized for stronger security amid correspondence.


Citation
Pocha Nageswara Reddy ,I.S.Raghuram,Dr.S.Prem Kumar."Advance EMAP for Vehicular Ad Hoc Networks". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.1, Issue 04,pp.253-258, OCTOBER - 2014, URL :https://ijcert.org/ems/ijcert_papers/V1I415.pdf,


Keywords : emergency messages, VANET security, vehicular analyzer, warning messages.

References
[1] P. Papadimitratos, A. Kung, J. P. Hubaux, and F.
Kargl, “Privacy and identity management for
vehicular communication systems: a position paper,”
Proc. Workshop on Standards for Privacy in UserCentric Identity Management, Zurich, Switzerland,
July 2006.
[2] K. Sampigethaya, L. Huang, M. Li, R. Poovendran,
K. Matsuura, and K. Sezaki, “CARAVAN: Providing
location privacy for VANET,” Proc. Embedded
Security in Cars (ESCAR), November 2005.
[3] A. Wasef, Y. Jiang, and X. Shen, “DCS: An efficient
distributed certificate service scheme for vehicular
networks,” IEEE Trans. on Vehicular Technology, vol.
59, pp. 533–549, 2010.
[4] M. Raya and J.-P. Hubaux, “Securing vehicular ad
hoc networks,” Journal of Computer Security, vol. 15,
no. 1, pp. 39–68, 2007.
[5] “US bureau of transit statistics.” *Online+.
Available: http://en.wikipedia.org/wiki/Passenger
vehicles in the United States
[6] J. J. Haas, Y. Hu, and K. P. Laberteaux, “Design
and analysis of a lightweight certificate revocation
mechanism for VANET,” Proc. 6th ACM international
workshop on VehiculAr InterNETworking, pp. 89–98,
2009.
[7] “IEEE trial-use standard for wireless access in
vehicular environments - security services for
applications and management messages,” IEEE Std
1609.2-2006, 2006.
[8] “5.9 GHz DSRC.” *Online+. Available:
http://grouper.ieee.org/groups/scc32/dsrc/index.html.
[9]A. Wasef and X. Shen, “MAAC: Message
authentication acceleration protocol for vehicular ad
hoc networks,” Proc. IEEE GLOBECOM’09, 2009.
[10] J. P. Hubaux, “The security and privacy of smart
vehicles,” IEEE Security and Privacy, vol. 2, pp. 49–55,
2004.
[11] A. Studer, E. Shi, F. Bai, and A. Perrig, “TACKing
together efficient authentication, revocation, and
privacy in VANETs,” Proc. SECON ’09, pp. 1–9, 2009.
[12] M. Raya, P. Papadimitratos, I. Aad, D. Jungels,
and J.-P. Hubaux, “Eviction of misbehaving and
faulty nodes in vehicular networks,” IEEE Journal on
Selected Areas in Communications, vol. 25, pp. 1557–
1568, 2007.
[13] P. P. Papadimitratos, G. Mezzour, and J. Hubaux,
“Certificate revocation list distribution in vehicular
communication systems,” Proc. 5th ACM
international workshop on VehiculAr InterNETworking, pp. 86–87, 2008.
[14] K. P. Laberteaux, J. J. Haas, and Y. Hu, “Security
certificate revocation list distribution for VANET,”
Proc. 5th ACM international workshop on VehiculAr
Inter-NETworking, pp. 88–89, 2008.
[15] H. Chan, A. Perrig, and D. Song, “Random key
predistribution schemes for sensor networks,” Proc.
2003 IEEE Symposium on Security and Privacy, pp.
197–213, 2003.


DOI Link : NOT ASSIGNED

Download :
  V1I415.pdf


Refbacks : Currently there are no Refbacks

Announcements


Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors. 

News & Events


Latest issue :Volume 10 Issue 1 Articles In press

A plagiarism check will be implemented for all the articles using world-renowned software. Turnitin.


Digital Object Identifier will be assigned for all the articles being published in the Journal from September 2016 issue, i.e. Volume 3, Issue 9, 2016.


IJCERT is a member of the prestigious.Each of the IJCERT articles has its unique DOI reference.
DOI Prefix : 10.22362/ijcert


IJCERT is member of The Publishers International Linking Association, Inc. (“PILA”)


Emerging Sources Citation Index (in process)


IJCERT title is under evaluation by Scopus.


Key Dates


☞   INVITING SUBMISSIONS FOR THE NEXT ISSUE :
☞   LAST DATE OF SUBMISSION : 31st March 2023
☞  SUBMISSION TO FIRST DECISION :
In 7 Days
☞  FINAL DECISION :
IN 3 WEEKS FROM THE DAY OF SUBMISSION

Important Announcements


All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.

Citation Index


Citations Indices All
Citations 1026
h-index 14
i10-index 20
Source: Google Scholar

Acceptance Rate (By Year)


Acceptance Rate (By Year)
Year Rate
2021 10.8%
2020 13.6%
2019 15.9%
2018 14.5%
2017 16.6%
2016 15.8%
2015 18.2%
2014 20.6%

Important Links



Conference Proposal




DOI:10.22362/ijcert