SAODV Protocol Based Cryptographic Technique for Automotive Cybersecurity

Authors

  • Angel Ann G Yesudasan  M.Tech Scholar, Department of Electronics & Communication Engineering, Rajagiri School of Engineering & Technology, Ernakulum
  • Tressa Michael  Assistant Professor, Department of Electronics & Communication Engineering, Rajagiri School of Engineering & Technology, Ernakulum

DOI:

https://doi.org/10.32628/IJSRSET207387

Keywords:

AODV, SAODV, Cyber security, VANET, Black hole attack, NS2 Simulator

Abstract

This paper presents about a cryptographic technique that is used to ensure cybersecurity in automotive platform. Nowadays there has been a tremendous increase in the number of vehicles which leads to a number of problems like heavy traffic jams. Using Intelligent Transport System, these issues are resolved to a great extent. But using the wireless communication network in automotive give rise to a number of security threats which includes piracy of data and violation of data protection and privacy. To ensure safe and accurate data transmission between the vehicles, there needs to be a cryptographic technique to prevent the attack from malicious nodes. We aim to use SAODV protocol based cryptographic technique which verifies both the source and the destination node of the data transmission process.

References

  1. Ahmer Khan Jadoon, Licheng Wang, Tong Li, MuhammadAzam Zia “Lightweight Cryptographic Techniques for Automotive Cybersecurity”, Hindawi Wireless Communications and Mobile Computing, Volume 2018, Article ID 1640167.
  2. Dr.RamalingamSugumar, Jahir Hussain S, “The Enhanced Network Architecture, Route discovery and Data Transmission of AODV”, International Journal of Pure and Applied Mathematics, Volume 116 No. 10 2017, 453-460
  3. Mandeep Kaur Saggi Anshu Joshi, “EDMVP: Efficient Detection for Malicious Vehicles using AODV Protocol”, Communications on Applied Electronics, Volume 2 – No.3, June 2015.
  4. Anuja Thakur, Sharda Patel, Ashok Verma “Performance Evaluation of AODV, DSDV and DSR Routing Protocols using NS-2 Simulator”, International Journal Of Engineering Sciences & Research Technology, Thakur, 3(1): January, 2014
  5. Srivaths Ravi And Anand Raghunathan, Paul Kocher, Sunil Hattangady “Security In Embedded Systems: Design Challenges” ACM Transactions on Embedded Computing Systems, Vol. 3, No. 3, August 2004, Pages 461–491.
  6. Madhu.B.M, Abhilash C B, “Implementation of Improved Robust Energy Efficient Routing Protocol”, IEEE.978-1-4799-6629-5/14/$31.00_c 2014
  7. Philipp Mundhenk, Andrew Paverd, Artur Mrowca, Sebastian Steinhorst, Martin Lukasiewycz, Suhaib A. FahmySamarjit Chakraborty, “Security In Automotive Networks: Lightweight Authentication And Authorization”, ACM Transactions on Design Automation of Electronic Systems, Vol. 22, No. 2, Article 25, March 2017.
  8. Jaspreet Singh, Er. Kartik Sharma, “A Review on Energy Efficient Routing In Mobile Ad-Hoc Networks (Manet)”, IJESRT, Singh*, 4. (6): June, 2015].
  9. Yugarshi Shashwat, Prashant Pandey, K. V. Arya &Smit Kumar, “A modified AODV protocol for preventing black hole attack in MANET”. Information Security Journal, Pages 240-248, 25 Sep 2017.
  10. Dr. Ajay N. Upadhyaya, Dr. J.S. Shah, “AODV Routing Protocol Implementation in VANET” International Journal of Advanced Research in Engineering and Technology, 10 (2), 2019, pp 585-595.
  11. Rashmi Mishra, Akhilesh Singh, Rakesh Kumar, “VANET security: Issues, challenges and solutions”, International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), 2016.
  12. Neeraj Varshney, Tumpa Roy, Niharika Chaudhary, “Security Protocol for VANET by Using Digital Certification to Provide Security with Low Bandwidth” International Conference on Communication and Signal Processing, April 3-5, 2014, India.
  13. Muhammad Sameer Sheikh and Jun Liang, “A Comprehensive Survey on VANET Security Services in Traffic Management System”, Hindawi Wireless Communications and Mobile Computing Volume 2019, Article ID 2423915.
  14. Shivendra Prakash, Abhishek Swaroop, “A brief survey of blackhole detection and avoidance for ZRP protocol in MANETs”, International Conference on Computing, Communication and Automation (ICCCA2016)
  15. Mohamed Er-Rouidi, Houda Madini, Benachir El Hadadi, “Attacks against AODV Routing Protocol in Mobile Ad-Hoc Networks”, 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV), 2016

The

Downloads

Published

2020-06-30

Issue

Section

Research Articles

How to Cite

[1]
Angel Ann G Yesudasan, Tressa Michael "SAODV Protocol Based Cryptographic Technique for Automotive Cybersecurity " International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 7, Issue 3, pp.571-577, May-June-2020. Available at doi : https://doi.org/10.32628/IJSRSET207387