Volume-2 ~ Issue-2
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Efficient Data Delivery For Secured Communication in Vanet |
| Country | : | India |
| Authors | : | Neha Verma || Rakesh Ku |
| : | 10.9790/0661-0220108 ![]() |
|
Abstract- As Vehicular networks become popular, it will provide the communication between Vehicle to Vehicle (V2V) and between Vehicles to Road side unit (V2R). Security is the main issue in VANET. As there are many aspects to improve security in VANET, but still security remains the delicate research. In this paper two methods have been proposed for maintaining the security. One method is Combo algorithm and other method is the Global System for Mobile computing (GSM) technique. The objective of combo algorithm is to achieve the principle of confidentiality, integrity, authentication and non-repudiation. This algorithm is designed by combining the two cryptography mechanism i.e. symmetric and asymmetric key; with the help of this technique we can solve the key distribution/exchange problem. The speed of encryption/decryption process is very fast in symmetric key cryptography so the process will not take much more time and the time complexity reduces. With the use of GSM technique, the authentication and confidentiality services have been achieved. Also, data transmitted in the form of voice and packets, and secure communication will takes place.
Keywords: Algorithm, GSM, RSU, V2R, V2V.
Keywords: Algorithm, GSM, RSU, V2R, V2V.
[1] Paolo Cencioni and Roberto Di Pietro, ―A mechanism to enforce privacy in vehicle-to-infrastructure communication‖, Elsevier, International Journal of computer communication, 31(12), 30 July 2008, 2790-2802.
[2] Neng-Wen Wang, Yueh-Min Huang and Wei-Ming Chen, ―A novel secure communication scheme in vehicular ad hoc networks‖, International Journal of computer communication, 31(12), 30 July 2008, 2827-2837.
[3] Yi Qian, Kejie Lu, and Nader Moayeri, ―A Secure VANET Mac Protocol for DSRC Applications‖, Proc. of Global Telecommunications Conference, IEEE GLOBECOM, Dec. 2008,1-5.
[4] Eliana Stavrou and Andreas Pitsillides, ―A survey on secure multipath routing protocols in WSNs‖, Elsevier, Volume 54, Issue 13, 15 September 2010, Pages 2215–2238.
[5] Pandurang Kamat, Arati Baliga and Wade Trappe ―An identity-based security framework For VANET‖, Proc. of the 3rd international workshop on Vehicular ad hoc networks, 2006, 94-95.
[6] Raya, Maxim; Aziz, Adel; Hubaux and Jean-Pierre, ―Efficient secure aggregation in VANET‖, Proc. of 3rd international workshop on Vehicular ad hoc networks, September 2006.
[7] Surabhi Mahajan and Alka Jindal, ―Security and Privacy in VANET to reduce Authentication Overhead for Rapid Roaming Networks‖, International Journal of Computer Applications, 1(20), February 2010, 17-21. [8] Kenneth P Laberteaux, Jason J Haas, Yih-Chun Hu, ― Security certificate revocation list distribution for VANET‖, Proc. of fifth ACM international workshop on Vehicular Internetworking VANET, 2008, 88-89. [9] Samara, G., Al-Salihy, W.A.H., Sures, ―Security issues and challenges of Vehicular Ad Hoc Networks‖, Proc. of 4th International Conference on New Trends in Information Science and Service Science (NISS) , May 2010, 393-398. [10] H. Chan, A. Perrig, and D. Song, ―Secure hierarchical in-network aggregation in sensor networks,‖ Proc. of 13th ACM conference on Computer and Communications Security, November 2006, 278-287.
[11] Y. Yang, X. Wang, and S. Zhu, ―SDAP: a Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks‖, ACM Transactions on Information and System Security (TISSEC), 11(4), July 2008, 18:1-18:43.
[12] M.Y. Hsieh, Y.M. Huang, H.C. Chao, ―Adaptive security design with malicious node detection in cluster-based sensor networks‖, Computer Communications, 30 (11–12), September 2007, 2385–2400.
[13] C. Boyd, A. Mathuria, ―Protocols for Authentication and Key Establishment‖, Information security and cryptography series, September 2003.
[14] Chung-Ming Huang and Yuh-Shyan Chen, Telematics communication technologies and vehicular networks: wireless architectures and applications (Information science reference Hershey, New York, 2010).
[15] www.en.wikipedia.org/wiki/GSM.
[16] www.pcquest.ciol.com/content/technology/ 2009/109020101.asp.
[2] Neng-Wen Wang, Yueh-Min Huang and Wei-Ming Chen, ―A novel secure communication scheme in vehicular ad hoc networks‖, International Journal of computer communication, 31(12), 30 July 2008, 2827-2837.
[3] Yi Qian, Kejie Lu, and Nader Moayeri, ―A Secure VANET Mac Protocol for DSRC Applications‖, Proc. of Global Telecommunications Conference, IEEE GLOBECOM, Dec. 2008,1-5.
[4] Eliana Stavrou and Andreas Pitsillides, ―A survey on secure multipath routing protocols in WSNs‖, Elsevier, Volume 54, Issue 13, 15 September 2010, Pages 2215–2238.
[5] Pandurang Kamat, Arati Baliga and Wade Trappe ―An identity-based security framework For VANET‖, Proc. of the 3rd international workshop on Vehicular ad hoc networks, 2006, 94-95.
[6] Raya, Maxim; Aziz, Adel; Hubaux and Jean-Pierre, ―Efficient secure aggregation in VANET‖, Proc. of 3rd international workshop on Vehicular ad hoc networks, September 2006.
[7] Surabhi Mahajan and Alka Jindal, ―Security and Privacy in VANET to reduce Authentication Overhead for Rapid Roaming Networks‖, International Journal of Computer Applications, 1(20), February 2010, 17-21. [8] Kenneth P Laberteaux, Jason J Haas, Yih-Chun Hu, ― Security certificate revocation list distribution for VANET‖, Proc. of fifth ACM international workshop on Vehicular Internetworking VANET, 2008, 88-89. [9] Samara, G., Al-Salihy, W.A.H., Sures, ―Security issues and challenges of Vehicular Ad Hoc Networks‖, Proc. of 4th International Conference on New Trends in Information Science and Service Science (NISS) , May 2010, 393-398. [10] H. Chan, A. Perrig, and D. Song, ―Secure hierarchical in-network aggregation in sensor networks,‖ Proc. of 13th ACM conference on Computer and Communications Security, November 2006, 278-287.
[11] Y. Yang, X. Wang, and S. Zhu, ―SDAP: a Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks‖, ACM Transactions on Information and System Security (TISSEC), 11(4), July 2008, 18:1-18:43.
[12] M.Y. Hsieh, Y.M. Huang, H.C. Chao, ―Adaptive security design with malicious node detection in cluster-based sensor networks‖, Computer Communications, 30 (11–12), September 2007, 2385–2400.
[13] C. Boyd, A. Mathuria, ―Protocols for Authentication and Key Establishment‖, Information security and cryptography series, September 2003.
[14] Chung-Ming Huang and Yuh-Shyan Chen, Telematics communication technologies and vehicular networks: wireless architectures and applications (Information science reference Hershey, New York, 2010).
[15] www.en.wikipedia.org/wiki/GSM.
[16] www.pcquest.ciol.com/content/technology/ 2009/109020101.asp.
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | ASIC implementation of STM-1 Framer and De-Framer |
| Country | : | India |
| Authors | : | Anand T || Dr. Siva S Yellampalli |
| : | 10.9790/0661-0220917 ![]() |
|
Abstract : In this paper we present the ASIC implementation of STM-1 Framer and De-Framer. This paper mainly focuses on multiplexing digital data, transmitting and receiving the STM-1 frame. The design is implemented using Verilog HDL, simulated on Modelsim and Synthesized on Xilinx ISE 13.2. For power analysis and area calculation, the designed framer and de-framer are analysed using Cadence version 6.1.5. For debugging Chipscope Analyser has been used. The designed framer can be used for generation and analysis of STM-1 frame that has a data rate of 155.52Mbps.
Keywords - PRBS, STM-1 frame, Scrambler, Descrambler, BIP, SOH, POH.
Keywords - PRBS, STM-1 frame, Scrambler, Descrambler, BIP, SOH, POH.
[1] ITU-T Recommendation G.707/Y.1322, Network node interface for Synchronous Digital Hierarchy (SDH), Telecommunication Standardization Sector of ITU. Geneva, January 2007.
[2] Zhang Xiaoru and Zeng Lieguang, "An SDH STM-1 termination IC", ASIC 2nd International Conference, pp 179-182, 1996.
[3] ITU-T Rec. G.783, Characteristics of synchronous digital hierarchy (SDH) equipment functional blocks, Telecommunication Standardization Sector of ITU. Geneva, March 2006.
[4] G. Cariolaro, G. Iudicello, "Signal theory for SONET STM-1" Telecommunication symposium 1990. Its‟90 symposium record, Sep 1990, pp 26 - 32.
[5] D. Bajic, J. Stojanovic, FTN Novi Sad, Fruskogorska, Mobtel Beograd, "Frame Alignment Monitoring For STM-1 Frame", IEEE International Conference on Communications, 2001. ICC 2001, Vol. 10, pp. 2953- 2957.
[6] Srini W. Seetharam, Gary J. Minden, Joseph B. Evans, "A parallel SONET scrambler/descrambler architecture", Circuits and Systems, ISCAS, IEEE International Symposium, May 1993, vol 3, pp. 2011 - 2014.
[7] R. Clauberg "Data aggregation architectures for single chip SDH/SONET framers", IBM J. RES & DEV. VOL. 47 NO.2/3 March/May 2003.
[8] D.W. Choi, "Frame Alignment in a Digital Carrier System - A Tutorial", IEEE Comm. Mag., pp. 47-54, Vol. 28, February 1990.
[9 ] Cisco Systems, "Synchronous Digital Hierarchy (SDH) Graphical Overview", Oct 2006.
[10] Wei-Zen Chen, Guan-Sheng Huang, "A Parallel Multi- pattern PRBS Generator and BER Tester for 40+ Gbps Serdes Applications", IEEE Asia-Pacific Conference on Advanced System Integrated Circuits, Aug 2004, pp. 318-321.
[2] Zhang Xiaoru and Zeng Lieguang, "An SDH STM-1 termination IC", ASIC 2nd International Conference, pp 179-182, 1996.
[3] ITU-T Rec. G.783, Characteristics of synchronous digital hierarchy (SDH) equipment functional blocks, Telecommunication Standardization Sector of ITU. Geneva, March 2006.
[4] G. Cariolaro, G. Iudicello, "Signal theory for SONET STM-1" Telecommunication symposium 1990. Its‟90 symposium record, Sep 1990, pp 26 - 32.
[5] D. Bajic, J. Stojanovic, FTN Novi Sad, Fruskogorska, Mobtel Beograd, "Frame Alignment Monitoring For STM-1 Frame", IEEE International Conference on Communications, 2001. ICC 2001, Vol. 10, pp. 2953- 2957.
[6] Srini W. Seetharam, Gary J. Minden, Joseph B. Evans, "A parallel SONET scrambler/descrambler architecture", Circuits and Systems, ISCAS, IEEE International Symposium, May 1993, vol 3, pp. 2011 - 2014.
[7] R. Clauberg "Data aggregation architectures for single chip SDH/SONET framers", IBM J. RES & DEV. VOL. 47 NO.2/3 March/May 2003.
[8] D.W. Choi, "Frame Alignment in a Digital Carrier System - A Tutorial", IEEE Comm. Mag., pp. 47-54, Vol. 28, February 1990.
[9 ] Cisco Systems, "Synchronous Digital Hierarchy (SDH) Graphical Overview", Oct 2006.
[10] Wei-Zen Chen, Guan-Sheng Huang, "A Parallel Multi- pattern PRBS Generator and BER Tester for 40+ Gbps Serdes Applications", IEEE Asia-Pacific Conference on Advanced System Integrated Circuits, Aug 2004, pp. 318-321.
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Evolution of Sha-176 Algorithm |
| Country | : | India |
| Authors | : | Piyush Garg || Namita Tiwari |
| : | 10.9790/0661-0221822 ![]() |
|
Abstract : To maintain data integrity hash functions are generally used. Hash function is one type of cryptographic primitives, which provide an assurance for data integrity. NAS has designed SHA hash functions which are the set of cryptographic hash function. There are so many SHA function existing in which SHA-1 produces message digest that is of 160 bits long. Later in SHA-1 has been identified security flaws, namely that a possible mathematical weakness might exist. This point out that stronger hash function would be desirable. In this paper we are proposing a new hash function, say SHA-176 that has more strength than the existing. In this we are fulfilling basic security principle i.e. integrity. Basically this hash function is developed to improve the security. Presented results are showing the performance of the proposed SHA-176 in terms of efficiency and security.
Keywords: Computer Security, SHA, Hash, Message Digest
Keywords: Computer Security, SHA, Hash, Message Digest
[1] L.Thulasimani and M.Madheswaran, Security and Robustness Enhancement of Existing Hash Algorithm IEEE International Conference on Signal Processing Systems 2009
[2] Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa, and Stamatis Vassiliadis Cost-Efficient SHA Hardware Accelerators IEEE Transactions On Very Large Scale Integration(VLSI) Systems, VOL. 16, NO. 8, AUGUST 2008
[3] Harshvardhan Tiwari and Dr. Krishna Asawa "A Secure Hash Function MD-192 With Modified Message Expansion" (IJCSIS) International Journal of Computer Science and Information Security, Vol. VII , No. II, FEB2010 .
[4] P.P Charles & P.L Shari, "Security in Computing: 4th edition", Prentice-Hall, lnc., 2008.
[5] Charles Fleeger, Cryptography and network Security Principles and Practices.
[6] Secure Hash Standard: Federal Information Processing Standards Publication180-2
[7] Ilya Mironov, Hash functions: Theory, attacks, and applications Microsoft Research, Silicon Valley Campus.
[2] Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa, and Stamatis Vassiliadis Cost-Efficient SHA Hardware Accelerators IEEE Transactions On Very Large Scale Integration(VLSI) Systems, VOL. 16, NO. 8, AUGUST 2008
[3] Harshvardhan Tiwari and Dr. Krishna Asawa "A Secure Hash Function MD-192 With Modified Message Expansion" (IJCSIS) International Journal of Computer Science and Information Security, Vol. VII , No. II, FEB2010 .
[4] P.P Charles & P.L Shari, "Security in Computing: 4th edition", Prentice-Hall, lnc., 2008.
[5] Charles Fleeger, Cryptography and network Security Principles and Practices.
[6] Secure Hash Standard: Federal Information Processing Standards Publication180-2
[7] Ilya Mironov, Hash functions: Theory, attacks, and applications Microsoft Research, Silicon Valley Campus.
