M Tech Dissertations
Permanent URI for this collectionhttp://ir.daiict.ac.in/handle/123456789/3
Browse
3 results
Search Results
Item Open Access Privacy preservation in vehicular ad-hoc networks (VANETs)(Dhirubhai Ambani Institute of Information and Communication Technology, 2015) Garg, Garima; Das, Manik LalVehicular Ad-hoc Networks (VANETs) are the special application of Mobile Ad-hoc Networks (MANETs). Due to increase in the number of road accidents, VANETs provide security to road traffic by sending safety messages to other vehicles. However, the safety messages provide safety from accidents, the privacy of the vehicles from adversaries is also a concern. Vehicles have to preserve the privacy of contextual information like identity of the vehicle, location of the vehicle, speed of the vehicle and route etc. Therefore, the privacy preservation of vehicle is important because by using the vehicle’s information an adversary can easily send false information to other vehicles which can cause a road accident. One of the methods to preserve privacy in VANETs is by using Pseudonym Identities (PIDs). PIDs are not real IDs of the vehicles. PIDs are different from Real Identities (RID) of vehicles. We have suggested an approach for privacy preservation in VANETs using PIDs and Certificate-Less SignCryption (CLSC) [16] scheme as cryptographic primitive. This approach is more secure over hash-chain based and certificate-based schemes. We have also simulated a hash-chain based scheme which is better than hash-chain based scheme described in [7]. However, the scheme has many limitations therefore we moved on to certificate-less based schemes after reviewing the certificate-based scheme’s limitations. The proposed scheme uses CLSC as cryptographic primitive and there are two more system components other than the vehicle, RSU and CA. The VANET system is divided into zones and each zone has a ZRSU which provide credentials to the vehicle and when a vehicle moves from its home zone to other zone handover is done. Vehicles contact to PKGC in handover phase. PKGC is situated at the separation point of two zones. The Proposed approach is secure and efficient. It provides privacy for vehicles.Item Open Access Distributed meeting scheduling using vehicular-social network(Dhirubhai Ambani Institute of Information and Communication Technology, 2015) Mulchandani, Bharti Dholoomal; Srivastava, SanjayThe importance of vehicular communication and intelligent transportation systems is increasing manifold these days; especially due to the fast growing support technologies. Social networking is also an emerging system that is being highly adopted by users. Encompassing social network into vehicular network opens up many services beyond on-road safety that are user oriented. A wide range of applications can be built using this hybrid vehicular and social network. We have designed one such application - distributed meeting scheduling, which will allow combining the two heterogeneous environments and communication among vehicles, infrastructure, social network users. This application has potential usage when there is a large group of users who aim to schedule a meeting with other group members but the quorum and number of essential participants requirements are low compared to the number of invitees in the meeting. A social model guarantees efficient routing of messages in the network even if the number of nodes become orders of magnitude higher than what a traditional internet handles. Also, the application allows users to reschedule on the go by detecting if any of the attendees is getting late to reach the destination using the vehicular network. We have designed an algorithm for this meeting scheduling application which takes users’ preferences and constraints as input and attempts to schedule the maximum number of meetings and ensures total time taken to schedule any meeting is as low as possible. We have created our own simulator in java to measure the performance of algorithm and observed that there is a trade-off between total confirmed meetings and time taken to schedule a meeting, this time taken is directly proportional to the number of users offline i.e. when more users go offline, the time taken to schedule meetings also increases.Item Open Access Enhancement of misbehavior detection scheme for vehicular ad-hoc networks(Dhirubhai Ambani Institute of Information and Communication Technology, 2012) Jain, Shefali; Mathuria, Anish M.Vehicular ad hoc networks (VANETs) will facilitate various safety and non-safety applications to be deployed in the future. A vehicle in a VANET can misbehave by sending false or inaccurate information to other vehicles. Detection of such misbehavior is an important research problem. In this thesis, we study and improve an existing scheme for misbehavior detection. In that scheme, if a vehicle X generates an incorrect alert, then the nearby vehicles report the misbehavior of X to Road side unit (RSU). Upon receiving such a report, RSU imposes a fine on vehicle X. It is possible for a malicious vehicle to send a false report implicating X, even if X has generated a correct alert. As a result, the RSU may inadvertently fine an honest vehicle, potentially discouraging it from sending true alerts in the future. In this thesis, we propose a modified RSU detection algorithm to avoid honest vehicles from being fined due to malicious reports. We perform a simulation of the modified scheme and show that it identifies misbehaving vehicles with high accuracy