Privacy aware conceptual desgin of flooding message in vehicular Ad-Hoc network
A Vehicular Ad-Hoc Network (VANET) facilitates communication between vehicles and between vehicles and infrastructure. The study of VANETs has recently become an increasingly popular research topic in the area of wireless networking as well as the automotive industries. The goal of VANET research is...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/33825/5/HamedSayyadiMFSKSM2013.pdf http://eprints.utm.my/id/eprint/33825/ http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:70643?site_name=Restricted Repository |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Malaysia |
Language: | English |
id |
my.utm.33825 |
---|---|
record_format |
eprints |
spelling |
my.utm.338252017-07-24T01:25:16Z http://eprints.utm.my/id/eprint/33825/ Privacy aware conceptual desgin of flooding message in vehicular Ad-Hoc network Sayyadi, Hamed QA75 Electronic computers. Computer science A Vehicular Ad-Hoc Network (VANET) facilitates communication between vehicles and between vehicles and infrastructure. The study of VANETs has recently become an increasingly popular research topic in the area of wireless networking as well as the automotive industries. The goal of VANET research is to develop a vehicular communication system to enable quick and cost-efficient distribution of data for the benefit of passengers’ safety or comfort. Usually, security in routing has conflict with privacy. Although, all prior works improved security on VANET routing, there is no strong advancement on privacy. This study designed a new routing protocol based on both identity and position to improve privacy compliant secure routing in VANET. The new routing protocol called as PIDP contains five kinds of packets: Route Request, Route Reply, Source Route Reply, Data, and Acknowledgement. The first three packets are based on position and the rest packets are based on identity. As a result, PIDP can hide both position and real identity of terminal nodes from intermediate nodes. 2013-02 Thesis NonPeerReviewed application/pdf en http://eprints.utm.my/id/eprint/33825/5/HamedSayyadiMFSKSM2013.pdf Sayyadi, Hamed (2013) Privacy aware conceptual desgin of flooding message in vehicular Ad-Hoc network. Masters thesis, Universiti Teknologi Malaysia, Faculty of Computer Science and Information System. http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:70643?site_name=Restricted Repository |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Sayyadi, Hamed Privacy aware conceptual desgin of flooding message in vehicular Ad-Hoc network |
description |
A Vehicular Ad-Hoc Network (VANET) facilitates communication between vehicles and between vehicles and infrastructure. The study of VANETs has recently become an increasingly popular research topic in the area of wireless networking as well as the automotive industries. The goal of VANET research is to develop a vehicular communication system to enable quick and cost-efficient distribution of data for the benefit of passengers’ safety or comfort. Usually, security in routing has conflict with privacy. Although, all prior works improved security on VANET routing, there is no strong advancement on privacy. This study designed a new routing protocol based on both identity and position to improve privacy compliant secure routing in VANET. The new routing protocol called as PIDP contains five kinds of packets: Route Request, Route Reply, Source Route Reply, Data, and Acknowledgement. The first three packets are based on position and the rest packets are based on identity. As a result, PIDP can hide both position and real identity of terminal nodes from intermediate nodes. |
format |
Thesis |
author |
Sayyadi, Hamed |
author_facet |
Sayyadi, Hamed |
author_sort |
Sayyadi, Hamed |
title |
Privacy aware conceptual desgin of flooding message in vehicular Ad-Hoc network |
title_short |
Privacy aware conceptual desgin of flooding message in vehicular Ad-Hoc network |
title_full |
Privacy aware conceptual desgin of flooding message in vehicular Ad-Hoc network |
title_fullStr |
Privacy aware conceptual desgin of flooding message in vehicular Ad-Hoc network |
title_full_unstemmed |
Privacy aware conceptual desgin of flooding message in vehicular Ad-Hoc network |
title_sort |
privacy aware conceptual desgin of flooding message in vehicular ad-hoc network |
publishDate |
2013 |
url |
http://eprints.utm.my/id/eprint/33825/5/HamedSayyadiMFSKSM2013.pdf http://eprints.utm.my/id/eprint/33825/ http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:70643?site_name=Restricted Repository |
_version_ |
1643649441981267968 |