{"title":"Widespread Review of Vehicular Ad Hoc Network","authors":"M. R, P. T.","doi":"10.20894/ijdmta.102.009.001.006","DOIUrl":null,"url":null,"abstract":"In this paper, main objective is collecting the information from road side traffic and share the collected information. The Identity based Batch verification (IBV) scheme is one such scheme, which makes VANET more secure and efficient maintaining privacy through anonymity and reduction of verification time of messages by verifying the min batch, are the ideas of this scheme. This paper highlights the security issues of the current IBV scheme and introduces the concept of the random change of anonymous identity with time as well as location, to prevent the security attack and to maintain the privacy. In this scheme, performances are evaluated in terms of delay and transmission overhead.","PeriodicalId":414709,"journal":{"name":"International Journal of Data Mining Techniques and Applications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Data Mining Techniques and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.20894/ijdmta.102.009.001.006","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In this paper, main objective is collecting the information from road side traffic and share the collected information. The Identity based Batch verification (IBV) scheme is one such scheme, which makes VANET more secure and efficient maintaining privacy through anonymity and reduction of verification time of messages by verifying the min batch, are the ideas of this scheme. This paper highlights the security issues of the current IBV scheme and introduces the concept of the random change of anonymous identity with time as well as location, to prevent the security attack and to maintain the privacy. In this scheme, performances are evaluated in terms of delay and transmission overhead.