Large-Scale Cost-Effective Secured Content Distribution in the Cities Using Vehicular Networks
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 5)Publication Date: 2015-05-05
Authors : Vinay M Naganur; Anand R;
Page : 2571-2577
Keywords : Vehicular ad-hoc networks; Road-side buffer; vehicular buffer; Cryptography; security;
Abstract
In this paper we have practical and cost-effective approach to construct a fully distributed roadside communication infrastructure to provide the secured content distribution to vehicles in the urban area. In this paper we deploy vehicle to infrastructure and vehicle to vehicle data transmission. The proposed infrastructure is composed of distributed lightweight low-cost devices called roadside buffers (RSBs), where each RSB has the limited buffer storage and is able to transmit wirelessly and vehicle buffers to transmit the information from one area to other. To enable the distributed RSBs working toward the global optimal performance (e. g. , minimal average file download delays), we propose a fully distributed algorithm to determine optimally the content replication strategy at RSBs and prioritize the contents such as high priority, average priority and low priority. Where accident messages have high priority are transmitted fast and low priority messages are transmitted later. We secure communication using Trusted Authority which verifies RSU authentication through ECC cryptographic function. The proposed infrastructure is designed to optimize the global network utility, which accounts for the integrated download experience of users and the download demands of files. Using extensive simulations, we validate the effectiveness of the proposed infrastructure and show that the proposed distributed protocol can approach to the optimal performance and secured communication.
Other Latest Articles
- Survey on NMS Supporting Network Elements implementing Heterogeneous Protocols
- Cloud Storage with Added Data Security and Integrity
- Statistical Simulation for BIST Architecture using Cognitive Principles
- Privacy Preserving Auditing For Cloud Storage
- Detection and Prevention of Misbehaving Node using PDA and Enhanced 2ACK Scheme
Last modified: 2021-06-30 21:46:31