CFP last date
16 December 2024
Call for Paper
January Edition
IJAIS solicits high quality original research papers for the upcoming January edition of the journal. The last date of research paper submission is 16 December 2024

Submit your paper
Know more
Reseach Article

Comparison of Data Transmission using Parameters in Normal and Covert Mode in VANETS

by Amarpreet Singh, Kimi Manchanda
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 10 - Number 3
Year of Publication: 2015
Authors: Amarpreet Singh, Kimi Manchanda
10.5120/ijais2015451473

Amarpreet Singh, Kimi Manchanda . Comparison of Data Transmission using Parameters in Normal and Covert Mode in VANETS. International Journal of Applied Information Systems. 10, 3 ( December 2015), 6-9. DOI=10.5120/ijais2015451473

@article{ 10.5120/ijais2015451473,
author = { Amarpreet Singh, Kimi Manchanda },
title = { Comparison of Data Transmission using Parameters in Normal and Covert Mode in VANETS },
journal = { International Journal of Applied Information Systems },
issue_date = { December 2015 },
volume = { 10 },
number = { 3 },
month = { December },
year = { 2015 },
issn = { 2249-0868 },
pages = { 6-9 },
numpages = {9},
url = { https://www.ijais.org/archives/volume10/number3/845-2015451473/ },
doi = { 10.5120/ijais2015451473 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T19:02:05.181607+05:30
%A Amarpreet Singh
%A Kimi Manchanda
%T Comparison of Data Transmission using Parameters in Normal and Covert Mode in VANETS
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 10
%N 3
%P 6-9
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Accomplish the security gap in the VANETS network; one has to meet a new conception of transmitting the secure data with the covert channel communication. In this work the communication is going on with normal mode as well as secure mode. With the help of this covert communication the small amount of sensitive data entrenched into the legal packet and transmitting over the insecure network. One had to measured parameters like End to End Delay, Packet Drop, PDR (Packet delivery ratio) and Throughput on which basis the efficiency of these modes evaluated. In this paper, the comparison of the above parameters discussed in Normal mode as well as covert mode.

References
  1. Fuentes J.M., BlascoJ., González A.I. and González L.,’’ Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles’’, International Journal of Distributed Sensor Networks Volume 2014 (2014), Article ID 120626, 15 pages.
  2. Palomar E.,Fuentes J., Alcaide A.,” Hindering false event dissemination with VANETS with proof-of-work mechanisms”, Department of Computer Science, Elsevier 2014.
  3. Tomandl A., Scheuer F. and Federrath H.,” Simulation-based evaluation of techniques for privacy protection in VANETs”, 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), IEEE 2012.
  4. Abumansoor O. and Boukerche A.,”A Secure Cooperative Approach for Nonline-of-Sight Location Verification in VANET”, IEEE Transactions on Vehicular Technology, Vol. 61, no. 1, January 2012, IEEE 2012.
  5. Prashant K.M, Sharma V., Sahu G., Roberts A., Srivatava M. ,”An Overview of AODV Routing Protocol”, International Journal Of Engineering And Computer Science, IJES 2009
  6. M. Kimi and S.Amarpreet ,”Covert Communication in VANETS using Internet Protocol Header Bit”,International Journal of Computer Applications 123(17):10-14, August 2015.
Index Terms

Computer Science
Information Sciences

Keywords

End to End Delay NS2 Packet Drop Packet delivery Ratio and Throughput.