December 2020

Volume 2, Issue 6, Publication: December 2020

1. Performance Comparison of Various Techniques for Secure Data Communication in VANET
Author(s): K. Nirmala1 and Dr. S. Prasath2

ABSTRACT: Vehicular Ad hoc Network (VANET) provides an efficient way of delivering information from one vehicle to another vehicle. One of the popular and dangerous attacks is impact attack where an attacker inserts a fake position in each class and therefore destroys the entire network performance. In general, VANET is an infrastructure-less network for data communication with any data access points. It is utilized in identifying and presenting the warning information safety threats and potential accidents. The safety information about vehicle is provided through vehicle direction, speed, acceleration, vehicle size. Based on node specification, data communication is carried out between two nodes in VANET. Security is the major challenging problem because of attacks nodes in network since conventional technique failed to attain better security due to the mobility of nodes, malicious nodes, lack of integrity, authentication and privacy rate. The conduction of simulation work on different proposed methods such as PMPC-IA scheme and MORABC-AD technique is carried out using NS-2 network simulator. The experimental work is conducted using a routing protocol. From vehicular network, the number of data packets ranging between 25 to 250 data is considered for experimental purpose. In addition, the number of vehicular nodes between 50 to 500 nodes is considered. From the simulation results, proposed PMPC-IA scheme shows higher authentication efficiency by 13% than other techniques.

2. A Study of Data Security and Privacy Techniques in Edge Computing
Author(s): K. S. Mohanasathiya1 and Dr. S. Prasath2

ABSTRACT: Cloud Computing has revolutionized how people store and use their data. However, there are some areas where cloud is limited, latency, bandwidth, security and a lack of offline access can be problematic. To solve this problem, users need robust, secure and intelligent on-premise infrastructure of edge computing. Traditional cloud computing is no longer sufficient to support the diverse needs of today's intelligent society for data processing, so edge computing technologies have emerged. It is a new computing paradigm for performing calculations at the edge of the network. Unlike cloud computing, it emphasizes closer to the user and closer to the source of the data. At the edge of the network, it is lightweight for local, small-scale data storage and processing. This article mainly reviews the related research of edge computing about the forming factors, privacy and security issues in cloud computing solved by edge computing, faster response time, various techniques for secure searching etc.

International Journal of Futuristic Research Evaluation in  Engineering