General Information
    • ISSN: 1793-8201 (Print), 2972-4511 (Online)
    • Abbreviated Title: Int. J. Comput. Theory Eng.
    • Frequency: Quarterly
    • DOI: 10.7763/IJCTE
    • Editor-in-Chief: Prof. Mehmet Sahinoglu
    • Associate Editor-in-Chief: Assoc. Prof. Alberto Arteta, Assoc. Prof. Engin Maşazade
    • Managing Editor: Ms. Cecilia Xie
    • Abstracting/Indexing: Scopus (Since 2022), INSPEC (IET), CNKI,  Google Scholar, EBSCO, etc.
    • Average Days from Submission to Acceptance: 192 days
    • APC: 800 USD
    • E-mail: editor@ijcte.org
    • Journal Metrics:
    • SCImago Journal & Country Rank
Article Metrics in Dimensions

IJCTE 2010 Vol.2(3): 395-400 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2010.V2.174

Artificial Intelligence Based Authentication Technique with Three Attributes in Vehicular Ad Hoc Network

Pijush Kanti Bhattacharjee

Abstract—Vehicular Ad Hoc Network (VANET) is one of the wireless ad hoc networks which are based on IEEE 802.11 wireless standard enabling vehicle to vehicle and vehicle to roadside communications through air interface. Information (voice, message, data, image etc) are routed in the cells or networks, any node or person can hack or tamper the information. A new artificial intelligence based mutual authentication technique is developed. Since human voice frequency lies between 0 ~ 3.5 KHz, a person talking some specific word in different times is always consisting of a very narrow range of frequencies which are varying person to person. Voice frequency of the selective words used by the subscriber (driver of a vehicle or node) at the beginning of conversation like Hello, Good Morning, Namaskar etc is taken as first entity for the authentication purpose. Second entity is taken as probability of salutation or greeting word from subscriber’s talking habit (set of salutation words) whiles the subscriber starts a call. Third entity is chosen as probable location (place) of the subscriber (node or vehicle) from the selective locations at the time of initializing a call i.e. distance between the subscriber and the network. These three entities such as probability of particular range of frequencies for the salutation word, particular salutation or greeting word, location at the time of starting a call are used with most frequently, more frequently and less frequently by the subscriber (node) like uncertainty in Artificial Intelligence (AI). Now different relative grades are assigned for most frequently, more frequently and less frequently used parameters and the grades are modified according to the assigned weightage of the relative grades. Then Fuzzy operations are performed on modified relative grades (sets). A Fuzzy Rule (condition) is invented. If the results obtained from fuzzy operations are satisfied by the fuzzy rule, the nodes (vehicles) or a node and the server (switch) are mutually authenticated in a Vehicular Ad Hoc Network.

Index Terms—VANET, DSRC, CSMA/CA, MAC layer, Distributed Coordination Function, Authentication system, Fuzzy Rule

  Pijush Kanti Bhattacharjee is an Assistant Professor in the Department of Electronics and Communication Engineering, Bengal Institute of Technology and Management, Santiniketan, WB, India. He was an Ex Asssitant Director in the Department of Telecommunications (DoT), Government of India, India. He is a member of IACSIT, IAEng, CSTA, IE. (phone: +91-33-25954148; email: pijushbhatta_6@hotmail.com).
  Utpal Roy is an Associate Professor in Computer & System Science Department, Viswbharati University, Santiniketan, West Bengal, India. (phone: +91-3463-262751-56; email: roy.utpal@gmail.com)
  Anup Kumar Bhattacharjee is a Professor in Electronics and Communications Engineering Department at National Institute of Technology, Durgapur, West Bengal, India.(phone: +91-343-2755221; email: akbece12@yahoo.com)

[PDF]

Cite: Pijush Kanti Bhattacharjee, Utpal Roy and Anup Kumar Bhattacharjee, "Artificial Intelligence Based Authentication Technique with Three Attributes in Vehicular Ad Hoc Network," International Journal of Computer Theory and Engineering vol. 2, no. 3, pp. 395-400, 2010.


Copyright © 2008-2024. International Association of Computer Science and Information Technology. All rights reserved.