• May 27, 2016 News!The submission for Special Issue is officially open now!   [Click]
  • May 03, 2016 News!Vol.6, No.6 has been indexed by EI (Inspec).   [Click]
  • Mar 17, 2017 News!Vol.9, No.2 has been published with online version. 13 peer reviewed articles from 4 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2010 Vol.2(3): 395-400 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2010.V2.174

Artificial Intelligence Based Authentication Technique with Three Attributes in Vehicular Ad Hoc Network

Pijush Kanti Bhattacharjee
Abstract—Vehicular Ad Hoc Network (VANET) is one of the wireless ad hoc networks which are based on IEEE 802.11 wireless standard enabling vehicle to vehicle and vehicle to roadside communications through air interface. Information (voice, message, data, image etc) are routed in the cells or networks, any node or person can hack or tamper the information. A new artificial intelligence based mutual authentication technique is developed. Since human voice frequency lies between 0 ~ 3.5 KHz, a person talking some specific word in different times is always consisting of a very narrow range of frequencies which are varying person to person. Voice frequency of the selective words used by the subscriber (driver of a vehicle or node) at the beginning of conversation like Hello, Good Morning, Namaskar etc is taken as first entity for the authentication purpose. Second entity is taken as probability of salutation or greeting word from subscriber’s talking habit (set of salutation words) whiles the subscriber starts a call. Third entity is chosen as probable location (place) of the subscriber (node or vehicle) from the selective locations at the time of initializing a call i.e. distance between the subscriber and the network. These three entities such as probability of particular range of frequencies for the salutation word, particular salutation or greeting word, location at the time of starting a call are used with most frequently, more frequently and less frequently by the subscriber (node) like uncertainty in Artificial Intelligence (AI). Now different relative grades are assigned for most frequently, more frequently and less frequently used parameters and the grades are modified according to the assigned weightage of the relative grades. Then Fuzzy operations are performed on modified relative grades (sets). A Fuzzy Rule (condition) is invented. If the results obtained from fuzzy operations are satisfied by the fuzzy rule, the nodes (vehicles) or a node and the server (switch) are mutually authenticated in a Vehicular Ad Hoc Network.

Index Terms—VANET, DSRC, CSMA/CA, MAC layer, Distributed Coordination Function, Authentication system, Fuzzy Rule

  Pijush Kanti Bhattacharjee is an Assistant Professor in the Department of Electronics and Communication Engineering, Bengal Institute of Technology and Management, Santiniketan, WB, India. He was an Ex Asssitant Director in the Department of Telecommunications (DoT), Government of India, India. He is a member of IACSIT, IAEng, CSTA, IE. (phone: +91-33-25954148; email: pijushbhatta_6@hotmail.com).
  Utpal Roy is an Associate Professor in Computer & System Science Department, Viswbharati University, Santiniketan, West Bengal, India. (phone: +91-3463-262751-56; email: roy.utpal@gmail.com)
  Anup Kumar Bhattacharjee is a Professor in Electronics and Communications Engineering Department at National Institute of Technology, Durgapur, West Bengal, India.(phone: +91-343-2755221; email: akbece12@yahoo.com)

[PDF]

Cite: Pijush Kanti Bhattacharjee, Utpal Roy and Anup Kumar Bhattacharjee, "Artificial Intelligence Based Authentication Technique with Three Attributes in Vehicular Ad Hoc Network," International Journal of Computer Theory and Engineering vol. 2, no. 3, pp. 395-400, 2010.
Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com