Impact Factor:6.549
 Scopus Suggested Journal: UNDER REVIEW for TITLE INCLUSSION

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary

Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

Advance EMAP for Vehicular Ad Hoc Networks

Pocha Nageswara Reddy , I.S.Raghuram, Dr.S.Prem Kumar, ,
M.Tech Research Scholar
Assistant Professor
Head of the Department Department Of CSE, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India

A Vehicular Ad hoc Network (VANET) is a sort of mobile Peer-To-Peer wireless network that permits giving communication among adjacent vehicles and in the middle of vehicles and close-by settled roadside gear. The absence of concentrated framework, high node portability and expanding number of vehicles in VANET bring about a few issues examined in this paper, for example, interfering with associations, troublesome routing, security of correspondences and adaptability. Existing framework for VANET correspondence is demonstrated to have a few disadvantages. We have proposed a component so as to give secure and effective communication in VANET environment. We conquer the disadvantages of the current framework by utilizing Malicious Vehicular Analyzer algorithm and Elliptic Curve Cryptography (ECC). Utilizing these algorithms, vindictive messages are recognized. It likewise recognizes the mishap and different issues in the way of the vehicles. Elliptic Curve Cryptography (ECC) calculation is utilized for stronger security amid correspondence.

Pocha Nageswara Reddy ,I.S.Raghuram,Dr.S.Prem Kumar."Advance EMAP for Vehicular Ad Hoc Networks". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.1, Issue 04,pp.253-258, OCTOBER - 2014, URL :,

Keywords : emergency messages, VANET security, vehicular analyzer, warning messages.

[1] P. Papadimitratos, A. Kung, J. P. Hubaux, and F.
Kargl, “Privacy and identity management for
vehicular communication systems: a position paper,”
Proc. Workshop on Standards for Privacy in UserCentric Identity Management, Zurich, Switzerland,
July 2006.
[2] K. Sampigethaya, L. Huang, M. Li, R. Poovendran,
K. Matsuura, and K. Sezaki, “CARAVAN: Providing
location privacy for VANET,” Proc. Embedded
Security in Cars (ESCAR), November 2005.
[3] A. Wasef, Y. Jiang, and X. Shen, “DCS: An efficient
distributed certificate service scheme for vehicular
networks,” IEEE Trans. on Vehicular Technology, vol.
59, pp. 533–549, 2010.
[4] M. Raya and J.-P. Hubaux, “Securing vehicular ad
hoc networks,” Journal of Computer Security, vol. 15,
no. 1, pp. 39–68, 2007.
[5] “US bureau of transit statistics.” *Online+.
vehicles in the United States
[6] J. J. Haas, Y. Hu, and K. P. Laberteaux, “Design
and analysis of a lightweight certificate revocation
mechanism for VANET,” Proc. 6th ACM international
workshop on VehiculAr InterNETworking, pp. 89–98,
[7] “IEEE trial-use standard for wireless access in
vehicular environments - security services for
applications and management messages,” IEEE Std
1609.2-2006, 2006.
[8] “5.9 GHz DSRC.” *Online+. Available:
[9]A. Wasef and X. Shen, “MAAC: Message
authentication acceleration protocol for vehicular ad
hoc networks,” Proc. IEEE GLOBECOM’09, 2009.
[10] J. P. Hubaux, “The security and privacy of smart
vehicles,” IEEE Security and Privacy, vol. 2, pp. 49–55,
[11] A. Studer, E. Shi, F. Bai, and A. Perrig, “TACKing
together efficient authentication, revocation, and
privacy in VANETs,” Proc. SECON ’09, pp. 1–9, 2009.
[12] M. Raya, P. Papadimitratos, I. Aad, D. Jungels,
and J.-P. Hubaux, “Eviction of misbehaving and
faulty nodes in vehicular networks,” IEEE Journal on
Selected Areas in Communications, vol. 25, pp. 1557–
1568, 2007.
[13] P. P. Papadimitratos, G. Mezzour, and J. Hubaux,
“Certificate revocation list distribution in vehicular
communication systems,” Proc. 5th ACM
international workshop on VehiculAr InterNETworking, pp. 86–87, 2008.
[14] K. P. Laberteaux, J. J. Haas, and Y. Hu, “Security
certificate revocation list distribution for VANET,”
Proc. 5th ACM international workshop on VehiculAr
Inter-NETworking, pp. 88–89, 2008.
[15] H. Chan, A. Perrig, and D. Song, “Random key
predistribution schemes for sensor networks,” Proc.
2003 IEEE Symposium on Security and Privacy, pp.
197–213, 2003.


Download :

Refbacks : Currently there are no Refbacks


Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors. 

News & Events

Latest issue :Volume 10 Issue 1 Articles In press

A plagiarism check will be implemented for all the articles using world-renowned software. Turnitin.

Digital Object Identifier will be assigned for all the articles being published in the Journal from September 2016 issue, i.e. Volume 3, Issue 9, 2016.

IJCERT is a member of the prestigious.Each of the IJCERT articles has its unique DOI reference.
DOI Prefix : 10.22362/ijcert

IJCERT is member of The Publishers International Linking Association, Inc. (“PILA”)

Emerging Sources Citation Index (in process)

IJCERT title is under evaluation by Scopus.

Key Dates

☞   LAST DATE OF SUBMISSION : 31st March 2023
In 7 Days

Important Announcements

All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.

Citation Index

Citations Indices All
Citations 1026
h-index 14
i10-index 20
Source: Google Scholar

Acceptance Rate (By Year)

Acceptance Rate (By Year)
Year Rate
2021 10.8%
2020 13.6%
2019 15.9%
2018 14.5%
2017 16.6%
2016 15.8%
2015 18.2%
2014 20.6%

Important Links

Conference Proposal