My efficient way when do the research. The

My
sincere admiration and thanks to my respected Teacher, Prof. DU Wei Chun, for
her precious guidance, supervision and encouragement in bringing this report to
a successful completion. She proved extraordinary patience and always remained
available for help and pleasant advice.

Respected
Professor Du Weichun successfully imparted the basics knowledge about the
subject. She regularly listened and answered the questions during class, which
helped me to understand this subject clearly.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

It
has been very good and friendly way of communication in the class. All the
lectures were very informative which will certainly help everyone in the future
research.

 

Faisal Khan

Contents
1       Introduction. 5
2       Major Area and Research Topic. 6
2.1       Introduction. 6
2.2        Keywords. 7
3       Types of Publications Consulted. 8
4       Data Resourced Used. 8
5       Beihang Library Database Soft Data. 8
6       Technical Books. 35
7       Google Scholar 35
8       Baidu. 35
9       Learnr.pro. 36
10     Free Patents Online. 37
11     Review.. 37
12     How Vehicular Network Work. 47
13     Architectures of VANET. 47
14     Characteristics of VANET. 49
15     SECURITY REQUIREMENTS OF VANET. 50
16     PRIMITIVES AND TECHNIQUES OF CRYPTOGRAPHY.. 50
16.1      Cryptography and Information Security. 50
17     Cryptographic Techniques. 51
17.1      Encryption. 51
18     Symmetric Key. 52
19     Public Key. 52
20     Hash Function. 53
21     Public Key Infrastructure (PKI), Digital Certificates and
Time stamping. 53
22     CRYPTOGRAPHY FOR SUPPORTING VANET SECURITY.. 53
23     CONCLUSION.. 56
References. 57
Conclusion. 59
 

 

1       
 Introduction

For generations, scientists have built upon the
published work of their predecessors and contemporaries in order to make new
discoveries. However, as the number of publication has grown, it has become
increasingly difficult for scientist to find relevant prior work for their
particular research. The progress of science has often been hampered by the
inefficiency of traditional methods of disseminating scientific information or
scientific literature. It might cause the researchers are not working with the
most up-to-date and comprehensive information available. In that perspective,
scientist should know how to retrieve the scientific literature in effective and
efficient way when do the research.

The literature search is a very significant step in
the research process 1. The effective and efficient literature
retrieval also makes great sense for graduate students. Literature retrieval
gives students background information regarding their research, demonstrates
their familiarity with research in the field, and shows how their work
contributes one more piece in the puzzle of expanding the knowledge base in
their field. However, it becomes an inevitable problem about where to obtain
and how to pick up the useful literatures timely and efficiently while facing
the voluminous information. Figure 1 depicts the research process and some of
the complex inter-relationships, including those of the literature research and
documentation efforts.

 

 

 

 

 

 

 

 

 

Figure 1 Flow Diagram of Research
Process
 

 

Actually, the literature
retrieval is a process constantly absorbing information, executing feedback and
better understanding about our own topic. Scientific Literature Retrieval
Course helps student to be able to locate, identify and critique key elements
of scientific literature to discover what is known and what remains to be
learned about a topic. Main focus of the study is to present a way of
literature retrieval in a systematic way on selective research topic which
would lead the research from the primary stage to the finalization of the work.

 

2       
 Major Area and Research
Topic

The major area of
research is “Security and Privacy on Vehicular Ad-hoc Network (VANET)”, and
“Cryptography on VANET” as the research topic.

2.1     
Introduction

In
recent years, the development of ITS (Intelligent Transportation System) has
made a big step 2. In addition to entertainment service on board,
the main aim is to improve road safety and driving conditions. The automakers
have realized the potential of the interconnection of their vehicles. To
broaden the perception of recognition events that cannot be detected by
traditional sensors or by conductor, embedded sensors were introduced. Critical
driving conditions can be detected and the information may be share with nearby
vehicles. To share this information, vehicles shall establish the
communication. It’s called vehicular communication.

Vehicular
communication is defined as communication between the vehicles 3.
Its means vehicles establish spontaneous network. It’s called Vehicular Ad-hoc
Network (VANETs). The main objective of deploying vehicular ad-hoc network
(VANET) is to reduce the level accidents. It has a great effect on passenger’s
safety and for drivers to drive smoothly in the urban area. As vehicles
population increases day by day the rate accidents also increases, therefore it
is necessary for the vehicles to communicate. For example, suppose a vehicle a
moving in front of vehicle B and suddenly a meets with an accident by a
thunderstorm and it applies its brakes, the brake sensors and rain sensors of A
obtain activated and pass the signal to the main unit and then it broadcasts a
message (Alert Message) to other vehicles. After obtaining the alert message, B
slows down. By this example, we simply know the use of inter-vehicular
communication and why it is needed.

The
security of VANET is one of the most critical issues since the information
transmitted is distributed in an open access environment. Since VANET support
emergency real-time applications and also deal with life critical information
they should follow the security requirements such as privacy, confidentiality,
integrity, nonrepudiation to provide secured communications against attackers,
and malicious nodes.

Cryptography
is one of the solutions for securing VANET. Cryptography 4 is the
study of mathematical techniques related to aspects of information security
such as confidentiality, data integrity, entity authentication, and data origin
authentication. Cryptography is not the only means of providing information
security, but rather one set of techniques.

2.2     
Keywords

Following keywords
were used for the search of relevant literatures.

 Vehicular Ad hoc Network (VANET);

a.      Cryptography;

b.     Information security;

c.      Security and Privacy on Vehicular Ad hoc Network
(VANET).

 

3      
Types of Publications Consulted

Scientific literature consulted include following
kinds of publications:

a.       Scientific articles published in scientific
journals;

b.       Books wholly written by one or a small number of
co – authors;

c.       
Presentations at
academic conferences, especially those organized by learned societies;

d.       Scientific publications on the World Wide Web
etc.

4      
 Data Resourced Used

All relevant sources
pertinent to research have been explored. Using methodology presented above,
about twenty-five research papers, seven books, two dissertations and eleven
presentations on the relevant data have been searched out. Most of the papers
are recently published; however, some valuable old papers containing useful
data relevant to the research are included also. Details of each source with
few examples are now described as below.

 

 

 

 

 

Figure
2
Scientific Literature Retrieval Model
 

5      
Beihang
Library Database Soft Data

Beihang library provides
access to most powerful database for technical data on various subjects of the
science and engineering. Those databases are used for required literature on
intended research. List of electronic resources databases that user can access
through Beihang Library shown in Table 1. To access those databases user can
follow the following steps:

 

·       Open Beihang Library Website (English Version) : http://lib.buaa.edu.cn/english/mode1.htm

 

 

 

 

 

 

 

 

 

 

·       Choose electronic resources > web-based

 

 

 

 

 

 

 

 

 

 

·      
Then at http://lib.buaa.edu.cn/english/mode4.htm, user
can choose any link categorized by electronic resources type (E Book, E
Journal, E Report, E Conference and Dissertation)

 

 

 

 

 

 

 

 

 

 

 

 

 

Table
1. List of Electronic Resources Databases that user can access through Beihang
Library Electronic Resources Web-Based.

 

E
Book

E
Journal

E

E
Conference

Dissertation

 

 

 

Report

 

 

 

EBSCOhos

Association
of

AD

Association
of

ProQuest/P

 

t
Ebook

Computing

 

Computing

QDT

 

Collection

Machinary
(ACM)

 

Machinary
(ACM)

 

 

 

ACS
Publications

DE

ACS
Publications

CNKI.net

 

Link

 

 

 

 

 

Emerald

Aerospace

NASA
&

Aerospace

 

 

 

Research
Central

NACA

Research
Central

 

 

Wiley

AIAA
Electronic

PB

AIAA
Electronic

 

 

Online

Library

 

Library

 

 

Library

 

 

 

 

 

 

CSA
Aerospace

BH

CSA
Aerospace

 

 

 

CSA
ANTE

NTIS

CSA
ANTE

 

 

 

CSA
NTIS

AEROSP

CSA
NTIS

 

 

 

 

ACE

 

 

 

 

EBSCO
Academic

 

EBSCO
Academic

 

 

 

Search
Premier

 

Search
Premier

 

 

 

EBSCO
Business

 

EBSCO
Business

 

 

 

Source
Premier

 

Source
Premier

 

 

 

EBSCO
History

 

EBSCO
History

 

 

 

Reference
Center

 

Reference
Center

 

 

 

EBSCO
MasterFILE

 

EBSCO
MasterFILE

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

E Book

E Journal

E

E Conference

Dissertation

 

 

Report

 

 

 

Premier

 

Premier

 

 

EBSCO ERIC

 

EBSCO ERIC

 

 

Engineering

 

Engineering

 

 

Village

 

Village

 

 

Elsevier Science

 

Elsevier Science

 

 

Emerald

 

Emerald

 

 

Fortune

 

Fortune

 

 

Frontiers in China

 

Frontiers in China

 

 

IEEE

 

IEEE

 

 

IOP SCIENCE

 

IOP SCIENCE

 

 

IMechE

 

IMechE

 

 

Intel

 

Intel

 

 

Web of Knowledge

 

Web of Knowledge

 

 

Kluwer

 

Kluwer

 

 

Maney Online

 

Maney Online

 

 

MathSciNet

 

MathSciNet

 

 

Nature

 

Nature

 

 

NRC Research

 

NRC Research

 

 

Press

 

Press

 

 

SAGE Journal

 

SAGE Journal

 

 

Online

 

Online

 

 

Science Online

 

Science Online

 

 

Scitation AIP

 

Scitation AIP

 

 

Scitation ASME

 

Scitation ASME

 

 

SPIE International

 

SPIE International

 

 

Society of Optical

 

Society of Optical

 

 

Engineering

 

Engineering

 

 

Springer Link

 

Springer Link

 

 

Taylor and Francis

 

Taylor and Francis

 

 

Journal

 

Journal

 

 

Metapress

 

Metapress

 

 

CNKI.net

 

CNKI.net

 

 

CSSCI

 

CSSCI

 

 

VIP

 

VIP

 

 

RESSET

 

RESSET

 

 

5.1         
IEEE