Back to Current Issues

A Novel Security Protocol for VANET

B. Divya, Dr. Ch. Mallikarjuna Rao,

Affiliations
Department of Computer Science and Engineering Gokaraju Rangaraju Institute of Engineering and Technology, Hyderabad, India
:10.22362/ijcert/2017/v4/i8/xxxx [UNDER PROCESS]


Abstract
Vehicular ad-hoc network (VANET) has recently received signi?cant considerations to enhance traf?c security and ef?ciency. Notwithstanding, correspondence trust, and client protection still present useful worries to the sending of VANET, either suffer from the substantial workload of downloading the latest denial list from a remote authority or can't enable drivers made a beeline to choose the dependability of a message when the verification on messages is unknown. In this paper, to cope with these challenging concerns, we propose a new verification convention for VANET in a decentralized group model by using a new group signature scheme. In the assistance of the new group signature scheme, the proposed verification convention is featured with threshold authentication, ef?cient revocation, unforgeability, anonymity, and traceability. Also, the assisting group signature scheme may also be of independent interest, as it is characterized by ef?cient traceability and message-linkability at the same time. Broad investigations show that our proposed edge mysterious validation convention is secure, and the veri?cation of messages among vehicles can be quickened by utilizing batch message preparing methods.


Citation
B. Divya, & Dr. Ch. Mallikarjuna Rao. (2017). A Novel Security Protocol for VANET. International Journal of Computer Engineering In Research Trends, 4(8), 330-335. Retrieved from http://ijcert.org/ems/ijcert_papers/V4I8003.pdf


Keywords : Vehicular ad-hoc networks (VANETs), conditional privacy, threshold authentication, group signature

References
[1] Jun Shao, Xiaodong Lin, “A threshold anonymous authentication protocol for valet”
[2] S. Dietzel, E. Schoch, B. K¨onings, M. Weber, and F. Kargl, “Resilient, secure aggregation for vehicular networks,” IEEE Network, vol. 24, no. 1, pp. 26–31, 2010. [Online]. Available: http://dx.doi.org/10.1109/ MNET.2010.5395780
 [3] “The car two car communication consortium,” http://www.car-to-car.org/.
[4] P. Papadimitratos, L. Butty´an, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J. Hubaux, “Secure vehicular communication systems: Design and architecture,” CoRR, vol. abs/0912.5391, 2009. [Online]. Available: http://arxiv.org/abs/0912.5391
 [5] G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik, “A practical and provably secure coalition-resistant group signature scheme,” in Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, 2000, pp. 255–270. [Online]. Available: http://dx.doi.org/10.1007/3-540-44598-6 16
 [6] J. Hubaux, S. Capkun, and J. Luo, “The security and privacy of smart vehicles,” IEEE Security & Privacy, vol. 2, no. 3, pp. 49–55, 2004. [Online]. Available: http://doi.ieeecomputersociety.org/10.1109/ MSP.2004.26
 [7] M. Raya and J. Hubaux, “Securing vehicular ad hoc networks,” Journal of Computer Security, vol. 15, no. 1, pp. 39–68, 2007. [Online]. Available: http://iospress.metapress.com/openurl.asp?genre= article&issn=0926-227X&volume=15&issue=1&spage=39
 [8] Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, “An ef?cient pseudonymous authentication scheme with strong privacy preservation for vehicular communications,” IEEE T. Vehicular Technology, vol. 59, no. 7, pp. 3589–3603, 2010. [Online]. Available: http: //dx.doi.org/10.1109/TVT.2010.2051468
 [9] X. Lin and X. Li, “Achieving ef?cient cooperative message authentication in vehicular ad hoc networks,” IEEE T. Vehicular Technology, vol. 62, no. 7, pp. 3339–3348, 2013. [Online]. Available: http://dx.doi.org/10.1109/TVT.2013.2257188 
[10] L. Wischhof, A. Ebner, and H. Rohling, “Information dissemination in self-organizing intervehicle networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 6, no. 1, pp. 90–101, 2005. [Online]. Available: http://dx.doi.org/10.1109/TITS.2004.842407
 [11] P. Golle, D. H. Greene, and J. Staddon, “Detecting and correcting malicious data in vanets,” in Proceedings of the First International Workshop on Vehicular Ad Hoc Networks, 2004, Philadelphia, PA, USA, October 1, 2004, 2004, pp. 29–37. [Online]. Available: http://doi.acm.org/10.1145/1023875.1023881
 [12] L. Zhang, Q. Wu, A. Solanas, and J. Domingo-Ferrer, “A scalable robust authentication protocol for secure vehicular communications,” IEEE T. Vehicular Technology, vol. 59, no. 4, pp. 1606–1617, 2010. [Online]. Available: http://dx.doi.org/10.1109/TVT.2009.2038222
[13] L. Chen, S. Ng, and G. Wang, “Threshold anonymous announcement in vanets,” IEEE Journal on Selected Areas in Communications, vol. 29, no. 3, pp. 605–615, 2011. [Online]. Available: http: //dx.doi.org/10.1109/JSAC.2011.110310
[14] U. S. D. of Transportation, “Dedicated short range communications,” http://www.its.dot.gov/DSRC/.
[15] D. Chaum and E. van Heyst, “Group signatures,” in Advances in Cryptology - EUROCRYPT ’91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings, 1991, pp. 257–265. [Online]. Available: http://dx.doi.org/10.1007/3-540-46416-6 22
[16] D. Boneh, X. Boyen, and H. Shacham, “Short group signatures,” in Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 1519, 2004, Proceedings, 2004, pp. 41–55. [Online]. Available: http://dx.doi.org/10.1007/978-3-540-28628-8 3
[17] Anusha.V,K.Sumalatha,” Mobile Social Networks for Flattering Unsigned Profile Matching ,” International Journal of Computer Engineering In Research Trends.,vol.1,no.6,pp. 384-390,2014.
[18] D.Ramanjaneyulu ,U.Usha Rani,” In Service-Oriented MSN Providing Trustworthy Service Evaluation,” International Journal of Computer Engineering In Research Trends.,vol.2,no.12,pp. 1192-1197,2015.
[19] Komal Patil, Geeta Mahajan, Disha Patil and Chitra Mahajan,” Implementation of Motion Model Using Vanet,” International Journal of Computer Engineering In Research Trends.,vol.3,no.4,pp. 179-182,2016.
[20] Pocha Nageswara Reddy, I.S.Raghuram, Dr.S.Prem Kumar,” Advance EMAP for Vehicular Ad Hoc Networks.” International Journal of Computer Engineering In Research Trends.,vol.1,no.4,pp. 253-258,2016. 


DOI Link : Not Yet Assigned

Download :
  V4I8003.pdf


Refbacks : There are currently no refbacks

Quick Links


DOI:10.22362/ijcert


Science Central

Score: 13.30



Submit your paper to editorijcert@gmail.com

>