VANET- based Vehicle Tacking on Message Authentication and Secure Navigation Route

نویسندگان

  • Vamsi Krishna
  • R. Hariharan
  • T. W. Chim
  • S. M. Yiu
  • Lucas C. K. Hui
  • Victor O. K. Li
  • C. Zhang
  • R. Lu
  • P. H. Ho
  • Khalid Abdel Hafeez
  • Lian Zhao
  • Jon W. Mark
  • Vaishali D. Khairnar
  • Ketan Kotecha
  • Ki Won Sung
چکیده

Computing real-time road condition is really tough and it is not achieved using GPS. However, a malicious node can create multiple virtual identities for transmitting fake messages using different forged positions. A malicious vehicle can disseminate false traffic information in order to force other vehicles and vehicular authorities to take incorrect decisions. To overcome these difficulties we propose that vehicle should be authenticated by Trusted Authority (TA) via RSU, only then the navigation query sent to RSU through tamper proof device (in the Vehicle) for identifying best destination route. After authentication, TA generates a re-encryption key to requested vehicle for encrypting the query. Based on vehicle request, contacted RSU identifies the shortest path to reach the destination RSU by passing the vehicle request to neighbouring RSU's. After identification of shortest path, it sends the encrypted message to requested vehicle using re-encryption key. Finally it decrypts the message using its own private key. Moreover, the network checks each vehicle speed for avoid accident based on predecessor and successor vehicle's speed using chord algorithm. It also implementing priority based vehicle movement so, Network gives high priority in emergency vehicle, it gives medium priority for registered vehicle and it gives low priority for unregistered vehicle.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

HMAC Based Secure Authentication of VANET's

The Vehicular Ad-hoc Network (VANET) has been studied in many fields since it has the ability to provide a variety of services, such as detecting oncoming collisions and providing warning signals to alert the driver. The services provided by VANET are often based on collaboration among vehicles that are equipped with relatively simple motion sensors and GPS units. Awareness of its precise locat...

متن کامل

TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs (CMU-CyLab-08-011)

Vehicular Ad Hoc Networks (VANETs) require some mechanism to help authenticate messages, identify valid vehicles, and remove malevolent vehicles. A Public Key Infrastructure (PKI) can provide this functionality using certificates and fixed public keys. However, fixed keys allow an eavesdropper to associate a key with a vehicle and a location, violating drivers’ privacy. In this work we examine ...

متن کامل

Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation

VANET provide facility for the vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages to other vehicles. However, this raises the issue of security and privacy. Here, we have described various existing solutions/protocols that are used in order to satisfy the security and privacy requirement of the vehicular ad hoc network...

متن کامل

Message Authentication Scheme for Vehicular Ad-Hoc Wireless Networks without RSU

Studies were conducted on vehicular ad-hoc network (VANET) in recent years. VANET is a network that combines on-board wireless equipment (On-Board Unit, OBU) and roadside fixed wireless equipment (Road Side Unit, RSU) through wireless communication technology. When vehicles broadcast messages, the traditional systems usually use RSU to do message authentication that we can ensure messages are i...

متن کامل

Controlling over the Sumo by Traci in Vehicular Adhoc Network

Security is the main issue in the VANET because VANET provides the safety related application and save the human lives. VANET can save our time by providing the information not only about the busy traffic but also security. But the main issue is considering the security related such as security of the driver and passengers. The security information contains the information like location, identi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015