Secure Authentication for Vehicular Ad Hoc Network

نویسندگان

  • Rinsu Aravind
  • Deepa P L
چکیده

Security is an important issue in ad hoc networks, especially fo r security sensitive applicat ions. This paper main ly focus the authentication based on the group signature for providing the security and privacy in vehicular ad hoc networks (VANET). In VANETs, g roup signature is widely used for vehicles to achieve unauthenticated vehicles. A group signature scheme allows members of a group to sign messages on behalf of the group. Signatures can be verified with respect to a single group public key, but they do not reveal the identity of the signer When receiving a message from an unknown entity, a vehicle has to check the certificate revocation list (CRL) to avoid communicat ing with revoked vehicles and then verify the sender’s group signature to check the validity of the received message. The Public Key Infrastructure ensures user validity. It is based on the concept of asymmetric key cryptography. The security and performance analysis show that our scheme is more efficient in terms of authentication speed, while keeping conditional privacy in VANETs.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Architecture for Authentication and Secure Communication in VANET

Authenticate communication model provides secure inter and intra vehicles communication. This architecture uses the concept of distributed database. Every driver has to prove his identity to certified authority to get the communication rights to communicate with other vehicles. Vehicular ad-hoc network for intelligent transport system (ITS) which has become an essential service, provides safety...

متن کامل

Authentication vs. Privacy within Vehicular Ad Hoc Networks

Security and protection of private user information are a prerequisite for the deployment of the vehicular network technologies. Nevertheless, the establishment of a secure communication architecture within vehicular ad hoc networks address special challenges, due to the characteristic and specificities of such environment (high dynamic and mobility of nodes, high rate of topology changes, high...

متن کامل

Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks

In recent years, Vehicular Ad Hoc Networks (VANETs) have emerged as one of the most active areas in the field of technology to provide a wide range of services, including road safety, passenger's safety, amusement facilities for passengers and emergency facilities. Due to the lack of flexibility, complexity and high dynamic network topology, the development and management of current Vehicular A...

متن کامل

An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks

In the vehicular ad hoc networks (VANET), various authentication schemes have been proposed for secure communications. However, the previous schemes are inefficient because each vehicle needs to share and keep a large number of session keys for communicating with the other vehicles on the VANET. To overcome the above drawback, we propose a new authenticated communication scheme for the VANET. I...

متن کامل

Efficient and Secure communication in Vehicular Ad hoc Network

Recent advances in development of Wireless Communication in Vehicular Adhoc Network (VANET) has provided Emerging platform for researchers. VANET are movable & fixed infrastructure. One of the main challenges in VANET is to secure communication. VANET is a open network for all and different types of attacker available for attack to victims node in the network & create problem in communication. ...

متن کامل

Secure Location-Aided Routing Protocols With Wi-Fi Direct For Vehicular Ad Hoc Networks

Secure routing protocols are proposed for the vehicular ad hoc networks. The protocols integrate the security authentication process with the Location-Aided Routing (LAR) protocol to support Wi-Fi Direct communications between the vehicles. The methods are robust against various security threats. The security authentication process adopts a modified DiffieHellman key agreement protocol. The Dif...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016