HMAC Based authentication for VANETS combined with Visual cryptography

نویسنده

  • NIVEDITHA S
چکیده

VANET is an emerging type of distributed network and it is dynamic in nature which provides variety of services such as detecting oncoming collision and provides warning signal to alert the driver. In military application data security is an imp issues. This paper presents a secured and an efficient way of sending data and image in encrypted form using HMAC based authentication and Visual Cryptography respectively. Hash based Message Authentication is provided to authenticate node and messa function MD-1,256,512 are used for message integrity and symmetric key mechanism is carried out in this work. To transmit image securely among the authenticated node ,visual cryptography technique is proposed in this paper. Encryption and decryp image is accomplished by using mathematical algorithm. Digital watermarking scheme with visual cryptography is proposed to secure the confidential image. Image is divided into two images using VCS, it is not possible to recover the original images accessing both the shares. The OR operator is used to superimpose the two images and fully recover the original template.

منابع مشابه

Precipitate Message Manifest Protocol for Vehicular Ad Hoc Networks

Vehicular ad hoc networks (VANETs) adopt the Expedite Message Authentication Protocol (EMAP) and Certificate Revocation Lists (CRLs) for their security. In any EMAP system, the authentication of a received message is performed by checking if the certificate of the sender is included in the current CRL, and verifying the authenticity of the certificate and signature of the sender. In this paper,...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

HMAC: Keyed-Hashing for Message Authentication

This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key....

متن کامل

Non line of Sight Location Verification in EMAP for Vehicular Ad Hoc Networks

The security in VANETs is improvised with the involvement of Public Key Infrastructure (PKI) and Certificate Revocation List (CRL) through message authentication and the data transmissions are improved through NLOS. The direct communications between vehicles are blocked with interference of obstacles like trucks, buildings. These problems are overcome through NLOS conditions such as location ve...

متن کامل

Internet - Draft Babel HMAC

This document describes a cryptographic authentication mechanism for Babel routing protocol, updating, but not superceding RFC 6126. The mechanism allocates two new TLV types for the authentication data, uses HMAC and is both optional and backward compatible.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

متن کامل
عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015