Excellence in Research and Innovation for Humanity

International Science Index


Select areas to restrict search in scientific publication database:
10004180
A Signature-Based Secure Authentication Framework for Vehicular Ad Hoc Networks
Abstract:
Vehicular Ad hoc NETwork (VANET) is a kind of Mobile Ad hoc NETwork (MANET). It allows the vehicles to communicate with one another as well as with nearby Road Side Units (RSU) and Regional Trusted Authorities (RTA). Vehicles communicate through On-Board Units (OBU) in which privacy has to be assured which will avoid the misuse of private data. A secure authentication framework for VANETs is proposed in which Public Key Cryptography (PKC) based adaptive pseudonym scheme is used to generate self-generated pseudonyms. Self-generated pseudonyms are used instead of real IDs for privacy preservation and non-repudiation. The ID-Based Signature (IBS) and ID-Based Online/Offline Signature (IBOOS) schemes are used for authentication. IBS is used to authenticate between vehicle and RSU whereas IBOOS provides authentication among vehicles. Security attacks like impersonation attack in the network are resolved and the attacking nodes are rejected from the network, thereby ensuring secure communication among the vehicles in the network. Simulation results shows that the proposed system provides better authentication in VANET environment.
Digital Article Identifier (DAI):

References:

[1] F. Armknecht et al., “Cross-Layer Privacy Enhancement and Non-Repudiation in Vehicular Communication,” Proc. ITG-GI Conf.Comm. in Distributed Systems (KiVS), pp. 1-12, 2007.
[2] J.M.D. Fuentes, A.I. Gonz_alez-Tablas, and A. Ribagorda, “Overview of Security Issues in Vehicular Ad-Hoc Networks,” Handbook of Research on Mobility and Computing, pp. 894-911, IGI Global Snippet, 2011.
[3] H. Krawczyk et al., ‘‘Chameleon Signatures,’’ in Proc. Netw. Distrib. Syst. Security Symp. 2000, pp. 143-154.
[4] Manuel Fogue et al., “Securing Warning Message Dissemination in VANETs Using Cooperative Neighbor Position Verification,” IEEE Transactions on Vehicular Technology, vol. 64, no. 6, pp. 2538-2550, June 2015.
[5] R.A. Mollin, “RSA and Public-Key Cryptography,” Discrete Math. and Its Applications. Chapman and Hall/CRC, 2002.
[6] M. Raya et al., “Securing Vehicular Ad Hoc Networks,” J.Computer Security, vol. 15, no. 1, pp. 39-68, 2007.
[7] Sanjay K. Dhurandher et al., “Vehicular Security through Reputation and Plausibility Checks”, IEEE Systems Journal, vol. 8, no. 2, pp. 384-394, June 2014.
[8] C. P. Schnorr et al., “Efficient signature generation by smart cards,” J. Cryptol., vol. 4, no. 3, pp. 161–174, 1991.
[9] Shamir et al., “Identity-Based Cryptosystems and Signature Schemes,” Proc. CRYPTO, pp. 47-53, 1985.
[10] Shamir et al., “Improved Online/Offline Signature Schemes,” Proc. CRYPTO, pp. 355-367, 2001.
[11] Song Guo et al., “Chameleon Hashing for Secure and Privacy-Preserving Vehicular Communications,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 11, pp. 2794-2803, November 2014.
[12] A. Wasef et al., “Efficient group signature scheme supporting batch verification for securing vehicular networks,” in Proc. IEEE ICC, Cape Town, South Africa, May 2010, pp. 1–5.
[13] Xiaoyan Zhu et al., “Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks”, IEEE Transactions on Vehicular Technology, vol. 63, no. 2, pp. 907-919, February 2014.
[14] S. Zeadally et al., “Vehicular Ad Hoc Networks (VANETS): Status, Results, and Challenges,” Telecomm. Systems, vol. 50, no. 4,pp. 217-241, 2012.
[15] Zhengming Li et al., “On Joint Privacy and Reputation Assurance for Vehicular Ad Hoc Networks,” IEEE Transactions on Mobile Computing, vol. 13, no. 10, pp. 2334-2344, October 2014.
Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007