International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 61 | Number 2 | Year 2018 | Article Id. IJCTT-V61P117 | DOI : https://doi.org/10.14445/22312803/IJCTT-V61P117

Efficient Authentication Scheme for Vehicular Ad Hoc Networks


E.Indhumathi, Dr.Julia Punitha Malar Dhas, Mr.J.P.Jayan

Citation :

E.Indhumathi, Dr.Julia Punitha Malar Dhas, Mr.J.P.Jayan, "Efficient Authentication Scheme for Vehicular Ad Hoc Networks," International Journal of Computer Trends and Technology (IJCTT), vol. 61, no. 2, pp. 100-106, 2018. Crossref, https://doi.org/10.14445/22312803/IJCTT-V61P117

Abstract

VANET Consisting of a network of vehicles, moving at a reasonably high speed that communicate between themselves with different purposes existence the main purpose that of improving security on the road. Due to rapid topology changing and regular disconnection creates it difficult to design an efficient authentication scheme for VANETs. The existing schemes that provide authentication require high computational cost and suffer from message loss. The Proposed system offers a computationally efficient authentication scheme for VANETs. In the proposed scheme digital signature is used to sign every message. To confirm the integrity also authenticity of the messages bilinear pairing is used. The proposed scheme also provides a conditional tracking mechanism to find the malicious vehicles in VANET. The proposed system is conditionally efficient with respect to efficient authentication also maintaining privacy in VANETs.

Keywords

VANETs, RSU, Network, rapid topology, OBU

References

[1] R.Lu, X. Lin, T. H. Luan, X. Liang, and X.Shen, “Anonymity analysis on social spot based pseudonym changing for location privacy in VANETs,” in Proc. IEEE ICC, Kyoto, Japan,Jun. 2011, pp. 1–5.
[2] X.Lin, R. Lu, C. Zhang, H. Zhu, P. H. Ho, andX. Shen, “Security in vehicular ad hoc networks,” IEEE Commun. Mag., vol. 46, no. 4, pp. 88–95, Apr. 2008.
[3] I.Blake, G.Seroussi, and N.Smart, Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series), vol. 317. Cambridge, U.K.: Cambridge Univ. Press, 2005.
[4] N.Koblitz, “Elliptic curve cryptosystems,” Math.Comput., vol. 48, no. 177, pp. 203–209, 1987.
[5] A.Dhamgaye and N.Chavhan, “Survey on security challenges in VANET,” Int. J. Comput. Sci. Netw., vol. 2, no. 1, pp. 88–96, 2013.
[6] I.F.Blake, V. K. Murty, and G. Xu, “Refinements of Miller’s algorithm for computing the Weil/Tate pairing,” J.
[7] M.Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,” J. Comput. Secur., vol. 15, no. 1, pp. 39–68, 2007.
[8] C.Zhang, R. Lu, X. Lin, P. Ho, and X. Shen, “An efficient identity-based batch verification scheme for vehicular sensor networks,” in Proc.IEEE INFOCOM, Apr. 2008, pp. 246–250.
[9] H.Zhu, X. Lin, R. Lu, P. H. Ho, and X. Shen, “AEMA: An aggregated emergency message authentication scheme for enhancing the security of vehicular ad hoc networks,” in Proc.IEEE ICC, May 2008, pp. 1436–1440
[10] M.Raya, P. Papadimitratos, and J.-P. Hubaux Securing vehicular communications,” IEEEWireless Commun., vol. 13, no. 5, pp. 8–15, Oct.2006.
[11] M.Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,” in Proc. 3rd ACMWorkshop Secur. Ad Hoc Sens. Netw., 2005, pp.11–21.