Preview

protocols

Good Essays
Open Document
Open Document
1257 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
protocols
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks

ABSTRACT

Vehicular Ad Hoc Networks (VANETs) adopt the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs) for their security. In any PKI system, the authentication of a received message is performed by checking if the certificate of the sender is included in the current CRL, and verifying the authenticity of the certificate and signature of the sender. In this paper, we propose an Expedite Message Authentication Protocol (EMAP) for VANETs, which replaces the time-consuming CRL checking process by an efficient revocation checking process. The revocation check process in EMAP uses a keyed Hash Message Authentication Code (HMAC), where the key used in calculating the HMAC is shared only between non-revoked On-Board Units (OBUs). In addition, EMAP uses a novel probabilistic key distribution, which enables non-revoked OBUs to securely share and update a secret key. EMAP can significantly decrease the message loss ratio due to the message verification delay compared with the conventional authentication methods employing CRL. By conducting security analysis and performance evaluation, EMAP is demonstrated to be secure and efficient.

Existing System

In Existing System, a security attack on VANETs can have severe harmful or fatal consequences to legitimate users. Consequently, ensuring secure vehicular communications is a must before any VANET application can be put into practice the CRL size in VANETs is expected to be large for the following reasons:
To preserve the privacy of the drivers, i.e., to abstain the leakage of the real identities and location information of the drivers from any external eavesdropper should be preloaded with a set of anonymous digital certificate, where the OBU has to periodically change its anonymous certificate to mislead attackers. Consequently, a revocation of an OBU results in revoking all the certificate carried by that OBU leading to a

You May Also Find These Documents Helpful

  • Powerful Essays

    It230 Unit 3 Assignment 1

    • 5629 Words
    • 23 Pages

    Vehicular Ad hoc Network (VANET), a subclass deriving from Mobile Ad Hoc networks (MANET), is a promising approach for future intelligent transportation system…

    • 5629 Words
    • 23 Pages
    Powerful Essays
  • Better Essays

    ISSC361 FinalProject

    • 1124 Words
    • 4 Pages

    Manufacturers are incorporating more and more computers into automobiles. This causes a new type of threat to today’s society. Challenges come to protecting these systems and the people that are driving the vehicles.…

    • 1124 Words
    • 4 Pages
    Better Essays
  • Better Essays

    GEOSYNCHRONOUS orbiting satellites are the type used by the most popular satellite Internet access service providers.…

    • 925 Words
    • 4 Pages
    Better Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    References: Dierks, T. and Rescorla, E. (2008). The transport layer security (TLS) protocol version 1.2. Internet engineering task force. Retrieved from http://tools.ietf.org/html/rfc5246…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Assess and design proper authentication methods for RADIUS and TACACs+ authentication servers deployments as well as IEEE 802.11 WLAN infrastructures…

    • 858 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Self Driving Dbq

    • 498 Words
    • 2 Pages

    Anyone can hack into the systems, causing peculiar incidents like two cars constantly bumping into each other. The incidents would be part of a statistic. Document D’s statement on the self-driving cars’ speed is unsatisfactory. The reason is that people drive faster than twenty miles per hour during commuting hours, and it would worsen commute. On a common day, it takes, at least, thirty minutes or less to go across the Bay Bridge. With the self-driving cars, it would slow down the traffic on the popular commute areas. Therefore, self-driving cars will take years to develop the ability to be as fast as humans in the ability of…

    • 498 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Over the years, driving conditions have changed greatly, with the introduction of smart devices, phones, and other technology distracting drivers with text messages, tweets and gaming apps while they are on the road. In order to combat the distractions and to lessen the amount of crashes caused by technological devices each year, companies, like Safe Drive Systems, are creating their own affordable technological devices to protect and keep drivers safe.…

    • 260 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Imagine a world where you can get in your car without the worry of driving alongside drunks and teenagers. The once fictional dream of riding a driverless car is now becoming a reality, with many large companies including Mercedes-Benz, Toyota, BMW, Audi, and Google, currently investing in the development of this contraption. What is a driverless (or autonomous) car? It is an automobile run by an autopilot that allows passengers to travel safely and quickly to their destination with minimal to no human control. The Institute of Electrical and Electronics Engineers (IEEE) predicts that by the year 2040, our roads will be populated with autonomous vehicles, with up to 75% of all cars being driverless (Newcomb, 2012). As human civilization advances technologically on a daily basis, we are becoming less dependent on people and more dependent on robots, which many view as positive. Self-driving cars are a step in the right direction for…

    • 1144 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Future Of Driverless Cars

    • 779 Words
    • 4 Pages

    From the moment Google announced the road toward a future of driverless cars, the public was abuzz. Wherever you went, you could not escape the questions of curious internet browsers. “What do they look like? Will I be able to use one?” they queried. While the buzz has died down, pressing questions still remain about these autonomous cars. Even among excited fans of this new technology, few understand the inner workings of these vehicles. Moreover, technology rarely stays dormant for long. How will this technology advance in the future? What industries could this advancement be applied to? How will it affect our daily lives? Even more urgent is the question of our own security and well-being. Whether these cars are safe or not will determine…

    • 779 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Session Initiation Protocol

    • 2671 Words
    • 11 Pages

    AGENDA IMS AND HOW IT RELATES TO THE TOPIC OF SIP AND CONTEXT Concept of SIP Service Delivery Scenarios Context –What is it? How to Achieve Context Awareness EU/Global initiatives on Ambient Networks Summary plus concluding statements…

    • 2671 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    This project is designed and implemented based on the RFID and Zigbee technology used to transmit the vehicle engine number to the toll gate. This system helps to avoid car theft and avoid trespasser to the nation. A unique identity card (RFID) which holds information about vehicle’s owner, license, insurance and owner’s banking information, photo ID, road tax.…

    • 9816 Words
    • 40 Pages
    Powerful Essays
  • Good Essays

    Now days in the modern world, motorized automobiles have either power locked or a remote keyless system which operates by broadcasting radio waves on a particular frequency. Modern systems implement encryption to prevent car thieves from intercepting and spoofing the signal. The system signals that has either locked or unlocked the car usually through some fairly discreet combination of flashing vehicle lamps, a distinctive sound other than the horn or some usage of the horn itself. The functions of a remote keyless entry system are contained on…

    • 736 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Vehicle Tracking System

    • 3331 Words
    • 14 Pages

    A vehicle tracking system combines the installation of an electronic device in a vehicle, or fleet of vehicles, with purpose-designed computer software to enable the owner or a third party to track the vehicle's location, collecting data in the process. Modern vehicle tracking systems commonly use Global Positioning System (GPS) technology for locating the vehicle, but other types of automatic vehicle location technology can also be used. Vehicle information can be viewed on electronic maps via the Internet or specialized software. In the main they are easy to steal, and the average motorist has very little knowledge of what it is all about. To avoid this kind of steal we are going to implement a system it provides more security to the vehicle. Existing System: In the previous system security lock and alarm is implemented in a car. If a burglar can break open the lock, then it becomes easy for the burglar to steal the car. And in old security system if the car is stolen then it is out of the owner control. User doesn’t have any awareness about the current location of the vehicle. The Proposed System: The RF transmitter is attached with the vehicle which has its own identification. This data will be continuously transmitted to the RF receiver connected to the…

    • 3331 Words
    • 14 Pages
    Good Essays
  • Powerful Essays

    Rfid Based App

    • 6311 Words
    • 26 Pages

    With the cost decline in wireless and GPS technology, Auto ID systems can integrate these high-end technologies with IT systems to offer not only the identification functionality but also value added information and service in the applied systems. It can greatly improve the information visibility in the system information flow.…

    • 6311 Words
    • 26 Pages
    Powerful Essays