A Scalable Robust Authentication Protocol For Secure Vehicular Communications
#1

Abstract
The existing authentication protocols to securevehicular
ad hoc networks (VANETs) raise challenges such as certificate
distribution and revocation, avoidance of computation and
communication bottlenecks, and reduction of the strong reliance
on tamper-proof devices. This paper efficiently cope with these
challenges with a decentralized group authentication protocol
in the sense that the group is maintained by each RSU rather
than by a centralized authority as in most existing protocols
employing group signatures. In our proposal, we employ each
roadside unit (RSU) to maintain and manage an on-the-fly group
within its communication range. Vehicles entering the group can
anonymously broadcast vehicle-to-vehicle (V2V) messages, which
can be instantly verified by the vehicles in the same group (and
neighbor groups). Later, if the message is found to be false, a
third party can be invoked to disclose the identity of the message
originator. Our protocol efficiently exploits the specific features
of vehicular mobility, physical road limitations and properly
distributed RSUs. Our design leads to a robust VANET since,
if some RSUs occasionally collapse, only the vehicles driving in
those collapsed areas will be affected. Due to the numerous RSUs
sharing the load to maintain the system, performance does not
significantly degrade when more vehicles join the VANET; hence,
the system is scalable.
Index Terms: Information security; Vehicular ad hoc networks;
Protocol design; Conditional privacy
I. INTRODUCTION
Vehicular ad hoc networks (VANETs) are an instance of
mobile ad hoc networks with the aim to enhance the safety
and efficiency of road traffic. VANETs have a number of distinguishing
features and limitations related to the very nature
of wireless communications and the rapid movement of the
vehicles involved in those communications. Compared with
wired or other wireless networks, VANETs are very dynamic
and their communications are volatile. In such networks, nodes
are vehicles equipped with communication devices known as
on-board units (OBUs) and, depending on the applications,
OBUs are used to establish communications with other vehicles
or roadside units (RSUs) such as traffic lights or traffic
signs.
The specific properties of VANETs allow the development
of very attractive services such as the so-called comfort
services that include traffic information, weather information,
location of gas stations or restaurants, price information, and
interactive communication such as Internet access. Also, it is
possible to offer safety services such as emergency warnings,
lane-changing assistance, intersection coordination, traffic sign
violation warnings, and road-condition warnings [1]. However,
for those new services to make life easier rather than more
difficult, they should rely on secure and privacy-preserving
protocols that encourage users to participate without fear for
their safety or personal privacy.
Consequently, security and privacy are two critical concerns
for the designers of VANETs that, if forgotten, might lead to
the deployment of vulnerable VANETs. Unless proper measures
are taken, a number of attacks could easily be conducted,
namely message content modification, identity theft, false
information generation and propagation, etc. The following
are examples of some specific attacks:
² If message integrity is not guaranteed, a malicious vehicle
could modify the content of a message sent by another
vehicle to affect the behavior of other vehicles. By doing
so, the malicious vehicle could obtain many benefits
while keeping its identity unknown. Moreover, the vehicle
that originally generated the message would be made
responsible for the damage caused.
² If authentication is not provided, a malicious vehicle
might impersonate an emergency vehicle to surpass speed
limits without being sanctioned.
² A malicious vehicle could report a false emergency
situation to obtain better driving conditions (e.g. deserted
roads) and, if non-repudiation is not supported, it could
not be sanctioned even if discovered.
From the previous examples, it becomes apparent that message
authentication, integrity, and non-repudiation are primary
requirements in VANETs. There is a need for mechanisms
that provide VANETs with security, i.e., protocols, methods
and procedures that are able to: detect whether a message has
been modified by an attacker, determine who is the real sender
of a message, and avoid identity theft.

Download full report
http://googleurl?sa=t&source=web&cd=1&ve...s%2F92.pdf&ei=YTQxTtL7J6bYiAKMlLipBg&usg=AFQjCNHkXefEGGTTHYTTIUiR031_KaLC7Q&sig2=wkppL9jM1oGnl-jFGeeNyA
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: zigbee wireless vehicular identification and authentication system pdf, pdf on wireless authentication protocol seminar report, robust and secure authentication protocol based on collaborative key a, zigbee wirless vehicular identification and authentication, vanets, design of a hybrid rfid gps based terminal system in vehicular communications documentation, a scalable robust authentication protocol for secure vehicular communications report,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Trends in satellite communications and the role of optical free-space communications seminar class 2 15,026 23-12-2018, 02:07 PM
Last Post:
  ROBUST DWT-SVD DOMAIN IMAGE WATERMARKING: EMBEDDING DATA IN ALL FREQUENCIES computer science crazy 2 5,217 19-06-2018, 06:10 PM
Last Post: KavyaIyengar
  Measuring the Performance of IEEE 802.11p Using ns-2 Simulator for Vehicular Networks smart paper boy 3 2,569 07-10-2014, 06:34 PM
Last Post: seminar report asees
  SECURE ATM BY IMAGE PROCESSING seminar class 6 9,887 06-04-2014, 05:49 PM
Last Post: Guest
  Space Laser Communications: Systems, Technologies, and Applications seminar class 3 3,170 21-12-2012, 11:48 AM
Last Post: seminar details
  Distributed cache updating for the Dynamic source routing protocol computer science crazy 1 1,350 01-12-2012, 01:35 PM
Last Post: seminar details
  Scalable Multicasting in Mobile Ad Hoc Networks smart paper boy 1 1,423 29-11-2012, 01:06 PM
Last Post: seminar details
  Modeling and Simulation of a Robust e-Voting System seminar class 1 1,300 02-11-2012, 03:39 PM
Last Post: seminar details
  Integration of CAN Protocol in Automotives computer science topics 4 4,331 16-10-2012, 12:43 PM
Last Post: seminar details
  Secure Mobile Based Voting System full report seminar topics 4 8,009 03-10-2012, 03:39 PM
Last Post: seminar details

Forum Jump: