Preview

Authentication in VANET

Powerful Essays
Open Document
Open Document
5048 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Authentication in VANET
1286

IEEE LATIN AMERICA TRANSACTIONS, VOL. 11, NO. 6, DECEMBER 2013

An Improved Scheme for Key Management of
RFID in Vehicular Adhoc Networks
Q. Zhang, M. A. Almulla and A. Boukerche
Abstract— Vehicular Ad hoc Networks (VANETs) are emerging as a promising approach to improving traffic safety and providing a wide range of wireless applications for all road users. This paper addresses an improved authentication scheme for Radio frequency identification (RFID) applied in VANETs. As often being considered as a precondition for the realization of IoT, RFID can be utilized in the vehicles, so as to make the vehicles identifiable and inventoriable by computers as long as they are fitted out with radio tags. One of the public concerns is likely to focus on a certain large number of security and privacy issues. A few light symmetric key management schemes have been proposed for RFID scenarios.
However, as we mentioned already, the authentication methodologies of those light symmetric key management schemes, especially in the scenarios of RFID, are still at an initial phase and call for enormous research efforts. We propose a certificate revocation status validation scheme called EKA2, using the concept of clustering from data mining to evaluate the trustiness of digital certificates. Keywords— Authentication Scheme, RFID, VANETs.

EXTENDED ABSTRACT

T

HERE HAS been growing interest in developing secure and convenient driving conditions in the past decades.
Vehicular Adhoc Networks (VANETs) play an important role in wireless communication amongs vehicles, which emphasizes drivers‘safety and the use of assistance applications. Meanwhile, as a living entity, the Internet is always evolving and developing. Recently a novel paradigm: the
Internet of Things (IoT) is swiftly gaining ground in the scenario of contemporary wireless telecommunications industry. The Internet of Things is driven by the pervasive presence around individuals



References: ipv6 for phone services,” in Consumer Electronics, 2009. ISCE ’09. International Conference on, vol. 2, pp. 1243 –1245, feb. 2007. 370, 2004. Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008 and Mobile Computing, pp. n/a–n/a, 2012. through health social networks,” Computer Communications, 2012.

You May Also Find These Documents Helpful

  • Powerful Essays

    It230 Unit 3 Assignment 1

    • 5629 Words
    • 23 Pages

    Vehicular Ad hoc Network (VANET), a subclass deriving from Mobile Ad Hoc networks (MANET), is a promising approach for future intelligent transportation system…

    • 5629 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. Consumer Electronics, IEEE Transactions on, 50(1), 231-…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    For example, SFO which is part of the private security program, SPP, conducts emergency exercises each year even though it is required by federal regulations to carry out such a drill every three years. SFO Airport Director declares that this concept is adopted by SFO to maintain high level of training and preparedness against any threat (John L. Martin, 2014).…

    • 789 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Having a driverless car is the most bizarre thing to have, but have consequences of when buying one. The risk is high to when paying the price, these driverless cars can contain many troubles on the street. There are no laws of this yet that might cause safety problems in the future of when these are released from car companies.…

    • 343 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A police officers role in society is to effectively enforce laws, arrest offenders when a crime has been committed, prevent crime to their best ability, preserve the peace whenever possible, and provide services to community citizens in their time of need. Over the past 25-30 years, police departments have proactively been enforcing the Community Policing Theory, developed by Professor Herman Goldstein, on their staff and officers. Community policing promotes relationships between officers and society. In order to prevent crime, officers and communities need to work together to address the problems that encourage or cause criminal activity. In order for this theory to work properly, police officers…

    • 835 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Transportation is the action of moving someone from place to another place and the most common method of transportation is cars and they are becoming more advanced each day. Driverless cars are the latest advancement in cars. There are several differences between driverless cars and traditional cars.…

    • 238 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Hacking In Driving

    • 373 Words
    • 2 Pages

    One of the biggest problems is the self-driving car thoughts which the programmers have a big part in. So imagine yourself on the highway in your self driving car and there is a truck that carries long poles and you are surrounded on all sides my other vehicles and all of a sudden a very heavy pole falls off of the truck. If you were driving you would just react, but a self driving car would have been programmed to think about it a certain way. So what would a self driving car do if there was a pickup truck with a high safety rating or a motorcyclist at the right and it was too late to stop. What would the self driving car hit go straight forward and probably kill you hit the pickup truck or hit the motorcyclist killing him or harming him severely. So who are the programmers programming the cars decision the companies, the government's, or a random programmer who is going to do it. Should it make your safety top on the list or to minimize lives lost in an accident.…

    • 373 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Copyright © 2011 Directed Electronics. All Rights Reserved. DirectWire and its vehicle information are for…

    • 860 Words
    • 4 Pages
    Satisfactory Essays
  • Best Essays

    Inter Vehicle Communication

    • 3420 Words
    • 14 Pages

    7. Subir Biswas, Raymond Tatchikou and Francois Dion, “Vehicle-to-Vehicle Wireless Communication Protocols for Enhancing Highway Traffic Safety”, IEEE Communications magazine, January 2006.…

    • 3420 Words
    • 14 Pages
    Best Essays
  • Good Essays

    This form is subject to the Privacy Act of 1974. For use of this form, see AR 600-8-10.…

    • 506 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Have you ever wanted your life to become easier than it already is? Isn’t it always tiring driving a car which is a waste of energy and effort? Well the solution is simple. The latest technology involving the new driverless car will evolve the meaning of driving, allowing easier travel to places.…

    • 519 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    School Bus Safety

    • 856 Words
    • 3 Pages

    According to the National Center for Statistics and Analysis, since 1996, an estimated 1, 387 crashes were school-transportation related. This indicates that despite increased education, harsher laws for DWIs and similar crimes, and new slogans splayed on billboards and television ads such as dont drink and drive and buckle up, these have largely fallen on deaf ears. A popular cartoon, The Simpsons illustrates this point best with Otto, the bus driver, often neglecting stop signs, driving wildly, and even having his license revoked. Current vehicle accidents could easily be avoided even if you have Otto as your bus driver, especially incidents relating to school-transportation if emergency procedures were followed and implemented. Thus, when we examine the topic of Emergency Procedures, What do All School Bus Riders Need to Know? we must first look at emergency bus evacuations drills, secondly how to use emergency equipment, and lastly, what to do in the event that a bus driver is incapacitated.…

    • 856 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    A Vehicle-to-Vehicle Communication Protocol for Cooperative Collision Warning Xue Yang University of Illinois at Urbana-Champaign xueyang@uiuc.edu Jie Liu Microsoft Research liuj@microsoft.com Feng Zhao Microsoft Research zhao@microsoft.com Nitin H. Vaidya University of Illinois at Urbana-Champaign nhv@uiuc.edu Abstract This paper proposes a vehicle-to-vehicle communication protocol for cooperative collision warning.…

    • 4952 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    The coming of automatic programming equipment eventually brought about operation of most electromechanical equipment becoming completely automatic. The Automated Gate Pass System [AGPS] is a system that aims to replace the manual gate pass system used at the QUEEN’S BOROUGH SUBDIVISION (Located at Brgy. San Jose, City of San Fernando, Pampanga)with an automatic system which has the capability of handling gate usage and operation with little or no human intervention. The Automated Gate Pass System places emphasis on improved security, efficiency, ease of gate operation and maintenance of accurate records.…

    • 2770 Words
    • 12 Pages
    Good Essays
  • Good Essays

    IT/241 Wireless Security

    • 391 Words
    • 2 Pages

    Someone gaining unauthorized access to my network is something I would try to prevent at all costs. Unfortunately, even the best security measures can be compromised which allows someone to cause unspeakable harm to the devices connected. Out of the list of potential security breaches, Script Kiddies would be the one that could cause less damage than anything else. These hackers are typically people who know little about computers and may have not used them for very long. The script-kiddies download one of the most recently developed scripts and run them against targets on the Internet until they find a vulnerable target (Internet Security Systems, n.d.). These flaws are typically found quickly and repaired. These “hackers” are typically younger kids who like the power hacking give them, and typically are not looking to inflict harm to a network. While no attack is good, script-kiddies are the easiest to deal with on a network.…

    • 391 Words
    • 2 Pages
    Good Essays