Preview

protocols

Good Essays
Open Document
Open Document
1257 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
protocols
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks

ABSTRACT

Vehicular Ad Hoc Networks (VANETs) adopt the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs) for their security. In any PKI system, the authentication of a received message is performed by checking if the certificate of the sender is included in the current CRL, and verifying the authenticity of the certificate and signature of the sender. In this paper, we propose an Expedite Message Authentication Protocol (EMAP) for VANETs, which replaces the time-consuming CRL checking process by an efficient revocation checking process. The revocation check process in EMAP uses a keyed Hash Message Authentication Code (HMAC), where the key used in calculating the HMAC is shared only between non-revoked On-Board Units (OBUs). In addition, EMAP uses a novel probabilistic key distribution, which enables non-revoked OBUs to securely share and update a secret key. EMAP can significantly decrease the message loss ratio due to the message verification delay compared with the conventional authentication methods employing CRL. By conducting security analysis and performance evaluation, EMAP is demonstrated to be secure and efficient.

Existing System

In Existing System, a security attack on VANETs can have severe harmful or fatal consequences to legitimate users. Consequently, ensuring secure vehicular communications is a must before any VANET application can be put into practice the CRL size in VANETs is expected to be large for the following reasons:
To preserve the privacy of the drivers, i.e., to abstain the leakage of the real identities and location information of the drivers from any external eavesdropper should be preloaded with a set of anonymous digital certificate, where the OBU has to periodically change its anonymous certificate to mislead attackers. Consequently, a revocation of an OBU results in revoking all the certificate carried by that OBU leading to a

You May Also Find These Documents Helpful

  • Powerful Essays

    It230 Unit 3 Assignment 1

    • 5629 Words
    • 23 Pages

    Vehicular Ad hoc Network (VANET), a subclass deriving from Mobile Ad Hoc networks (MANET), is a promising approach for future intelligent transportation system…

    • 5629 Words
    • 23 Pages
    Powerful Essays
  • Better Essays

    ISSC361 FinalProject

    • 1124 Words
    • 4 Pages

    Manufacturers are incorporating more and more computers into automobiles. This causes a new type of threat to today’s society. Challenges come to protecting these systems and the people that are driving the vehicles.…

    • 1124 Words
    • 4 Pages
    Better Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Better Essays

    GEOSYNCHRONOUS orbiting satellites are the type used by the most popular satellite Internet access service providers.…

    • 925 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    They are numerous protocols and standards that are used for communications over networks. But only a few protocols are cryptographic in nature. Cryptographic protocols provide secure communication between two communicating entities over the insecure network. Cryptographic protocols use either symmetric or asymmetric or a combination of both the algorithm to secure the communication channel. Presented in this paper are various cryptographic protocols that provide encryption to data in transit.…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Self Driving Dbq

    • 498 Words
    • 2 Pages

    Anyone can hack into the systems, causing peculiar incidents like two cars constantly bumping into each other. The incidents would be part of a statistic. Document D’s statement on the self-driving cars’ speed is unsatisfactory. The reason is that people drive faster than twenty miles per hour during commuting hours, and it would worsen commute. On a common day, it takes, at least, thirty minutes or less to go across the Bay Bridge. With the self-driving cars, it would slow down the traffic on the popular commute areas. Therefore, self-driving cars will take years to develop the ability to be as fast as humans in the ability of…

    • 498 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Vergara, Lisajoyce “Driver Electronic Device Use in 2010” Traffic Safety Facts, N.P., 2011 December Web. 1 June 2013…

    • 1409 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Over the years, driving conditions have changed greatly, with the introduction of smart devices, phones, and other technology distracting drivers with text messages, tweets and gaming apps while they are on the road. In order to combat the distractions and to lessen the amount of crashes caused by technological devices each year, companies, like Safe Drive Systems, are creating their own affordable technological devices to protect and keep drivers safe.…

    • 260 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Autonomous cars have many applications a driver should always be capable of taking over as a safety measure. Putting too much faith into self-driving vehicles will cause people to be less alert they themselves may depend too highly on the vehicle's decision making putting themselves at risk. The authors of a Gale opposing viewpoints article made it known that “At a 2013 technology conference in Las Vegas, researchers demonstrated how the computers in driverless cars could be hacked to making them drive erratically and dangerously. “These virus’ are capable of taking over a car's control system wreaking havoc on the road at any moment. As stated by Zeller “the virus’ supposedly enter the cars over the Bluetooth wireless link that lets drivers use their cellphones to carry on hands-free conversations through the cars' microphones and speakers.” These new devices are flawed misleading car buyers into seeing these system as an improvement reducing the risk while at the same time providing a path to put yourselves in harm’s…

    • 1469 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Self-Driving Cars

    • 3778 Words
    • 16 Pages

    This paper will present information about self-driving cars and smart transportation systems. The technological barriers, security concerns and privacy issues concerning the implementation of these new systems will be addressed. The impact they will have on society, business, and government will be explored. Supporting data from research papers, news articles, and industry reports will be presented. The technology will be adopted because it will provide travelers with a safe, reliable, and convenient form of transportation. It will save people time and money and it will save thousand of lives every year. The measured evolution and introduction of self-driving cars and smart transportation infrastructure is important so it can allow business, consumers, and governments to adjust to the change in the way people and goods are transported.…

    • 3778 Words
    • 16 Pages
    Better Essays
  • Powerful Essays

    This project is designed and implemented based on the RFID and Zigbee technology used to transmit the vehicle engine number to the toll gate. This system helps to avoid car theft and avoid trespasser to the nation. A unique identity card (RFID) which holds information about vehicle’s owner, license, insurance and owner’s banking information, photo ID, road tax.…

    • 9816 Words
    • 40 Pages
    Powerful Essays
  • Good Essays

    Now days in the modern world, motorized automobiles have either power locked or a remote keyless system which operates by broadcasting radio waves on a particular frequency. Modern systems implement encryption to prevent car thieves from intercepting and spoofing the signal. The system signals that has either locked or unlocked the car usually through some fairly discreet combination of flashing vehicle lamps, a distinctive sound other than the horn or some usage of the horn itself. The functions of a remote keyless entry system are contained on…

    • 736 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Vehicle Tracking System

    • 3331 Words
    • 14 Pages

    A vehicle tracking system combines the installation of an electronic device in a vehicle, or fleet of vehicles, with purpose-designed computer software to enable the owner or a third party to track the vehicle's location, collecting data in the process. Modern vehicle tracking systems commonly use Global Positioning System (GPS) technology for locating the vehicle, but other types of automatic vehicle location technology can also be used. Vehicle information can be viewed on electronic maps via the Internet or specialized software. In the main they are easy to steal, and the average motorist has very little knowledge of what it is all about. To avoid this kind of steal we are going to implement a system it provides more security to the vehicle. Existing System: In the previous system security lock and alarm is implemented in a car. If a burglar can break open the lock, then it becomes easy for the burglar to steal the car. And in old security system if the car is stolen then it is out of the owner control. User doesn’t have any awareness about the current location of the vehicle. The Proposed System: The RF transmitter is attached with the vehicle which has its own identification. This data will be continuously transmitted to the RF receiver connected to the…

    • 3331 Words
    • 14 Pages
    Good Essays
  • Powerful Essays

    Rfid Based App

    • 6311 Words
    • 26 Pages

    With the cost decline in wireless and GPS technology, Auto ID systems can integrate these high-end technologies with IT systems to offer not only the identification functionality but also value added information and service in the applied systems. It can greatly improve the information visibility in the system information flow.…

    • 6311 Words
    • 26 Pages
    Powerful Essays
  • Powerful Essays

    Session Initiation Protocol

    • 2671 Words
    • 11 Pages

    AGENDA IMS AND HOW IT RELATES TO THE TOPIC OF SIP AND CONTEXT Concept of SIP Service Delivery Scenarios Context –What is it? How to Achieve Context Awareness EU/Global initiatives on Ambient Networks Summary plus concluding statements…

    • 2671 Words
    • 11 Pages
    Powerful Essays