Open Access   Article Go Back

A Dynamic Key Based Authentication Using Vehicular Ad-Hoc Network Communication

R. Suganya1

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-6 , Page no. 632-636, Jun-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i6.632636

Online published on Jun 30, 2018

Copyright © R. Suganya . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R. Suganya, “A Dynamic Key Based Authentication Using Vehicular Ad-Hoc Network Communication,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.632-636, 2018.

MLA Style Citation: R. Suganya "A Dynamic Key Based Authentication Using Vehicular Ad-Hoc Network Communication." International Journal of Computer Sciences and Engineering 6.6 (2018): 632-636.

APA Style Citation: R. Suganya, (2018). A Dynamic Key Based Authentication Using Vehicular Ad-Hoc Network Communication. International Journal of Computer Sciences and Engineering, 6(6), 632-636.

BibTex Style Citation:
@article{Suganya_2018,
author = {R. Suganya},
title = {A Dynamic Key Based Authentication Using Vehicular Ad-Hoc Network Communication},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {632-636},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2232},
doi = {https://doi.org/10.26438/ijcse/v6i6.632636}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.632636}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2232
TI - A Dynamic Key Based Authentication Using Vehicular Ad-Hoc Network Communication
T2 - International Journal of Computer Sciences and Engineering
AU - R. Suganya
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 632-636
IS - 6
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
352 228 downloads 134 downloads
  
  
           

Abstract

A vehicular Ad-hoc network is an ad-hoc network of vehicles supported by fixed infrastructure. It is characterized by a highly dynamic topology with vehicles moving in a restricted road environment with different speeds. Vehicles are equipped with wireless communication devices known as On-Board Units (OBU) which enables them to communicate with other vehicles and Roadside Units. Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) are two typical modes of vehicle communication in VANETs. Envisioned applications such as traffic accident prevention, battlefield control commands transmission and emergency coordination rescue arose a great deal of academic and industrial research on Vehicular Ad hoc Networks. In this research, developed a new security scheme called elliptic curve cryptography and ESSAP uses an algorithm to create the encrypted string. Using the encrypted string elliptic curve cryptography generated a docket, which will be transmitted from one node to another. The receiver node may desire to know that the docket has not been attacked in transit. In proposed research from our usage demonstrate that elliptic curve cryptography can ensure multicast source legitimacy and fundamentally upgrade the effectiveness of verification for multicast correspondence in VANETs, and our execution demonstrates that elliptic curve cryptography plan can be effortlessly conveyed in genuine vehicular ad-hoc network condition.

Key-Words / Index Term

Elliptic curve cryptography, Key Generation, Security

References

[1] X. lin, X. Sun, X. Wang, C. Zhang, P. Ho, X. Shen.“TSVC: Timed Efficient and Secure Vehicular Communications with Privacy Preserving.” IEEE Transactions on Wireless Communications, to appear.
[2] Studer, F.Bai, B. Bellur, and A. Perrig, “Flexible, extensible, and efficient VANET authentication”, Proceeding of the 6th Annual Conference on Embedded Security in Cars (escar 2008), Noverbem 2008.
[3] A.Perrig, R.Canneti, D.Song and J.D. Tygar. “Efficient and Secure Source Authentication for Multicast” In Network and Distributed System Security Symposium, NDSS ’01, Februray 2001.
[4] Chaurasia, B.K., Verma, S., Bhasker, S.M.: Message broadcast in VANETs using Group Signature. In: Fourth International Conference on Wireless Communication and Sensor Networks, pp.131-136 (2008).
[5] K.Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki. CARAVAN: providing location privacy for VANET. In Workshop on Embedded Security in Cars (ESCAR), 2005.
[6] M. Raya, A. Aziz, and J.-P. Hubaux, “Efficient secure aggregation in VANETs” in ACM Workshop on Vehicular Ad hoc Networks (VANET), 2006.
[7] H.-J. Reumerman, M. Roggero, and M. Ruffini. “The application-based clustering concept and requirements for intervehicle networks.” IEEE Communications magazine, 43(4): 108-113, April 2005.
[8] H. Harney and C. Muckenhirn. Group Key Management Protocol (GKMP) architecture.RFC 2094, 1997.
[9] X.Hong, M.Gerla, G.Pei, and C.Chiang. A group mobility model for ad hoc wireless networks. In Proceedings of the ACM International Workshop on Modeling and Simulation of Wireless and Mobile Systems (MSWiM), August 1999.