##plugins.themes.academic_pro.article.main##

Abstract

Now a days people facing many problems because of traffic. To avoid this problem VANET is used here.In this group signature is used in VANETs to realized unauthorized authentication. In the existing system, group signatures is used and its suffers from long delay in the certificate revocation list (CRL) checking and process of signature verification, high message loss. In VANET in which roadside units (RSUs) are responsible for distributing group private keys and to managing vehicles in a localized manner. Then to avoid time consuming, hash message authentication (HMAC) is used here. The proposed work of this project is trinary partitioned black-burst-based broadcast protocol(3P3B) consists of two primary mechanisms. First, a mini distributed interframe space (DIFS) in a medium access control (MAC) sublayer is used to give higher access priority to the time critical emergency message as a higher priority and to communication channel compared with other messages. Second, a trinary is designed to iteratively partition the communication range into small sectors. In 3P3B outperforms benchmarks of the existing broadcast protocols in VANETs in terms of the packet delivery ratio, average message speed, message progress and communication delay.

Index terms—Batch group signature, cooperation, hash message authentication code (HMAC), 3P3B, emergency message(EM)

##plugins.themes.academic_pro.article.details##

Author Biographies

Mr.K. Kamal Kishore, Adhiparasakthi Engineering College, Melmaruvathur

Assistant Professor, Dept.of IT

M. Suvitha, Adhiparasakthi Engineering College, Melmaruvathur

PG Student, Dept.of IT
How to Cite
Kishore, M. K., & Suvitha, M. (2015). An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Communications. International Journal of Emerging Trends in Science and Technology, 2(02). Retrieved from https://igmpublication.org/ijetst.in/index.php/ijetst/article/view/489

References

1. S.-B. Lee, G. Pan, J.-S. Park, M. Gerla, and S. Lu, “Secure incentives for commercial adissemination in vehicular networks,” in Proc. 8th ACMInt. Symp. MobiHoc, Montreal, QC, Canada, Sep. 2007, pp. 150–159.
2. M. Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,” J. Comput. Security, vol. 15, no. 1, pp. 39–68, Jan. 2007.
3. K. Mershad and H. Artail, “A framework for secure and efficient data acquisition in vehicular ad hoc networks,” IEEE Trans. Veh. Technol.,vol. 62, no. 2, pp. 536–551, Feb.2013.
4. A.Wasef and X. Shen, “EMAP: Expedite message authentication protocol for vehicular ad hoc networks,” IEEE Trans. Mobile Comput., vol. 12, no. 1, pp. 78–89, Jan. 2013
5. C. P. Schnorr, “Efficient signature generation by smart cards,” J. Cryptol vol. 4, no. 3,pp. 161–174, 1991.
6. A. L. Ferrara, M. Green, S. Hohenberger, and M. Pedersen, “Practical short signature batch verification,” in Proc. Top. Cryptol.—CT-RSA, vol. 5473, Lecture Notes in Computer Science, 2009, no. 2009, pp. 309–324.
7. S. Frankel, R. Glenn, and S. Kelly, The AES-CBC cipher algorithm and its use with IPsec, RFC 3602, Sep. 2003.
8. D. Eastlake and P. Jones, US secure hash algorithm 1 (SHA1), RFC 3174, Sep. 2001.
9. X. Zhu, S. Jiang, L. Wang, H. Li, W. Zhang, and Z. Li, “Privacypreserving authentication based on group signature for VANETs,” presented at the IEEE Global Telecommunications Conf., Atlanta, GA, USA, Dec. 2013, Paper WN-23.
10. K. A. Shim, “An efficient conditional privacy-preserving authenticationscheme for vehicular sensor networks,” IEEE Trans. Veh. Technol.,vol. 61, no. 4, pp. 1874–1883, May 2012.
11. J. L. Huang, L. Y. Yeh, and H. Y. Chien, “AKABA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks,” IEEE Trans. Veh. Technol., vol. 60, no. 1, pp. 248–262, Jan. 2011 VANETs (R-OB-VAN),” in Proc. 9th Int. Conf. ITS Telecommun., Lille, France, 2009, pp. 382–387.
12. M. Khabazian, S. Aissa, and M. Mehmet-Ali, “Performance modeling of message dissemination in vehicular ad hoc networks with priority,” IEEEJ. Sel. Areas Commun., vol. 29, no. 1, pp. 61–71, Jan. 2011
13. B. Yuanguo, L. X. Cai, S. Xuemin, and Z. Hai, “Efficient and reliable broadcast in intervehicle communication networks: A cross-layer approach,” IEEE Trans. Veh. Technol., vol. 59, no. 5, pp. 2404–2417,Jun. 2010.
14. OMNeT++ Network Simulation Frame-work. [Online]. Available: http://www-.omnetpp.org
15. The Highway Code[Online].Available: https://www.gov.uk/browse/driving/highwaycode
16. M. Xiaomin, Z. Jinsong, and W. Tong, “Reliability analysis of one-hop safety-critical broadcast services in VANETs,” IEEE Trans. Veh. Technol., vol. 60, no. 8, pp. 3933–3946, Oct. 2011.
17. C. Xianbo, H. H. Refai, and M. Xiaomin, “A quantitative approach to evaluate DSRC highway inter-vehicle safety communication,”in Proc. IEEE Global Telecommun. Conf., Washington, DC, USA, 2007,pp. 151–155
18. O. K. Tonguz, N. Wisitpongphan, J. S. Parikh, F. Bai, P. Mudalige, and V. Sadekar, “On the broadcast storm problem in ad hoc wireless networks,”in Proc. 3rd Int. Conf. Broadband Commun. Netw. Syst., San Jose, CA, USA, 2006, pp. 1–11.
19. N. Wisitpongphan, O. K. Tonguz, J. S. Parikh, P. Mudalige, F. Bai, andV. Sadekar, “Broadcast storm mitigation techniques in vehicular ad hoc networks,” IEEE Wireless Commun., vol. 14, no. 6, pp. 84–94, Dec. 2007.
20. H. K. Chin and J. P. M. G. Linnartz, “Analysis of the RTS/CTS multiple access scheme with capture effect,” in Proc. IEEE 17th Int. Symp. Pers.,Indoor Mobile Radio Commun., Helsinki, Finland, 2006, pp. 1–5 Chakkaphong Suthaputchakun (M’13) received the B.Eng. degree.