International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 88

Research Paper | Electronics & Communication Engineering | India | Volume 3 Issue 8, August 2014


HMAC Based Secure Authentication of VANETs

Swagat. S. Gudagudi | Dr. Veena Desai


Abstract: The Vehicular Ad-hoc Network (VANET) has been studied in many fields since it has the ability to provide a variety of services, such as detecting oncoming collisions and providing warning signals to alert the driver. The services provided by VANET are often based on collaboration among vehicles that are equipped with relatively simple motion sensors and GPS units. Awareness of its precise location is vital to every vehicle in VANET so that it can provide accurate data to its peers. Hence the data in VANET communicating between sender and receiver must not be revealed or modified by other impersonators or other vehicles participating in network. In this proposed work the authentication of the vehicles (nodes) by using Hash based message authentication of nodes is computed and the message digest function can be used of either MD-1, 256, 512 for the message integrity and the symmetric key mechanism is performed. The simulation is done by using MatLab tool


Keywords: Authentication, Privacy, Private, VANET


Edition: Volume 3 Issue 8, August 2014,


Pages: 1471 - 1476


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Swagat. S. Gudagudi, Dr. Veena Desai, "HMAC Based Secure Authentication of VANETs", International Journal of Science and Research (IJSR), Volume 3 Issue 8, August 2014, pp. 1471-1476, https://www.ijsr.net/get_abstract.php?paper_id=2015597

Similar Articles with Keyword 'Authentication'

Downloads: 101

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1054 - 1061

Review on Methods of Authentication of Images with Data Repair Capability

Vrushali Chirmade | Dimple Chaudhari [2]

Share this Article

Downloads: 104

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2018 - 2021

Design and Implementation of Ballot Malfunctioning System Avoidance Security Optimization

A. Lalitha [2] | N. Muthu Sankar

Share this Article
Top