Downloads: 117 | Views: 286
Review Papers | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015 | Popularity: 6.7 / 10
Review on Message Authentication Protocol for Vehicular Ad Hoc Network
Sarika A. Velukar, Dr. M. S. Ali
Abstract: Intelligent Transportation Systems are aimed at addressing critical issues like passenger safety and traffic congestion, by integrating information and communication technologies into transportation infrastructure and vehicles. They are built on top of self organizing networks, known as a Vehicular Ad hoc Networks (VANET), Vehicular communication systems facilitate communication devices for exchange of information among vehicles and between vehicles and roadside equipment. As vehicles communicate through wireless network, variety of attacks can take place like injecting false information and modifying messages. A security attack on VANETs can have severe harmful or fatal consequences to legitimate users. So there is need to have secure vehicular communications. A novel solution to secure VANETs is to deploy Public Key Infrastructure (PKI), and to use Certificate Revocation Lists (CRLs) for managing the revoked certificates. For this purpose a new Message Authentication Protocol is proposed for VANETs, which replaces the time-consuming CRL checking process by an efficient revocation checking process. The revocation check process uses a keyed Hash Message Authentication Code. This new protocol significantly decrease the message loss ratio due to the message verification delay and end to end delay compared with the conventional authentication methods employing CRL.
Keywords: VANET, CRL, PKI, AUTHENTICATION
Edition: Volume 4 Issue 5, May 2015
Pages: 1449 - 1453
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 629 - 634A Face Spoof Detection using Feature Extraction and SVM
Lovely Pal, Renuka Singh
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Computer Science & Engineering, India, Volume 12 Issue 6, June 2023
Pages: 2966 - 2970Security in Kubernetes: A Comprehensive Review of Best Practices
Dinesh Reddy Chittibala
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024
Pages: 1490 - 1494An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication
Mamta, Dr. Shiva Prakash