issn: 0975-766x coden: ijptfi available online through ... · final results will be shown by graphs...

13
Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15620 ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com A KEYED HASH MESSAGE AUTHENTICATION CODE TECHNIQUE FOR SECURE COMMUNICATION IN VANETS Akshay Gaikwad* 1 , Dr. Pradeep Ready C.H. 2 , S. Bharath Bhushan 3 1, 2, 3 School of Information Technology & Engineering, VIT University, Tamilnadu, INDIA. Email: [email protected] Received on 26-07-2016 Accepted on 29-08-2016 Abstract Vehicular Ad Hoc Networks (VANETs) are made by applying the standards of Mobile Ad hoc Networks (MANETs) the unconstrained production of a remote system for information trade to the space of vehicles. They are a key part of intelligent transportation frameworks. Public Key Infrastructure (PKI) with hashing mechanism can be used to secure VANETs where the tamper proof device stores a number of encryption keys which are renewed upon visiting a Trusted Authority (TA).The proposed system is an endeavour to upgrade the current authentication, privacy preservation and non-repudiation with keyed hashing mechanism. Proficient Message Authentication Protocol can on a very basic level decrease the message loss ratio on account of the message check delay compared and the existing authentication systems using Certification Revocation List (CRL).In this process we are using Hash Message Authentication Protocol (HMAP) where a key is utilized to calculating encryption and decryption with hash message using Elliptical Curve Cryptographic (ECC) function which is shared just between non revoked On-Board Units (OBUs).In this paper, the analysis of performance evaluation and security of the proposed hashing mechanism is investigated analytically and through network simulation. Hence, extensive analysis is performed to demonstrate how the proposed mechanism can dynamically support efficient and cost-reduced keyed hash message authentication. The final results will be shown by graphs generated on the NS2 simulator. Keywords: VANET, Trusted Authority (TA), On Board Unit (OBU), Certification Revocation List (CRL). I. Introduction A VANET comprises of system substances, including On board units (OBU), Road side units (RSU), and a Trusted Authority (TA). These elements shape a system progressive system as showed in Fig. 1. Either an automaker or government power assumes the part of the TA in charge of a key era and circulation. The RSUs [1][2] are in charge of directing correspondence amongst vehicles, and conveying messages from the TA. The RSUs are introduced in

Upload: donhu

Post on 18-Apr-2018

213 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: ISSN: 0975-766X CODEN: IJPTFI Available Online through ... · final results will be shown by graphs generated on the NS2 simulator. Keywords: VANET, Trusted Authority ... VANET is

Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology

IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15620

ISSN: 0975-766X

CODEN: IJPTFI

Available Online through Research Article

www.ijptonline.com

A KEYED HASH MESSAGE AUTHENTICATION CODE TECHNIQUE FOR SECURE

COMMUNICATION IN VANETS Akshay Gaikwad*

1, Dr. Pradeep Ready C.H.

2, S. Bharath Bhushan

3

1, 2, 3School of Information Technology & Engineering, VIT University, Tamilnadu, INDIA.

Email: [email protected]

Received on 26-07-2016 Accepted on 29-08-2016

Abstract

Vehicular Ad Hoc Networks (VANETs) are made by applying the standards of Mobile Ad hoc Networks (MANETs)

the unconstrained production of a remote system for information trade to the space of vehicles. They are a key part of

intelligent transportation frameworks. Public Key Infrastructure (PKI) with hashing mechanism can be used to secure

VANETs where the tamper proof device stores a number of encryption keys which are renewed upon visiting a

Trusted Authority (TA).The proposed system is an endeavour to upgrade the current authentication, privacy

preservation and non-repudiation with keyed hashing mechanism. Proficient Message Authentication Protocol can on

a very basic level decrease the message loss ratio on account of the message check delay compared and the existing

authentication systems using Certification Revocation List (CRL).In this process we are using Hash Message

Authentication Protocol (HMAP) where a key is utilized to calculating encryption and decryption with hash message

using Elliptical Curve Cryptographic (ECC) function which is shared just between non revoked On-Board Units

(OBUs).In this paper, the analysis of performance evaluation and security of the proposed hashing mechanism is

investigated analytically and through network simulation. Hence, extensive analysis is performed to demonstrate how

the proposed mechanism can dynamically support efficient and cost-reduced keyed hash message authentication. The

final results will be shown by graphs generated on the NS2 simulator.

Keywords: VANET, Trusted Authority (TA), On Board Unit (OBU), Certification Revocation List (CRL).

I. Introduction

A VANET comprises of system substances, including On board units (OBU), Road side units (RSU), and a Trusted

Authority (TA). These elements shape a system progressive system as showed in Fig. 1. Either an automaker or

government power assumes the part of the TA in charge of a key era and circulation. The RSUs [1][2] are in charge

of directing correspondence amongst vehicles, and conveying messages from the TA. The RSUs are introduced in

Page 2: ISSN: 0975-766X CODEN: IJPTFI Available Online through ... · final results will be shown by graphs generated on the NS2 simulator. Keywords: VANET, Trusted Authority ... VANET is

Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology

IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15621

standalone towers and sorted out as per the system topology. The OBUs [1][4] are stacked in vehicles and are in

charge of accepting and approving messages. Vehicle-to-Infrastructure (V2I), Vehicle-to-Vehicle (V2V), and

Infrastructure-to-Infrastructure (I2I) are vehicular correspondence modes as appeared in Fig. 1. V2I permits vehicles

to speak with roadside units while V2V permits vehicles to speak with each other. I2I permits roadside units to speak

with each other .For security key storage a VANET relies on upon a Tamper Proof Device (TPD)[1][4] as the

primary stockpiling for security correspondence components. Vehicles, while making their periodical visits to the TA

get some security components and are put away in both the vehicle and the TA.

Fig.1 Hierarchical communication of all parts of VANET system.

The fundamental reason for the project is to build up a solid structure for validation, protection safeguarding, and

non-repudiation of correspondence information among the vehicles. The mischances out and about are a real issue

everywhere throughout the world. This issue, for the most part, emerges because of various reasons, for example,

high speeds of the vehicle, inaccessibility of observing frameworks, no activity signals, and fewer speed barkers at

the swarmed places. A Vehicular Ad-hoc Network (VANET) assumes an essential part to avoid such mishaps.

VANET is a remote bury vehicular correspondence system and it is advanced from Mobile Ad-hoc-system. In this

system, a remote correspondence works in the middle of vehicles and vehicles to street side unit.VANETs can be

valuable in crisis circumstances like a free section for crisis vehicles, for example, an Ambulance or Police vehicle.

In VANET, an On-Board Unit (OBU) is joined to each vehicle, which speaks with a Road Side Unit (RSU) which is

arranged at street side area. At that point, OBUs transmits its data to RSU like its area, rate, and heading. After that

RSU sends required data like activity notices to OBUs, as like this correspondence is traded. Here, the

correspondence can happen in the middle of OBU and RSU to trade some security highlights. Likewise, vehicles can

speak with each other without nearness of RSU.Although there are different focal points of the VANET, it is

Page 3: ISSN: 0975-766X CODEN: IJPTFI Available Online through ... · final results will be shown by graphs generated on the NS2 simulator. Keywords: VANET, Trusted Authority ... VANET is

Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology

IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15622

additionally powerless because of its structures and operation. The VANET faces distinctive issues like protection,

steering, security, network, and nature of administrations. From the greater part of the above security is the significant

issue in VANET. Security can be of information, personality and area. In this manner, security and protection issues

are essential difficulties for the fate of VANET. In this paper, difficulties and assaults in VANET are talked about.

Likewise, a study on VANET security and with protection procedure with near study has been done.

The main aim this project to provide strong authentication framework which overcome the existing system problem.

In VANET, two sorts of key administration are available. The symmetric key based verification plans are proposed

for VANETs, which utilize symmetric key cryptographies for the message confirmation. The disadvantage of

utilizing symmetric key administration is that vehicles need to confirm each other by means of the trust powers,

which is not suitable for extensive scale vehicular correspondences in VANETs. The asymmetric key based

verification is broadly received in view of the different keys utilized for encryption and decoding. Verification

systems utilizing the ID-based authentication (IBS)[15] plans taking into account the ID-based cryptography (IBC)

have been proposed to diminish the correspondence overheads in which the certificate administration process has

been simplified by utilizing the advanced mark plans. We take note of that, the IBS plans can be embraced to the

confirmation administration for VANETs, in which each vehicular personality is utilized as an open key for

marking/checking messages in correspondence. Utilizing ID-based online/offline signature (IBOOS) is an alluring

answer for validation in VANETs, for reducing the calculation overhead of the IBS process. An IBOOS[14] plan

expands efficiency of the matching procedure by isolating the marking process into an offline stage and an online

stage, in which the verification is nearly more efficient than that of IBS. In this paper, unique in relation to the current

work, we propose a verification system by using the IBS plan in the V2R correspondence, and together with the

IBOOS plan in the V2V correspondence for better execution. In IBOOS [14] for VANETs, the offline stage can be

executed at first at RSUs or vehicles, while the online stage is to be executed in vehicles amid the V2V

correspondence. When traffic mischances or certain violations happen, the vehicle namelessness ought to be

restrictively retrievable, and the character data ought to be uncovered to legitimate powers to build up the risk of

mishaps or wrongdoings, which is supposed contingent protection or contingent secrecy. The non-revocation

administration in VANETs keeps a vehicle from denying past responsibilities or activities. For instance, vehicles

bringing on mishaps ought to be dependably identified, or a vehicle can't refuse any assistance got. Subsequently, the

contingent security conservation with non-denial administration is required for VANETs, against the misuse of

Page 4: ISSN: 0975-766X CODEN: IJPTFI Available Online through ... · final results will be shown by graphs generated on the NS2 simulator. Keywords: VANET, Trusted Authority ... VANET is

Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology

IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15623

mysterious verification systems by malevolent vehicles to accomplish pernicious objectives or break from liabilities.

The pseudonymous verification utilized as a part of vehicular interchanges can give the protection conservation a

compelling following component, which is utilized just by the trusted powers (e.g., the certification power (CA)) to

uncover the genuine personality of malignant vehicles. Despite the fact that there exists numerous security structures

tending to the protection safeguarding are diverse as a part of every proposition, which render these issues more

critical and more perplexing to be taken care of in VANETs.

II. Related Work

In this section, we are mentioned about the research works that are already existed in VANET for authentication and

privacy preservation problems. So, by referring this work we analyse some drawbacks and make the strong

authentication framework.

[1] In this paper they are discussing on VANET, confirmation is a vital security administration for both between

vehicle and vehicle roadside correspondences. They propose a novel structure with conservation and disavowal

(ACPN) for VANETs. In ACPN, we present the general population key cryptography (PKC) to the pen name, which

guarantees honest to goodness outsiders to accomplish the non-renouncement of vehicles by getting vehicles' genuine

IDs. The self-created PKC based nom de plumes additionally utilized as identifiers rather than vehicle IDs for the

protection safeguarding verification, while the redesign of the pen names on vehicular requests. Validation, protection

safeguarding, non-disavowal and different targets of ACPN have been investigated for VANETs. Run of the mill

execution assessment has been led utilizing proficient IBS and IBOOS plans. We demonstrate that the proposed

ACPN is achievable and sufficient to be utilized proficiently as a part of the VANET environment.

[2]Vehicular specially appointed system (VANET) is a rising new innovation incorporating impromptu system,

remote LAN (WLAN) and cell innovation to accomplish canny between vehicle correspondences and enhance street

activity security and proficiency. VANETs are recognized from different sorts of impromptu systems by their half

and half system designs, hub development qualities, and new application situations. Subsequently, VANETs posture

numerous novel systems administration research challenges and the outline of a proficient steering convention for

VANETs is extremely critical. In this article, we talk about the exploration test of directing in VANETs and review

late steering conventions and related versatility models for VANETs.

[3]This system is another remote systems administration worldview for portable hosts. In this paper, we composed a

savvy transport framework. The ITS (wise transport framework) incorporates two major capacity modules:

Page 5: ISSN: 0975-766X CODEN: IJPTFI Available Online through ... · final results will be shown by graphs generated on the NS2 simulator. Keywords: VANET, Trusted Authority ... VANET is

Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology

IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15624

Information handling application framework and Road condition data exchanging framework. The principle errand of

the street condition data moving module is responsible for the data trade of the auto inside, auto to auto and auto to

the street. The module works in a specially appointed system, we call the system VANET (vehicular impromptu

system). Vehicular systems are liable to wind up the most significant type of portable specially appointed systems.

For guaranteeing the framework can run typically, the data can be exchanging accurately and fleetly, the security of

VANET (vehicular specially appointed system) of the street condition data exchanging framework is pivotal.

[4]In this paper, they presents a productive contingent protection safeguarding (ECPP) convention in vehicular

specially appointed systems (VANETs) to address the issue on mysterious validation for security messages with

power traceability. The proposed convention is described by the era of on-the-fly brief time unknown keys between

on-load up units (OBUs) and roadside units (RSUs), which can give quick mysterious verification and protection

following while minimizing the required stockpiling for brief time unknown keys. We exhibit the benefits picked up

by the proposed convention through broad examination.

[5]Remote correspondence innovation picked up a considerable measure of significance. It has given a considerable

measure of preferences to individuals by raising different innovations going from Wireless LAN to Mobile Ad Hoc

Networks. This innovation is assuming the vital part in street well-being by staying away from street mischances

through building the remote correspondence between vehicles on the streets. Be that as it may, in this system, the

significant issue is protection and security of the member data. The present paper manages the overview of the

vehicular specially appointed system. In this work, we have clarified diverse existing conventions which ensure the

secrecy in VANET. Likewise, we have portrayed different security difficulties, qualities, and diverse issues in

VANET. In this paper, difficulties and assaults in VANET are talked about. Likewise, the study on VANET security

and protection strategies with near study has been completed.

III. Existing System

The symmetric key based confirmation plans for VANETs, which utilize symmetric key cryptographies for the

message verification. The downside of utilizing symmetric key administration is that vehicles need to validate each

other through the trust powers, which is not suitable for huge scale vehicular correspondences in VANETs. The

asymmetric key based verification is generally received due to the different keys utilized for encryption and

decoding. The studies of the asymmetric key based authentication are classified into two classes: the public key

infrastructure (PKI) based authentication and the identity (ID) based authentication., the framework accessibility is

Page 6: ISSN: 0975-766X CODEN: IJPTFI Available Online through ... · final results will be shown by graphs generated on the NS2 simulator. Keywords: VANET, Trusted Authority ... VANET is

Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology

IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15625

still not pervasive or achievable, in light of the fact that such systems require extra correspondence to deal with the

vehicular authentications and the certification revocation list (CRLs) that may bring about substantial correspondence

and calculation overheads.In Vehicular Ad-hoc Networks (VANETs), validation is a significant security

administration for both between vehicle and vehicle roadside units. Then again, vehicles must be protected from the

restricted use of their private information and the assaults on their security, and in addition to be fit for being explored

for liabilities from non-repudiation.

Disadvantages of Existing System

Symmetric key administration is not suitable for huge scale vehicular correspondence

May bring about substantial correspondence and calculation overheads

Verification of vehicle and Infrastructure can be effortlessly delicate.

The message can't be safely sent between Vehicles.

IV. Proposed System

A VANET essentially comprises of three system parts: street side units, vehicles (clients) and a local trusted power.

The administration of VANETs is generally partitioned into various areas, each of which is served by one RTA as the

confirmation power. This system structure in VANET situations could be considered as the general urban vehicular

interchanges structure [21].

Fig: Proposed System Architecture.

In the proposed System for VANETs, we consider the UVC structure for VANETs, which comprises of an RTA,

limited numbered enrolled RSUs along roadsides, and an expansive number of vehicles on or by the streets. An RTA

Page 7: ISSN: 0975-766X CODEN: IJPTFI Available Online through ... · final results will be shown by graphs generated on the NS2 simulator. Keywords: VANET, Trusted Authority ... VANET is

Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology

IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15626

serves in one area, e.g., a city, a territory or a nation. An ID pool of RSUs in an area is preloaded in every vehicle, in

which the quantity of RSUs is normally settled that does not change as often as possible. The vehicle enrolment is

required before a vehicle begins off to take off in an area. In the event that the vehicle is recently produced, it can be

enlisted to the RTA at the auto merchant by means of a safe system framework. In the event that a vehicle is crashed

into another locale, it can be enlisted to the RTA at the passage exit organization or the outskirt movement office by

means of the protected system base. Through the vehicle enrolment of every vehicle, the RTA registers the vehicle ID

and profile, then distributes and disperses the RSU ID pool and the guaranteed space parameters for confirmation to

the vehicle, which is characterized.

Advantages of proposed system

Less computational and communication overhead

More authentication Efficiency

Provide more security

Reusability

Flow Chart of System Process

Page 8: ISSN: 0975-766X CODEN: IJPTFI Available Online through ... · final results will be shown by graphs generated on the NS2 simulator. Keywords: VANET, Trusted Authority ... VANET is

Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology

IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15627

Algorithm of Elliptical Curve Cryptography

Elliptical Curve Cryptography is the most effective public key encryption plan in light of elliptic bend ideas that can

be utilized to make quicker, littler, and productive cryptographic key. Elliptic bend framework is connected to

cryptography were initially proposed in 1985 freely by Neal Koblitz and Victor Miller. The discrete logarithm issue

on open bend gatherings is accepted to be more troublesome than the comparing issue in the basic limited field.

Public key cryptography is powerful security answer for give secure versatile correspondence. ECC can be utilized

with public key encryptions techniques, for example, RSA, and Diffie-Hellman key trade correspondence security

through encryption, confirmation of sender and advanced mark to guarantee message respectability. ECC can sets up

equal security with lower registering force and battery asset utilization.

For current cryptographic purposes, an elliptic curve shows following mathematical expression

y2=x3+ax+b

Fig-2. Curve for Elliptical Curve.

Step1: Key Generation

The key is animportant part of the algorithm where we need to make both public and private keys. The sender should

be encoding the message with recipient's public key and the receiver should be decodedby its private key.

Consider to choose a number "d" inside the scope of 'n'.

Utilizing the accompanying mathematical statement we can create the general public key

N = d * M

d = The irregular number that we have chosen inside the scope of (1 to n-1). M is the point on the bend.

"N" is people in general key and "d" is the private key.

Page 9: ISSN: 0975-766X CODEN: IJPTFI Available Online through ... · final results will be shown by graphs generated on the NS2 simulator. Keywords: VANET, Trusted Authority ... VANET is

Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology

IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15628

Step2: Encryption of Algorithm

Give "p" a chance to be the message that we are sending. We have to represent this message on the curve. These have

in-depth implementation details.

These have inside and out execution points of interest. All the development research on ECC is finished by an

organization called certicom.

Consider "p" has the point "P" on the curve 'E'. Arbitrarily select "k" from [1 – (n-1)].

Two figure writings will be produced given it a chance to be C1 and C2.

C1 = k*M

C2 = P + k*N

C1 and C2 will be sent.

Step3: Decryption of Algorithm

We need to get back the message "p" that was sent to us,

P = C2 – d * C1

P is the first message that we have sent.

Proof of Algorithm

How does we get back the message”,

P = C2 – d * C1

‘P’ can be represented as ‘C2 – d * C1’

C2 – d * C1 = (P + k * N) – d * (k * M) (C2 = P + k * N and C1 = k * M )

= P + k * d * M – d * k *M (cancelling out k * d * M)

= P (Original Message)

V. Results and Discussion

The outcomes area of the proposition is the place we report the discoveries of our study in light of the strategy (or

methodologies) we connected to accumulate data. The outcomes segment ought to just express the discoveries of the

exploration orchestrated in an intelligent arrangement without predisposition or elucidation. This area of depicting

results which are especially fundamental for demonstrating our proposed framework execution as for the current

system .We can see their near examination by utilizing graphs. In the graphs X-axis is showing distance in km and Y-

axis is showing time in seconds.

Page 10: ISSN: 0975-766X CODEN: IJPTFI Available Online through ... · final results will be shown by graphs generated on the NS2 simulator. Keywords: VANET, Trusted Authority ... VANET is

Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology

IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15629

Performance Evolution: In this area, we can assess the execution of reproduction. We are utilizing the X graph for

assessing the execution. We pick the three assessment measurements as follows:

1. Correspondence Overhead

2. Verification Efficiency

3. Computational Delay

1. Communication Delay: This part gives an estimation of proficiency on applying the proposed System for

VANETs, by investigating the calculation overhead and the correspondence overhead. We concentrate on applying

the effective IBS and IBOOS plans to the framework, in light of the fact that the embraced uneven PKC plan utilized

as a part of the nom de plume does not influence the proficiency of verification amid correspondence in VANETs.

Despite the fact that the computationally escalated matching operations are not included in traditional PKI, we trust

that the ID-construct cryptographies with hashing calculation in light of message taking into account pairings is

exceedingly appropriate, particularly giving solid security in the VANET environment. The communication delay

will be shown in fig 3.

2. Authentication Efficiency:

In this area, the productivity of shared validation among vehicles in VANETs is assessed through hypothetical

quantitative counts for UVC. In the proposed framework, the productivity of verification is assessed by the

correspondence delay among vehicles, in which we concentrate on the computational postponement devoured by

utilizing cryptographic systems and hashing instruments including IBS and IBOOS plans. The authentication

efficiency will be shown in fig 4.

3. Computational Delay:

We look at the execution of our proposed framework with a current validation convention, called ACPN

(Authentication and contingent protection conservation convention for secure vehicular interchanges), which could be

embraced for the same situation with our own. The computational deferral of the V2V confirmation in ACPN is

ascertained. The computational deferral of ACPN is more than our proposed arrangement of hashing system. Along

these lines, utilizing our framework more vehicles get speak with each other in less time. In the interim, the more

vehicles are in the state of hashing instrument: Inner-RSUV2V, the fewer time costs in the computational deferral of

the V2V confirmation, where high validation productivity could be accomplished in proposed framework than

existing. The computational delay is shown in fig 5.

Page 11: ISSN: 0975-766X CODEN: IJPTFI Available Online through ... · final results will be shown by graphs generated on the NS2 simulator. Keywords: VANET, Trusted Authority ... VANET is

Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology

IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15630

Analysis of the system

Fig-3: Communication Overhead.

Fig-4: Authentication Efficiency.

Fig-5: Computational Overhead.

VI. Conclusion and Future Work

A keyed-Hash Message Authentication Code Technique for strong check and secure correspondence in VANETs has

been proposed, which uses the IBS and IBOOS plans with PKI and hashing systems for the solid validation and

safely impart the vehicles and Infrastructure with every other. The new framework accomplishes the wanted strong

confirmation, protection safeguarding, non-disavowal and other security destinations for UVC in VANETs. Another

essential normal for the new framework is its extensibility and reusability, i.e., it can likewise be used with other new

0.5

2.5

4.5

6.5

8.5

0.5 1 1.5 2 2.5 3

Trav

ellin

g ti

me(

min

)

Distance(m)x103

EMAP

ACPN

0

0.5

1

1.5

2

2.5

3

3.5

0.5 1 1.5 2 2.5 3

No

rmal

ized

Tim

e (%

)

Distance(m)x103

EMAP

ACPN

0

5

10

15

20

0.5 1 1.5 2 2.5 3 Ro

ute

Blo

ckin

g ra

te(m

in)

Distance(m)x103

EMAP

ACPN

Page 12: ISSN: 0975-766X CODEN: IJPTFI Available Online through ... · final results will be shown by graphs generated on the NS2 simulator. Keywords: VANET, Trusted Authority ... VANET is

Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology

IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15631

plans for security and execution changes. Investigation and execution assessment demonstrate that the proposed new

framework is more possible and sufficient than past to UVC in the VANET environment for proficient verification

with non-repetitive information transmission over systems.

In future, we are attempting to settle the different new kind of assaults connected to the framework by reproducing it

with more grounded security convention.There are numerous different difficulties left that will affect the eventual

fate of VANETs. By understanding this we can diminish the issue effect of VANETs on activity wellbeing, and

productivity

References

1. Jie Li, Senior Member, IEEE, Huang Lu, Member, IEEE, and Mohsen Guizani, Fellow, IEEE, “ACPN: A Novel

Authentication Framework with Conditional Privacy-Preservation and Non-Repudiation for VANETs”, IEEE

Transactions On Parallel And Distributed Systems, VOL. 26, NO. 4, APRIL, 2015.

2. F.Li, Y.wang, “Routing in Vehicular ad hoc networks: A survey,” IEEE vehicular technology Magazine, vol. 2,

No.2,pp 12-22,June 2007.

3. X.Liu, Z.Fang, L.shi “Securing Vehicular Ad Hoc Networks,” J.Computer society vol.15 no.1 pp. 39-68, 2007.

4. R. Lu et al., “ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications,”

Proc. IEEE INFOCOM, pp. 1229-1237, 2008.

5. Er,Sushil Lekhi et al “Vehicular ad hoc Communication Security Enhancement”,IJCSCE, vol. 4,no. 2,pp. Aug.

2015.

6. Priyanka patil, Nilesh Marathe, and Vimala Jethani, “Survey of Privacy preservation in VANET,” IRACST, vol.

6, No.1,Jan-Feb 2016.

7. S. Zeadally et al., “Vehicular Ad Hoc Networks (VANETS): Status, Results, and Challenges,” Telecomm.

Systems, vol. 50, no. 4, pp. 217-241, 2012.

8. A. Studer et al., “Flexible, Extensible, and Efficient VANET Authentication,” J. Comm. and Networks, vol. 11,

no. 6, pp. 574-588, 2009..

9. Y. Sun et al., “An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular

Communications,” IEEE Trans. Vehicular Technology, vol. 59, no. 7, pp. 3589-3603, Sept. 2010.

10. P. Kamat, A. Baliga, and W. Trappe, “An Identity-Based Security Framework for VANETs,” Proc. Third Int’l

Workshop Vehicular Ad Hoc Networks (VANET), pp. 94-95, 2006.

Page 13: ISSN: 0975-766X CODEN: IJPTFI Available Online through ... · final results will be shown by graphs generated on the NS2 simulator. Keywords: VANET, Trusted Authority ... VANET is

Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology

IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15632

11. Y. Zhang et al., “Securing Mobile Ad Hoc Networks with Certificate less Public Keys,” IEEE Trans. Dependable

and Secure Computing, vol. 3, no. 4, pp. 386-399, Oct.-Dec. 2006.

12. N. Gura et al., “Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs,” Proc. Sixth Int’l Workshop

Cryptographic Hardware and Embedded Systems (CHES), pp. 925-943, 2004.

13. F. Hess, “Efficient Identity Based Signature Schemes Based on Pairings,” Proc. Ninth Ann. Int’l Workshop

Selected Areas in Cryptography (SAC), pp. 310-324, 2003.

14. A. Shamir and Y. Tauman, “Improved Online/Offline Signature Schemes,” Proc. CRYPTO, pp. 355-367, 2001.

15. D. Boneh and M. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proc. CRYPTO, pp. 213-229,

2001.

16. R.A. Mollin, “RSA and Public-Key Cryptography,” Discrete Math. and Its Applications. Chapman and Hall/CRC,

2002.

17. M. Riley, K. Akkaya, and K. Fong, “A Survey of Authentication Schemes for Vehicular Ad Hoc Networks,”

Security Comm. Networks, vol. 4, no. 10, pp. 1137-1152, 2011.

18. J. Sun, C. Zhang, and Y. Fang, “An ID-Based Framework Achieving Privacy and Non-Repudiation in Vehicular

Ad Hoc Networks,” Proc. IEEE Military Comm. Conf. (MILCOM), pp. 1-7, 2007. [23] B. Hoh et al., “Preserving

Privacy in GPS Traces via Uncertainty-Aware Path Cloaking,” Proc. 14th ACM Conf. Computer and Comm.

Security (CCS), pp. 161-171, 2009.

19. J.Choi and S. Jung, “A Security Framework with Strong Non- Repudiation and Privacy in VANETs,” Proc. IEEE

Sixth Consumer Comm. and Networking Conf. (CCNC), 2009.

20. F.Armknecht et al., “Cross-Layer Privacy Enhancement and Non- Repudiation in Vehicular Communication,”

Proc. ITG-GI Conf. Comm. in Distributed Systems (KiVS), pp. 1-12, 2007.

21. S. Bharath Bhushan, Pradeep Reddy, Dhenesh V Subramanian, X. Z. Gao (in press).Systematic Survey on

Evolution of Cloud Architectures, International Journal of Autonomous and Adaptive Communications Systems,

Inderscience.

Corresponding Author:

Akshay Gaikwad*,

Email: [email protected]