SlideShare ist ein Scribd-Unternehmen logo
1 von 6
EMAP: Expedite Message Authentication Protocol for
Vehicular Ad Hoc Networks
ABSTRACT:
Vehicular ad hoc networks (VANETs) adopt the Public Key Infrastructure (PKI)
and Certificate Revocation Lists (CRLs) for their security. In any PKI system, the
authentication of a received message is performed by checking if the certificate of
the sender is included in the current CRL, and verifying the authenticity of the
certificate and signature of the sender. In this paper, we propose an Expedite
Message Authentication Protocol (EMAP) for VANETs, which replaces the time-
consuming CRL checking process by an efficient revocation checking process. The
revocation check process in EMAP uses a keyed Hash Message Authentication
Code (HMAC), where the key used in calculating the HMAC is shared only
between non revoked On-Board Units (OBUs). In addition, EMAP uses a novel
probabilistic key distribution, which enables non revoked OBUs to securely share
and update a secret key. EMAP can significantly decrease the message loss ratio
due to the message verification delay compared with the conventional
authentication methods employing CRL. By conducting security analysis and
performance evaluation, EMAP is demonstrated to be secure and efficient.
EXISTING SYSTEM:
In this paper, we consider both nonoptimized and optimized search algorithms.
According to the Dedicated Short Range Communication (DSRC) [10], which is
part of the WAVE standard, each OBU has to broadcast a message every 300 msec
about its location, velocity, and other telematic information. In such scenario, each
OBU may receive a large number of messages every 300 msec, and it has to check
the current CRL for all the received certificates, which may incur long
authentication delay depending on the CRL size and the number of received
certificates. The ability to check a CRL for a large number of certificates in a
timely manner leads an inevitable challenge to VANETs. To ensure reliable
operation of VANETs and increase the amount of authentic information gained
from the received messages, each OBU should be able to check the revocation
status of all the received certificates in a timely manner. Most of the existing works
overlooked the authentication delay resulting from checking the CRL for each
received certificate.
DISADVANTAGES OF EXISTING SYSTEM:
Since vehicles communicate through wireless channels, a variety of attacks
such as injecting false information, modifying and replaying the disseminated
messages can be easily launched. A security attack on VANETs can have
severe harmful or fatal consequences to legitimate users.
To abstain the leakage of the real identities and location information of the
drivers from any external eavesdropper.
The scale of VANET is very large.
PROPOSED SYSTEM:
In this paper, we introduce an expedite message authentication protocol (EMAP)
which replaces the CRL checking process by an efficient revocation checking
process using a fast and secure HMAC function. EMAP is suitable not only for
VANETs but also for any network employing a PKI system. To the best of our
knowledge, this is the first solution to reduce the authentication delay resulting
from checking the CRL in VANETs.
ADVANTAGES OF PROPOSED SYSTEM:
 EMAP has the lowest computation complexity compared with the CRL
checking processes employing linear and binary search algorithms.
 The number of messages that can be verified using EMAP within 300 msec is
greater than that using linear and binary CRL checking by 88.7 and 48.38
percent, respectively.
 The proposed EMAP in authentication reduces the end-to-end delay compared
with that using either the linear or the binary CRL checking process.
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Monitor : 15 inch VGA Colour.
Mouse : Logitech Mouse.
Ram : 512 MB
Keyboard : Standard Keyboard
SOFTWARE REQUIREMENTS:
Operating System : Windows XP.
Coding Language : ASP.NET, C#.Net.
Database : SQL Server 2005
REFERENCE:
Albert Wasef and Xuemin (Sherman) Shen, IEEE, Fellow, “EMAP: Expedite
Message Authentication Protocol for Vehicular Ad Hoc Networks”, IEEE
TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 1, JANUARY
2013.

Weitere ähnliche Inhalte

Andere mochten auch

Effective risk communication for android apps
Effective risk communication for android appsEffective risk communication for android apps
Effective risk communication for android apps
JPINFOTECH JAYAPRAKASH
 
Context based access control systems for mobile devices
Context based access control systems for mobile devicesContext based access control systems for mobile devices
Context based access control systems for mobile devices
JPINFOTECH JAYAPRAKASH
 
2015 2016 ieee vlsi project titles
2015   2016 ieee vlsi project titles2015   2016 ieee vlsi project titles
2015 2016 ieee vlsi project titles
JPINFOTECH JAYAPRAKASH
 
How long to wait predicting bus arrival time with mobile phone based particip...
How long to wait predicting bus arrival time with mobile phone based particip...How long to wait predicting bus arrival time with mobile phone based particip...
How long to wait predicting bus arrival time with mobile phone based particip...
JPINFOTECH JAYAPRAKASH
 
Fan culture in games
Fan culture in gamesFan culture in games
Fan culture in games
pumascomm
 
Simon -- Local Super Forum
Simon -- Local Super ForumSimon -- Local Super Forum
Simon -- Local Super Forum
BOLO Conference
 

Andere mochten auch (20)

Annotating search results from web databases
Annotating search results from web databasesAnnotating search results from web databases
Annotating search results from web databases
 
Effective risk communication for android apps
Effective risk communication for android appsEffective risk communication for android apps
Effective risk communication for android apps
 
Reversible data hiding with optimal value transfer
Reversible data hiding with optimal value transferReversible data hiding with optimal value transfer
Reversible data hiding with optimal value transfer
 
Context based access control systems for mobile devices
Context based access control systems for mobile devicesContext based access control systems for mobile devices
Context based access control systems for mobile devices
 
2015 2016 ieee vlsi project titles
2015   2016 ieee vlsi project titles2015   2016 ieee vlsi project titles
2015 2016 ieee vlsi project titles
 
Target tracking and mobile sensor navigation in wireless sensor networks
Target tracking and mobile sensor navigation in wireless sensor networksTarget tracking and mobile sensor navigation in wireless sensor networks
Target tracking and mobile sensor navigation in wireless sensor networks
 
Bahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsBahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environments
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Nice network intrusion detection and countermeasure selection in virtual netw...
Nice network intrusion detection and countermeasure selection in virtual netw...Nice network intrusion detection and countermeasure selection in virtual netw...
Nice network intrusion detection and countermeasure selection in virtual netw...
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
 
How long to wait predicting bus arrival time with mobile phone based particip...
How long to wait predicting bus arrival time with mobile phone based particip...How long to wait predicting bus arrival time with mobile phone based particip...
How long to wait predicting bus arrival time with mobile phone based particip...
 
Anomaly detection via online over sampling principal component analysis
Anomaly detection via online over sampling principal component analysisAnomaly detection via online over sampling principal component analysis
Anomaly detection via online over sampling principal component analysis
 
2015 2016 ieee dot net project titles
2015 2016 ieee dot net project titles2015 2016 ieee dot net project titles
2015 2016 ieee dot net project titles
 
A new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessionsA new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessions
 
Target tracking and mobile sensor navigation in wireless sensor networks
Target tracking and mobile sensor navigation in wireless sensor networksTarget tracking and mobile sensor navigation in wireless sensor networks
Target tracking and mobile sensor navigation in wireless sensor networks
 
Fan culture in games
Fan culture in gamesFan culture in games
Fan culture in games
 
Matt geri (mobile as publishing platform)
Matt geri (mobile as publishing platform)Matt geri (mobile as publishing platform)
Matt geri (mobile as publishing platform)
 
Simon -- Local Super Forum
Simon -- Local Super ForumSimon -- Local Super Forum
Simon -- Local Super Forum
 
Are You Vacation Deprived? - Facts And Stats
Are You Vacation Deprived? - Facts And StatsAre You Vacation Deprived? - Facts And Stats
Are You Vacation Deprived? - Facts And Stats
 

Ähnlich wie Emap expedite message authentication protocol for vehicular ad hoc networks

Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
Ecway Technologies
 
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Java  emap expedite message authentication protocol for vehicular ad hoc netw...Java  emap expedite message authentication protocol for vehicular ad hoc netw...
Java emap expedite message authentication protocol for vehicular ad hoc netw...
ecwayerode
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
ecway
 
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Java  emap expedite message authentication protocol for vehicular ad hoc netw...Java  emap expedite message authentication protocol for vehicular ad hoc netw...
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Ecway Technologies
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
Ecway Technologies
 
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksEMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
KaashivInfoTech Company
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Ecwaytech
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
ecwayprojects
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Ecwayt
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
Ecwayt
 
TAM new report
TAM new reportTAM new report
TAM new report
Suzit Punk
 

Ähnlich wie Emap expedite message authentication protocol for vehicular ad hoc networks (20)

Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Java  emap expedite message authentication protocol for vehicular ad hoc netw...Java  emap expedite message authentication protocol for vehicular ad hoc netw...
Java emap expedite message authentication protocol for vehicular ad hoc netw...
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Java  emap expedite message authentication protocol for vehicular ad hoc netw...Java  emap expedite message authentication protocol for vehicular ad hoc netw...
Java emap expedite message authentication protocol for vehicular ad hoc netw...
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksEMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol     for vehicular ad hoc networksEmap expedite message authentication protocol     for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksEMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
 
TAM new report
TAM new reportTAM new report
TAM new report
 
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETsAn Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
 
W04404135146
W04404135146W04404135146
W04404135146
 
Effective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksEffective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networks
 
TR-069_Overview.ppt
TR-069_Overview.pptTR-069_Overview.ppt
TR-069_Overview.ppt
 
Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Improving Security Features In MANET Authentication Through Scrutiny Of The C...Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Improving Security Features In MANET Authentication Through Scrutiny Of The C...
 
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...
 
The process of authentication
The process of authenticationThe process of authentication
The process of authentication
 

Kürzlich hochgeladen

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Emap expedite message authentication protocol for vehicular ad hoc networks

  • 1. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks ABSTRACT: Vehicular ad hoc networks (VANETs) adopt the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs) for their security. In any PKI system, the authentication of a received message is performed by checking if the certificate of the sender is included in the current CRL, and verifying the authenticity of the certificate and signature of the sender. In this paper, we propose an Expedite Message Authentication Protocol (EMAP) for VANETs, which replaces the time- consuming CRL checking process by an efficient revocation checking process. The revocation check process in EMAP uses a keyed Hash Message Authentication Code (HMAC), where the key used in calculating the HMAC is shared only between non revoked On-Board Units (OBUs). In addition, EMAP uses a novel probabilistic key distribution, which enables non revoked OBUs to securely share and update a secret key. EMAP can significantly decrease the message loss ratio due to the message verification delay compared with the conventional authentication methods employing CRL. By conducting security analysis and performance evaluation, EMAP is demonstrated to be secure and efficient.
  • 2. EXISTING SYSTEM: In this paper, we consider both nonoptimized and optimized search algorithms. According to the Dedicated Short Range Communication (DSRC) [10], which is part of the WAVE standard, each OBU has to broadcast a message every 300 msec about its location, velocity, and other telematic information. In such scenario, each OBU may receive a large number of messages every 300 msec, and it has to check the current CRL for all the received certificates, which may incur long authentication delay depending on the CRL size and the number of received certificates. The ability to check a CRL for a large number of certificates in a timely manner leads an inevitable challenge to VANETs. To ensure reliable operation of VANETs and increase the amount of authentic information gained from the received messages, each OBU should be able to check the revocation status of all the received certificates in a timely manner. Most of the existing works overlooked the authentication delay resulting from checking the CRL for each received certificate. DISADVANTAGES OF EXISTING SYSTEM: Since vehicles communicate through wireless channels, a variety of attacks such as injecting false information, modifying and replaying the disseminated messages can be easily launched. A security attack on VANETs can have severe harmful or fatal consequences to legitimate users.
  • 3. To abstain the leakage of the real identities and location information of the drivers from any external eavesdropper. The scale of VANET is very large. PROPOSED SYSTEM: In this paper, we introduce an expedite message authentication protocol (EMAP) which replaces the CRL checking process by an efficient revocation checking process using a fast and secure HMAC function. EMAP is suitable not only for VANETs but also for any network employing a PKI system. To the best of our knowledge, this is the first solution to reduce the authentication delay resulting from checking the CRL in VANETs. ADVANTAGES OF PROPOSED SYSTEM:  EMAP has the lowest computation complexity compared with the CRL checking processes employing linear and binary search algorithms.  The number of messages that can be verified using EMAP within 300 msec is greater than that using linear and binary CRL checking by 88.7 and 48.38 percent, respectively.  The proposed EMAP in authentication reduces the end-to-end delay compared with that using either the linear or the binary CRL checking process.
  • 5. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Monitor : 15 inch VGA Colour. Mouse : Logitech Mouse. Ram : 512 MB Keyboard : Standard Keyboard SOFTWARE REQUIREMENTS: Operating System : Windows XP. Coding Language : ASP.NET, C#.Net. Database : SQL Server 2005 REFERENCE: Albert Wasef and Xuemin (Sherman) Shen, IEEE, Fellow, “EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks”, IEEE
  • 6. TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 1, JANUARY 2013.