SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 95
BRISK AND SECURE AD-HOC VEHICULAR COMMUNICATION
Miraj Shah1
, Imaad Ukaye2
, Narendra Shekokar3
1, 2
Student, 3
Head of Department, Computer Engg, Dwarkadas J. Sanghvi COE
Abstract
The idea of Car-to-Car communication is a revolutionary phenomenon in the automobile industry. This idea will surely change the
future of humanity for good. This technology will surely change the perception of how a traditional automotive was initially thought of
by adding endless applications as a boon to mankind. The application of cars communicating with each other is enormous and has
already been discussed by many researchers by now. But, the important thing here is how to put it in practice with the increasing
demand for cars and making it safe to use it, at least improve the current condition by this new technology and not worsen the
situation by digital hacking and other flaws. Since the nature of the Communication System is highly dynamic a strict security
mechanism is mandatory for its seamless functioning. We propose to encrypt the communication taking place in C2C communication
which is not the same as using the Internet security mechanism due to limitation of its speed and residing hardware servers.
Symmetric Cryptography thus fails to incorporate the scope of various security disciplines and hence it is ineffective to use such
techniques. Asymmetric Cryptography on the other hand provides an ideal trade-off among various security disciplines and hence it is
considered as an alternative approach to accomplish a secure system but it fails when applied in an ad-hoc environment. However,
the traditional Public Key Infrastructure (PKI) technique fails in several ways so we propose a modified form of communication and
authentication technique along with rapid communication and group messages to fasten the speed of communication.
Keywords: Protocol, Communication, Security, Privacy
---------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
The concept Car-to-Car(C2C) communication is now an
evolving trend as a large portion of research funds has been
invested all over the globe. Many major car manufacturers
have responded positively and are actively working together in
bringing this promising technology to fruition. After the
concept of autonomous vehicle, cooperative control of
multiple vehicles has receives substantial attention in the
industry. The key techniques that are being considered include
Vehicle-to-Vehicle (V2V), Car-to- Infrastructure (V2I) and
Vehicle-to-C.A (V2CA).With advancements in technology in
C2C communication various trending problems can be tackled
such as automotive safety, user privacy, authentication and
validation of vehicles, report to RSU about malevolent cars,
etc. Roadside units (RSUs) can be deployed every few miles
along the highway for users to communicate about road-safety
and obtain other information. Vehicles can use RSUs to report
real-time traffic information and request location- based
services such as finding restaurants, gas stations, or available
parking space. For the sake of cooperation among multiple
vehicles effective communication medium is imperative.
Although third-generation (3G) networks or satellite
techniques can be used to achieve this goal, RSUs have the
advantage of low cost, easy deployment, and high bandwidth.
Although the primary purpose of system is to enable
communication-based automotive safety applications like
collision warning, it also provides for a range of business
applications, thereby making this technology more cost
effective. A Wireless adhoc network perfectly fulfills all the
necessary requirements for such a system but at the same time
its adhoc nature makes it highly vulnerable to various
networking threats. So, securing communication and
minimizing communication boundary must be considered for
commercial and military applications. To provide a solution
we propose a framework for communication among multiple
vehicles. Our elucidation is to put forward a new way to
visualize multiple vehicles with secure communication and to
provide a distributed method to address the problem
cooperatively.
Security mechanism will protect all traffic sent over the C2C
communication network. While securing communication has
its own advantages along with privacy and other security goals
this high-rate communication would incur high overhead, both
in terms of communication and processing. Consider, for
example, a vehicle receiving digitally certificate, signing the
message, verifying the receiver’s identity, RSU verifying its
identity, safety messages from vehicles; it would need to
validate a hundreds of vehicles within range within a short
delay in the order of a hundred milliseconds [7]. Even if
vehicle is effective under such dense network conditions, the
additional security overhead could cause failure in meeting the
delay and reliability requirements of safety applications. This
is especially so because the vehicle environment lacks
appropriate algorithm to reduce the load on processing and
transfer the load to high speed internal or backbone
communication network. The proposed rapid communication
and group signing of messages solves these problems and
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 96
meets the security goals with the help of a set of public keys
for securing the communication and maintaining anonymity of
users or vehicles.
First we outline why we actually need to secure car to car
open wireless communication by stating various security
threats from using open wireless communication or loosely
structured security framework. Then in Section II we establish
the security model i.e. security goals around which the
security of every C2C communication should lie. The review
of related work and its analysis along with its drawback is
discussed in Section III. Then extending to our own security
architecture for our proposed solution is followed by in
Section III. Section IV discusses additional mechanism to
hasten the authentication process, tracking intruders and
closing any gaps in security framework.
2. SECURITY THREATS AND GOALS:
Unlike traditional wired/wireless system a C2C
communication system is highly dynamic. Along with
handling provisions for normal communication and keeping
the system secure, it also has to tackle the system dependent
problems such as handovers. Handover from one
infrastructure to another can be costly as it requires
verification of identity at the same time maintaining user-
privacy and cost-effective communication.
Such a system can also be used for enhancement of road-
safety by using various signaling techniques such as collision
warning, intersection collision, emergency vehicle, brake-light
warning, motorcycle warning, etc. In this communication,
security plays a very important role as we discuss the attacks
on vehicular communication.
1. Phony information. One or several legitimate
members of the network send out false information to
misguide other vehicles about traffic conditions.
2. False location. Transmission of a false position
message by a malicious vehicle that pretends to be at
a claimed position.
3. Tracking identity: A global entity can monitor
trajectories of targeted vehicles and use these data for
many purposes.
4. False Messages: Such attacks include aggressive
transmission of fake messages like accident or traffic
jam or emergency vehicle.
5. Masquerade. The attacker claims to be another
vehicle by using false identities.
We propose modified public key communication and rapid
communication technique for enhancing the speed of
communication along with additional security specification
and architecture. Also, we propose new C2C communication
techniques such as group messaging and foreign-vehicle short-
term key. We stress that every communication should ensure
these security goals. [5]
• Confidentiality:
Confidentiality is observed to protect sensitive
information from getting manipulated and analyzed by
eavesdropping as wireless communication medium is
open and broadcasted over the air. By using end-to-
end encryption, which requires the presence of mutual
authentication and key agreement, the confidentiality
objective can be achieved
• Authentication: Authentication techniques are
observed to verify the identity of the vehicular nodes
in communication. In particular, the authentication
includes two levels: authentication between vehicles
(V2V authentication) to provide link-to-link security,
and authentication between the vehicle and RSU as
well as the service provider (V2Iauthentication).
• Privacy: Privacy issues for service provisioning in
VANETs regard primarily preserving the anonymity
of a vehicle and/or the privacy of its location. Privacy
protection tries to prevent adversaries (e.g., another
vehicle or an external observer) from linking the
vehicle to the driver’s name, license plate, speed,
position, and traveling routes along with their
relationships to compromise the sender’s privacy
• Message Non-Refutation Every message should be
binded to the sender so that the sender cannot deny
having sent a message. Anonymizer ensures
anonymity of sender to other nodes and ensures
privacy but does not compromise in security and its
association with each sender.
• Anonymity: Privacy of vehicles can be protected by
introducing a mapping between permanent key and
temporary key as one approach, which is an
anonymous key pair that can be changed frequently.
Another approach is having a set of short-term public
keys ,each being used for a random time called the
dwell period. An alternative for providing anonymity
in vehicular networks is the use of group signatures
3. SECURING COMMUNICATION
Although there were few studies regarding the security to
different extents, they have all failed in taking the extension
ability issue and resultant communication overhead, the time
required in authentication of a vehicle versus the required
response time into consideration. Authentication of messages
must be implemented to allow vehicle users to differentiate
reliable information from phony information and to defend
against modification attacks and masquerading attacks. An
appealing solution to this problem is to digitally sign messages
before sending them; not only does this allow the receiver to
identify the sender, but the signature also prevents the
message contents from being modified in transit. Digital
signatures[6] are the basic tool to secure communications,
used for all messages. In terms of authentication and
integrity-check, digital signature in conventional public key
infrastructure (PKI) [1] is a good accepted choice. However, it
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 97
may cause problem when a vehicle is required to verify the
signatures of other vehicles by itself and hence trusted
authorities are required. Each Certification Authority (C.A) is
responsible for a region (national territory, district, county,
etc.) and manages identities and credentials of all nodes
registered with it. Each node is registered with only one CA,
and has a unique long-term identity which may be an
Electronic License Plate (ELP) with a long-term key and a
certificate. To satisfy both the security and anonymity
requirements, we rely on a short-term key authentication
approach. Also, further we discuss how tradition PKI is
unsuitable for communication and we will use short-term
public key pairs instead.
Fig. 1 shows security architecture for vehicular
communication in which a large set of relevant security
concepts [3] exists, including concepts for
• Node identification,
• Digital signatures and certificates,
• Anonymizer for location privacy protection,
• Detection of protocol violation,
• Plausibility checks,
• Tamper-resistant devices,
• Access control policies,
• Software certification,
• In-vehicle network security,
• secure positioning, and more.
For enhancing the security, the header is divided into variable
and invariable fields. Invariable are those fields thatremain
unchanged from sender to destination , e.g., destination and
source addresses and source position. Variable fields, such as
sender location and time-to-live (TTL), are allowed to be
altered by intermediate nodes. For packets being sent via
multiple wireless hops, two signatures are added: an end-to-
end signature is created by the sender node over the invariable
fields of the packet header. Additionally, a hop-by-hop
signature is added for the variable fields. On reception of a
data packet a node verifies both signatures, and replaces the
hop-by-hop signature by a new one for the altered variable
fields and keeps the end-to-end signature. Eventually, the
combination of end-to-end signatures results in a trusted
forwarding chain [2].
In order to identify a particular vehicle taking part in
communication there is a unique identifier. The Electronic
License Plate (ELP) may serve as a unique identifier and acts
as identity check mechanism. However, sending the original
identifier may be prone to several risks such as masquerading
attacks and hence the ELP needs to be mapped to a temporary
identifier to be used for communication. There is a trusted
authority namely the Certification Authority (C.A.) which
keeps track of these unique identifiers and performs the job of
mapping into a temporary unique identifier. This original
solution however, had many problems like synchronization of
different C.A’s and constant communication between V2I
(vehicle to Infrastructure) causing further delay and loss of
information. Hence the new proposed solution consists of a set
(atleast 2) of permanent identifiers stored in each vehicle.
Each vehicle consists of atleast 2 unique identifiers or public
key. Each car communicates with only one of these stored
keys for a certain period of time. This time during which it
communicates with a single key is known as dwell time which
is a pseudo-random number generated by its own hardware
mechanism. It also acts as an added privacy mechanism for
hiding user’s identity and making it difficult to track by an
intruder.
Fig – 1: Security Architecture
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 98
The Fig. 2 shows that every vehicle utilizes multiple short-
term public key pairs instead of the old approach of using the
same long-term public key for securing communications. The
mapping between the long-term keys and the short-term
credentials of each node (car) is maintained by the C.A. The
main idea is that (i) every vehicle will be equipped with
multiple certified public keys (anonymizers) that do not reveal
the car’s identity, and (ii) the node uses every one of them for
dwell time
The multiple-anonymizer technique is adopted to attain
location privacy. Particularly, vehicles are assigned with a set
of identifiers, and the public keys that are alternatively used.
Cars frequently change their key values or temporary
identifiers used for authentication over time, and due to the
unlinkability of old and new messages their location
confidentiality preservation is attained.
Moreover, the anonymizers can be linked to a specific vehicle
by the CA so that the CA is able to trace and regulate the
vehicle’s behavior.
Fig- 2 Road map of vehicle using different keys
4. ADDITIONAL FEATURES
4.1 Group Message
Furthermore, the signatures and public key certificates
radically increase the packet length to cause intense message
overhead. Furthermore, these cryptographic operations can
incur very high computation and communication overhead.
When V2V communication is performed in an urban area with
many vehicles in each other’s communication range, this
becomes a particularly serious problem.
Each node M is equipped with a group vehicle key GVK ,
with the group members comprising all vehicles registered
with the CA. A group key GVK generated by a group member
allows for the validation (by any node) of any group signature
with the help of CA. Intuitively, a group signature scheme
allows any node V to sign a message on behalf of the group,
without V ’s identity being revealed to the signature verifier.
Moreover, it is impossible to link any two signatures of a
legitimate group member. Note that no public key or other
credentials need to be attached to an anonymously
authenticated message.
4.2 Foreign Vehicle-short-term key
Taking an analogy of a tourist place it is easy to spot a local
person from the crowd as they look different from others.
Taking the inverse in our case a foreign person is easier to be
identified and more prone to threats. In C2C communication
we use the identifier to relate a particular message to a
particular car. However, the mapping between the permanent
and temporary credentials also takes place by home C.A and
hence this mapping will be completely different from the
credentials assigned by a foreign C.A. Say, a car from United
States comes to Canada with its permanent and temporary key
pairs protecting the car’s identity. However, from a group of
say hundred cars these temporary keys that will be used are
still easy to distinguish from the keys used locally by the
Canadian cars and hence easy to track its location and failing
to protect its identity. These keys are like I.P addresses
assigned to computers which itself tell its location like
country, region, etc. Hence we propose to use new short term
but permanent key pairs assigned to them whenever a foreign
location is visited i.e. they register themselves with a foreign
C.A first which in turn informs the home
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 99
Fig- 3 Communication in Vehicular Network
C.A of the change of keys as long as they are in that region.
This makes it difficult for an intruder to attack a specific
foreign car.
4.3 Rapid Authentication
To enable progress to authentication in C2C communication
fast access or connectivity to infrastructure is highly needed.
The speed with which the vehicle travels may exceed the
speed with which the communication takes place between a
car and a RSU (Road-Side Unit).The main cause of this delay
is authentication mechanism and user privacy.Currently, there
are a few strategies to improve this overhead by reducing the
handoff latency in which the initial messages are protected and
authenticated thereafter, the communication takes place
unencrypted making it more prone to replay attacks, hijacking,
masquerading and many more attacks.
It may take time once for the RSU to authenticate the car then
the communication takes place instantly. However, the range
of one particular RSU is pretty limited compared to the
distance the car covers and hence repeat authentication takes
place. This repeated authentication cannot be avoided simply
to speed-up the communication however; it can be facilitated
with a shared secret key passed from one RSU to another. This
shared secret has its own lifetime and the node (car) can be
authenticated rapidly with the help of this key. The key is not
known to any other car and changes frequently to avoid replay
attacks. Here, the added security layer that has been provided
is that the shared key may not be broadcasted to all RSU’s in
vicinity but only to one that will be next in the range of the
car. Hence, a prediction is made based on the messages
broadcasted by the car: the direction, speed, brake light and
turnsignal. Say there is a message broadcasted as presented
below[4]: <Direction, Speed, Acceleration,Turn-Light,
Traffic-Light>, where Direction denotes the direction a vehicle
turns, such as east or west, and Speed denotes the velocity of a
driving vehicle. Acceleration denotes whether a driving
vehicle accelerates or decelerates. If the value of this field is
positive, the vehicle is speeding up; otherwise, the vehicle is
slowing down. The fourth field, Turn-Light, denotes signals of
the turn light of a vehicle, particularly when a vehicle is going
to turn at an intersection.
If the car is travelling on highway with some speed then it’s
easy to predict the next RSU and the next after that, saving
time on authentication and improving road safety. If the car is
travelling in a neighborhood area and suddenly the cars turns,
A message will be broadcasted regarding this turnsignal and
the RSU may predict the next RSU based on this turnsignal.
This prediction may be added cost to RSU however it also
reduces the burden of messages that other RSU services. In an
ideal condition the authentication takes place the first time
with one RSU using the lengthy authentication mechanism and
thereafter all communication takes place using rapid
authentication speeding up the communication process to
almost double the original speed.
4.4 Revocation
The revocation is concerned with excluding nodes from the
system. The CA will contain a database of revoked node’s
identifier and distributes this data to all nodes in the system if
necessary, depending on the scale of the revocation decision
and the extent to which the malicious activity has been
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 100
performed. A reaction to detected attacks carried out by a node
is to exclude this node from the system. Moreover, verification
of this malicious activity is also important as, due to flaws in
security an intruder can perform such activity and masquerade
itself as another node in which case the victim suffers
unnecessarily. Also, depending on various factors the threat of
that particular vehicle is detected. Factors like the number of
nodes reporting the same malicious activity about the node,
traffic density, validation of messages, authentication of nodes
and position. For example, messages like emergency vehicle
are broadcasted so if Trudy broadcasts this false message
repeatedly in an urban area with say traffic density of 125
vehicles and only 1 or very few reports comes in then Trudy
may not be included in the revocation list instead could be
maintained in a temporary warning list for a certain amount of
time by the C.A. till which further complaint comes in then
appropriate and fast response could be achieved otherwise the
node is simply ignored and deleted from temporary warning
list . Other reasons not directly related to operation of system,
such as a stolen unit or prevention of criminal activity may
also require a revocation service.
5. CONCLUSIONS
In this paper we propose the security framework for
establishing communication and authentication along with
privacy in ad hoc Car to Car communication. The different
requirements of each user and car were studied and hence it is
not appropriate to design a specific security framework for the
System. Hence we established rapid authentication mechanism
along with group messages to speed up the communication
process and make C2C communication in ad hoc environment
feasible. The proposed system establishes and maintains
communication in the mentioned ad-hoc environment and also
it provides a rigorous security infrastructure as a whole. Since
these communication systems are to be used in high-end
automobiles, cost of implementation and maintenance of
Public key infrastructure is financially feasible. Our work will
provide a new way to look at the security issues in C2C
consortium.
REFERENCES
[1]. “Securing vehicular ad hoc networks,” Journal of
Computer Security - Special Issue on Security of Ad-hoc and
Sensor Network, vol. 15
[2]. “Cross-Layer Privacy Enhancement and Non-Repudiation
in Vehicular Communication,” in Proceedings of 4th
Workshop on Mobile Ad-Hoc Networks (WMAN), Bern,
Switzerland
[3]. ”On the Performance of Secure Vehicular Communication
System” - IEEE TRANSACTIONS ON DEPENDABLE AND
SECURE COMPUTING, VOL. 8, NO. 6,
[4]. Fast and Secure Multihop Broadcast Solutions for
Intervehicular Communication- Wafa Ben Jaballah, Mauro
Conti, Mohamed Mosbah, and Claudio E. Palazzi
[5]. “The Car-to-Car Communication Consortium,”
http://www.car-to-car.org, 2010.
[6]. D. Chaum , “Security without Identification: Transaction
Systems to Make Big Brother Obsolete,” Comm. ACM, vol.
28, no. 10,
[7]. “DSRC: Dedicated Short Range Communications,”
http://grouper.ieee.org/groups/scc32/dsrc/index.html, 2009.
[8]. J. Blum, A. Eskandarian, and L. Hoffman, “Challenges of
intervehicle adhoc networks,” IEEE Trans. Intell. Transp.
Syst., vol. 5, no. 4, pp. 347–351, Dec. 2004.
[9]. J. Blum and A. Eskandarian, “The threat of intelligent
collision,” IEEE IT Prof., vol. 6, no. 1, pp. 24–29, Jan./Feb.
2004.
[10]. A. Aijaz, B. Bochow, F. Dötzer, A. Festag, M. Gerlach,
R. Kroh,
[11]. “Dedicated Short Range Communication at 5.9 GHz
StandardsGroup,”
http://www.iteris.com/itsarch/html/standard/dsrc5ghz-
b.htm,2009.
[12]. “ISO TC204 Working Group 16,” http://www.calm.hu/,
2010.
[13]. P. Papadimitratos, G. Mezzour, and J.-P. Hubaux,
“Certificate Revocation List Distribution in Vehicular
Communication Systems,” Proc. Fifth ACM Int’l Conf.
Vehicular Ad Hoc Networks(VANET ’08), Sept. 2008.
[14]. Y.-W. Lin, Y.-S. Chen, and S.-L. Lee, “Routing
protocols in vehicular adhoc networks: A survey and future
perspectives,” J. Inf. Sci. Eng., vol. 26, no. 3, pp. 913–932,
May 2010.
[15]. A. Broggi, P. Cerri, S. Ghidoni, P. Grisleri, and H. G.
Jung, “A new approach to urban pedestrian detection for
automatic braking,” IEEE Trans. Intell. Transp. Syst., vol. 10,
no. 4, pp. 594–605, Dec. 2009.
[16]. M.-T. Sun, W.-C. Feng, K. Fujimura, T.-H. Lai, H.
Okada, and K. Fujimura, “GPS-based message broadcasting
for inter vehicle communication,” in Proc. ICPP, Aug. 2000,
pp. 279–286.

Weitere ähnliche Inhalte

Was ist angesagt?

Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Editor IJARCET
 
Dn3211571160
Dn3211571160Dn3211571160
Dn3211571160IJMER
 
Cyber DoS attack-based security simulator for VANET
Cyber DoS attack-based security simulator for VANET Cyber DoS attack-based security simulator for VANET
Cyber DoS attack-based security simulator for VANET IJECEIAES
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerTELKOMNIKA JOURNAL
 
MPROVING THE PRIVACY-PRESERVING OF COVID-19 BLUETOOTH-BASED CONTACT TRACI...
MPROVING THE PRIVACY-PRESERVING   OF COVID-19 BLUETOOTH-BASED   CONTACT TRACI...MPROVING THE PRIVACY-PRESERVING   OF COVID-19 BLUETOOTH-BASED   CONTACT TRACI...
MPROVING THE PRIVACY-PRESERVING OF COVID-19 BLUETOOTH-BASED CONTACT TRACI...AIRCC Publishing Corporation
 
Examining Modern Data Security and Privacy Protocols in Autonomous Vehicles
Examining Modern Data Security and Privacy Protocols in Autonomous VehiclesExamining Modern Data Security and Privacy Protocols in Autonomous Vehicles
Examining Modern Data Security and Privacy Protocols in Autonomous VehiclesAIRCC Publishing Corporation
 
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...CSCJournals
 
Instant messaging tech scet
Instant messaging tech scetInstant messaging tech scet
Instant messaging tech scetpankaj gamit
 
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Dr. Amarjeet Singh
 
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...IOSR Journals
 
Trustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social NetworkTrustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social Networkijsrd.com
 
Secure instant messanger service
Secure instant messanger serviceSecure instant messanger service
Secure instant messanger serviceAditya Gupta
 
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...S3 Infotech IEEE Projects
 
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...IRJET Journal
 
A Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS BankingA Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS BankingIRJET Journal
 
Authentication Systems in Internet of Things
Authentication Systems in Internet of ThingsAuthentication Systems in Internet of Things
Authentication Systems in Internet of ThingsEswar Publications
 
Study on analysis of commercial mobile keypad schemes and modeling of shoulde...
Study on analysis of commercial mobile keypad schemes and modeling of shoulde...Study on analysis of commercial mobile keypad schemes and modeling of shoulde...
Study on analysis of commercial mobile keypad schemes and modeling of shoulde...csandit
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsIRJET Journal
 

Was ist angesagt? (19)

Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404
 
Dn3211571160
Dn3211571160Dn3211571160
Dn3211571160
 
Cyber DoS attack-based security simulator for VANET
Cyber DoS attack-based security simulator for VANET Cyber DoS attack-based security simulator for VANET
Cyber DoS attack-based security simulator for VANET
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
 
MPROVING THE PRIVACY-PRESERVING OF COVID-19 BLUETOOTH-BASED CONTACT TRACI...
MPROVING THE PRIVACY-PRESERVING   OF COVID-19 BLUETOOTH-BASED   CONTACT TRACI...MPROVING THE PRIVACY-PRESERVING   OF COVID-19 BLUETOOTH-BASED   CONTACT TRACI...
MPROVING THE PRIVACY-PRESERVING OF COVID-19 BLUETOOTH-BASED CONTACT TRACI...
 
Examining Modern Data Security and Privacy Protocols in Autonomous Vehicles
Examining Modern Data Security and Privacy Protocols in Autonomous VehiclesExamining Modern Data Security and Privacy Protocols in Autonomous Vehicles
Examining Modern Data Security and Privacy Protocols in Autonomous Vehicles
 
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
 
Instant messaging tech scet
Instant messaging tech scetInstant messaging tech scet
Instant messaging tech scet
 
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
 
Security in Vehicular Ad Hoc Networks through Mix-Zones Based Privacy
Security in Vehicular Ad Hoc Networks through Mix-Zones Based PrivacySecurity in Vehicular Ad Hoc Networks through Mix-Zones Based Privacy
Security in Vehicular Ad Hoc Networks through Mix-Zones Based Privacy
 
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
 
Trustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social NetworkTrustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social Network
 
Secure instant messanger service
Secure instant messanger serviceSecure instant messanger service
Secure instant messanger service
 
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
 
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
 
A Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS BankingA Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS Banking
 
Authentication Systems in Internet of Things
Authentication Systems in Internet of ThingsAuthentication Systems in Internet of Things
Authentication Systems in Internet of Things
 
Study on analysis of commercial mobile keypad schemes and modeling of shoulde...
Study on analysis of commercial mobile keypad schemes and modeling of shoulde...Study on analysis of commercial mobile keypad schemes and modeling of shoulde...
Study on analysis of commercial mobile keypad schemes and modeling of shoulde...
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 

Andere mochten auch

Performance status of common effluent treatment
Performance status of common effluent treatmentPerformance status of common effluent treatment
Performance status of common effluent treatmenteSAT Publishing House
 
A survey on mobility models for vehicular ad hoc networks
A survey on mobility models for vehicular ad hoc networksA survey on mobility models for vehicular ad hoc networks
A survey on mobility models for vehicular ad hoc networkseSAT Publishing House
 
A comparative evaluation on the properties of hma with variations in aggregat...
A comparative evaluation on the properties of hma with variations in aggregat...A comparative evaluation on the properties of hma with variations in aggregat...
A comparative evaluation on the properties of hma with variations in aggregat...eSAT Publishing House
 
Zigbee based smart fall detection and notification
Zigbee based smart fall detection and notificationZigbee based smart fall detection and notification
Zigbee based smart fall detection and notificationeSAT Publishing House
 
A new cascaded multilevel inverter with less no of switches
A new cascaded multilevel inverter with less no of switchesA new cascaded multilevel inverter with less no of switches
A new cascaded multilevel inverter with less no of switcheseSAT Publishing House
 
Optimization of condenser using microchannel
Optimization of condenser using microchannelOptimization of condenser using microchannel
Optimization of condenser using microchanneleSAT Publishing House
 
Treatment of wastewater and electricity generation
Treatment of wastewater and electricity generationTreatment of wastewater and electricity generation
Treatment of wastewater and electricity generationeSAT Publishing House
 
Ber analysis of wi max in multipath fading channels
Ber analysis of wi max in multipath fading channelsBer analysis of wi max in multipath fading channels
Ber analysis of wi max in multipath fading channelseSAT Publishing House
 
Design evaluation and optimization of steering yoke of an automobile
Design evaluation and optimization of steering yoke of an automobileDesign evaluation and optimization of steering yoke of an automobile
Design evaluation and optimization of steering yoke of an automobileeSAT Publishing House
 
Performance of uncorrupted pixel count decision based
Performance of uncorrupted pixel count decision basedPerformance of uncorrupted pixel count decision based
Performance of uncorrupted pixel count decision basedeSAT Publishing House
 
Web application based file transfer in customized cloud
Web application based file transfer in customized cloudWeb application based file transfer in customized cloud
Web application based file transfer in customized cloudeSAT Publishing House
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 
Application of artificial neural network for blast performance evaluation
Application of artificial neural network for blast performance evaluationApplication of artificial neural network for blast performance evaluation
Application of artificial neural network for blast performance evaluationeSAT Publishing House
 
Smart digital and analogue ambience control and
Smart digital and analogue ambience control andSmart digital and analogue ambience control and
Smart digital and analogue ambience control andeSAT Publishing House
 
Rfid, an enabler in supply chain management
Rfid, an enabler in supply chain managementRfid, an enabler in supply chain management
Rfid, an enabler in supply chain managementeSAT Publishing House
 
A fuzzy logic controlled dc dc converter for an
A fuzzy logic controlled dc dc converter for anA fuzzy logic controlled dc dc converter for an
A fuzzy logic controlled dc dc converter for aneSAT Publishing House
 
An innovative way for computerized smith chart generation and transmission li...
An innovative way for computerized smith chart generation and transmission li...An innovative way for computerized smith chart generation and transmission li...
An innovative way for computerized smith chart generation and transmission li...eSAT Publishing House
 
Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...
Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...
Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...eSAT Publishing House
 
Static stiffness analysis of high frequency milling spindle
Static stiffness analysis of high frequency milling spindleStatic stiffness analysis of high frequency milling spindle
Static stiffness analysis of high frequency milling spindleeSAT Publishing House
 
Solar system as a radio telescope by the formation of virtual lenses above an...
Solar system as a radio telescope by the formation of virtual lenses above an...Solar system as a radio telescope by the formation of virtual lenses above an...
Solar system as a radio telescope by the formation of virtual lenses above an...eSAT Publishing House
 

Andere mochten auch (20)

Performance status of common effluent treatment
Performance status of common effluent treatmentPerformance status of common effluent treatment
Performance status of common effluent treatment
 
A survey on mobility models for vehicular ad hoc networks
A survey on mobility models for vehicular ad hoc networksA survey on mobility models for vehicular ad hoc networks
A survey on mobility models for vehicular ad hoc networks
 
A comparative evaluation on the properties of hma with variations in aggregat...
A comparative evaluation on the properties of hma with variations in aggregat...A comparative evaluation on the properties of hma with variations in aggregat...
A comparative evaluation on the properties of hma with variations in aggregat...
 
Zigbee based smart fall detection and notification
Zigbee based smart fall detection and notificationZigbee based smart fall detection and notification
Zigbee based smart fall detection and notification
 
A new cascaded multilevel inverter with less no of switches
A new cascaded multilevel inverter with less no of switchesA new cascaded multilevel inverter with less no of switches
A new cascaded multilevel inverter with less no of switches
 
Optimization of condenser using microchannel
Optimization of condenser using microchannelOptimization of condenser using microchannel
Optimization of condenser using microchannel
 
Treatment of wastewater and electricity generation
Treatment of wastewater and electricity generationTreatment of wastewater and electricity generation
Treatment of wastewater and electricity generation
 
Ber analysis of wi max in multipath fading channels
Ber analysis of wi max in multipath fading channelsBer analysis of wi max in multipath fading channels
Ber analysis of wi max in multipath fading channels
 
Design evaluation and optimization of steering yoke of an automobile
Design evaluation and optimization of steering yoke of an automobileDesign evaluation and optimization of steering yoke of an automobile
Design evaluation and optimization of steering yoke of an automobile
 
Performance of uncorrupted pixel count decision based
Performance of uncorrupted pixel count decision basedPerformance of uncorrupted pixel count decision based
Performance of uncorrupted pixel count decision based
 
Web application based file transfer in customized cloud
Web application based file transfer in customized cloudWeb application based file transfer in customized cloud
Web application based file transfer in customized cloud
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
Application of artificial neural network for blast performance evaluation
Application of artificial neural network for blast performance evaluationApplication of artificial neural network for blast performance evaluation
Application of artificial neural network for blast performance evaluation
 
Smart digital and analogue ambience control and
Smart digital and analogue ambience control andSmart digital and analogue ambience control and
Smart digital and analogue ambience control and
 
Rfid, an enabler in supply chain management
Rfid, an enabler in supply chain managementRfid, an enabler in supply chain management
Rfid, an enabler in supply chain management
 
A fuzzy logic controlled dc dc converter for an
A fuzzy logic controlled dc dc converter for anA fuzzy logic controlled dc dc converter for an
A fuzzy logic controlled dc dc converter for an
 
An innovative way for computerized smith chart generation and transmission li...
An innovative way for computerized smith chart generation and transmission li...An innovative way for computerized smith chart generation and transmission li...
An innovative way for computerized smith chart generation and transmission li...
 
Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...
Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...
Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...
 
Static stiffness analysis of high frequency milling spindle
Static stiffness analysis of high frequency milling spindleStatic stiffness analysis of high frequency milling spindle
Static stiffness analysis of high frequency milling spindle
 
Solar system as a radio telescope by the formation of virtual lenses above an...
Solar system as a radio telescope by the formation of virtual lenses above an...Solar system as a radio telescope by the formation of virtual lenses above an...
Solar system as a radio telescope by the formation of virtual lenses above an...
 

Ähnlich wie Brisk and secure ad hoc vehicular communication

Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks Ashok Mishra
 
LSKA-ID: A lightweight security and key agreement protocol based on an identi...
LSKA-ID: A lightweight security and key agreement protocol based on an identi...LSKA-ID: A lightweight security and key agreement protocol based on an identi...
LSKA-ID: A lightweight security and key agreement protocol based on an identi...TELKOMNIKA JOURNAL
 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network IRJET Journal
 
A novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud securityA novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud securityTELKOMNIKA JOURNAL
 
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsBlockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsIJCNCJournal
 
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSBLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSIJCNCJournal
 
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road MapSecurity and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road MapMaanak Gupta, Ph.D.
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...IRJET Journal
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingeSAT Journals
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloudeSAT Publishing House
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc NetworksCooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
Trusted computing for infrastructure
Trusted computing for infrastructureTrusted computing for infrastructure
Trusted computing for infrastructureEricsson
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
CVIN ppt.pptx
CVIN ppt.pptxCVIN ppt.pptx
CVIN ppt.pptxAbhi71358
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...IRJET Journal
 
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In VanetAn Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanetijcisjournal
 
IRJET- Future of Transport: Connected Vehicles
IRJET-  	  Future of Transport: Connected VehiclesIRJET-  	  Future of Transport: Connected Vehicles
IRJET- Future of Transport: Connected VehiclesIRJET Journal
 

Ähnlich wie Brisk and secure ad hoc vehicular communication (20)

Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks
 
LSKA-ID: A lightweight security and key agreement protocol based on an identi...
LSKA-ID: A lightweight security and key agreement protocol based on an identi...LSKA-ID: A lightweight security and key agreement protocol based on an identi...
LSKA-ID: A lightweight security and key agreement protocol based on an identi...
 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network
 
A novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud securityA novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud security
 
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsBlockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
 
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSBLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
 
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road MapSecurity and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
 
Jb3515641568
Jb3515641568Jb3515641568
Jb3515641568
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc NetworksCooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
Trusted computing for infrastructure
Trusted computing for infrastructureTrusted computing for infrastructure
Trusted computing for infrastructure
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
CVIN ppt.pptx
CVIN ppt.pptxCVIN ppt.pptx
CVIN ppt.pptx
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
 
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In VanetAn Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
 
IRJET- Future of Transport: Connected Vehicles
IRJET-  	  Future of Transport: Connected VehiclesIRJET-  	  Future of Transport: Connected Vehicles
IRJET- Future of Transport: Connected Vehicles
 

Mehr von eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

Mehr von eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Kürzlich hochgeladen

11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdfAkritiPradhan2
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSneha Padhiar
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmDeepika Walanjkar
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书rnrncn29
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProRay Yuan Liu
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectGayathriM270621
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTSneha Padhiar
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organizationchnrketan
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 

Kürzlich hochgeladen (20)

11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision Pro
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subject
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organization
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 

Brisk and secure ad hoc vehicular communication

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 95 BRISK AND SECURE AD-HOC VEHICULAR COMMUNICATION Miraj Shah1 , Imaad Ukaye2 , Narendra Shekokar3 1, 2 Student, 3 Head of Department, Computer Engg, Dwarkadas J. Sanghvi COE Abstract The idea of Car-to-Car communication is a revolutionary phenomenon in the automobile industry. This idea will surely change the future of humanity for good. This technology will surely change the perception of how a traditional automotive was initially thought of by adding endless applications as a boon to mankind. The application of cars communicating with each other is enormous and has already been discussed by many researchers by now. But, the important thing here is how to put it in practice with the increasing demand for cars and making it safe to use it, at least improve the current condition by this new technology and not worsen the situation by digital hacking and other flaws. Since the nature of the Communication System is highly dynamic a strict security mechanism is mandatory for its seamless functioning. We propose to encrypt the communication taking place in C2C communication which is not the same as using the Internet security mechanism due to limitation of its speed and residing hardware servers. Symmetric Cryptography thus fails to incorporate the scope of various security disciplines and hence it is ineffective to use such techniques. Asymmetric Cryptography on the other hand provides an ideal trade-off among various security disciplines and hence it is considered as an alternative approach to accomplish a secure system but it fails when applied in an ad-hoc environment. However, the traditional Public Key Infrastructure (PKI) technique fails in several ways so we propose a modified form of communication and authentication technique along with rapid communication and group messages to fasten the speed of communication. Keywords: Protocol, Communication, Security, Privacy ---------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION The concept Car-to-Car(C2C) communication is now an evolving trend as a large portion of research funds has been invested all over the globe. Many major car manufacturers have responded positively and are actively working together in bringing this promising technology to fruition. After the concept of autonomous vehicle, cooperative control of multiple vehicles has receives substantial attention in the industry. The key techniques that are being considered include Vehicle-to-Vehicle (V2V), Car-to- Infrastructure (V2I) and Vehicle-to-C.A (V2CA).With advancements in technology in C2C communication various trending problems can be tackled such as automotive safety, user privacy, authentication and validation of vehicles, report to RSU about malevolent cars, etc. Roadside units (RSUs) can be deployed every few miles along the highway for users to communicate about road-safety and obtain other information. Vehicles can use RSUs to report real-time traffic information and request location- based services such as finding restaurants, gas stations, or available parking space. For the sake of cooperation among multiple vehicles effective communication medium is imperative. Although third-generation (3G) networks or satellite techniques can be used to achieve this goal, RSUs have the advantage of low cost, easy deployment, and high bandwidth. Although the primary purpose of system is to enable communication-based automotive safety applications like collision warning, it also provides for a range of business applications, thereby making this technology more cost effective. A Wireless adhoc network perfectly fulfills all the necessary requirements for such a system but at the same time its adhoc nature makes it highly vulnerable to various networking threats. So, securing communication and minimizing communication boundary must be considered for commercial and military applications. To provide a solution we propose a framework for communication among multiple vehicles. Our elucidation is to put forward a new way to visualize multiple vehicles with secure communication and to provide a distributed method to address the problem cooperatively. Security mechanism will protect all traffic sent over the C2C communication network. While securing communication has its own advantages along with privacy and other security goals this high-rate communication would incur high overhead, both in terms of communication and processing. Consider, for example, a vehicle receiving digitally certificate, signing the message, verifying the receiver’s identity, RSU verifying its identity, safety messages from vehicles; it would need to validate a hundreds of vehicles within range within a short delay in the order of a hundred milliseconds [7]. Even if vehicle is effective under such dense network conditions, the additional security overhead could cause failure in meeting the delay and reliability requirements of safety applications. This is especially so because the vehicle environment lacks appropriate algorithm to reduce the load on processing and transfer the load to high speed internal or backbone communication network. The proposed rapid communication and group signing of messages solves these problems and
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 96 meets the security goals with the help of a set of public keys for securing the communication and maintaining anonymity of users or vehicles. First we outline why we actually need to secure car to car open wireless communication by stating various security threats from using open wireless communication or loosely structured security framework. Then in Section II we establish the security model i.e. security goals around which the security of every C2C communication should lie. The review of related work and its analysis along with its drawback is discussed in Section III. Then extending to our own security architecture for our proposed solution is followed by in Section III. Section IV discusses additional mechanism to hasten the authentication process, tracking intruders and closing any gaps in security framework. 2. SECURITY THREATS AND GOALS: Unlike traditional wired/wireless system a C2C communication system is highly dynamic. Along with handling provisions for normal communication and keeping the system secure, it also has to tackle the system dependent problems such as handovers. Handover from one infrastructure to another can be costly as it requires verification of identity at the same time maintaining user- privacy and cost-effective communication. Such a system can also be used for enhancement of road- safety by using various signaling techniques such as collision warning, intersection collision, emergency vehicle, brake-light warning, motorcycle warning, etc. In this communication, security plays a very important role as we discuss the attacks on vehicular communication. 1. Phony information. One or several legitimate members of the network send out false information to misguide other vehicles about traffic conditions. 2. False location. Transmission of a false position message by a malicious vehicle that pretends to be at a claimed position. 3. Tracking identity: A global entity can monitor trajectories of targeted vehicles and use these data for many purposes. 4. False Messages: Such attacks include aggressive transmission of fake messages like accident or traffic jam or emergency vehicle. 5. Masquerade. The attacker claims to be another vehicle by using false identities. We propose modified public key communication and rapid communication technique for enhancing the speed of communication along with additional security specification and architecture. Also, we propose new C2C communication techniques such as group messaging and foreign-vehicle short- term key. We stress that every communication should ensure these security goals. [5] • Confidentiality: Confidentiality is observed to protect sensitive information from getting manipulated and analyzed by eavesdropping as wireless communication medium is open and broadcasted over the air. By using end-to- end encryption, which requires the presence of mutual authentication and key agreement, the confidentiality objective can be achieved • Authentication: Authentication techniques are observed to verify the identity of the vehicular nodes in communication. In particular, the authentication includes two levels: authentication between vehicles (V2V authentication) to provide link-to-link security, and authentication between the vehicle and RSU as well as the service provider (V2Iauthentication). • Privacy: Privacy issues for service provisioning in VANETs regard primarily preserving the anonymity of a vehicle and/or the privacy of its location. Privacy protection tries to prevent adversaries (e.g., another vehicle or an external observer) from linking the vehicle to the driver’s name, license plate, speed, position, and traveling routes along with their relationships to compromise the sender’s privacy • Message Non-Refutation Every message should be binded to the sender so that the sender cannot deny having sent a message. Anonymizer ensures anonymity of sender to other nodes and ensures privacy but does not compromise in security and its association with each sender. • Anonymity: Privacy of vehicles can be protected by introducing a mapping between permanent key and temporary key as one approach, which is an anonymous key pair that can be changed frequently. Another approach is having a set of short-term public keys ,each being used for a random time called the dwell period. An alternative for providing anonymity in vehicular networks is the use of group signatures 3. SECURING COMMUNICATION Although there were few studies regarding the security to different extents, they have all failed in taking the extension ability issue and resultant communication overhead, the time required in authentication of a vehicle versus the required response time into consideration. Authentication of messages must be implemented to allow vehicle users to differentiate reliable information from phony information and to defend against modification attacks and masquerading attacks. An appealing solution to this problem is to digitally sign messages before sending them; not only does this allow the receiver to identify the sender, but the signature also prevents the message contents from being modified in transit. Digital signatures[6] are the basic tool to secure communications, used for all messages. In terms of authentication and integrity-check, digital signature in conventional public key infrastructure (PKI) [1] is a good accepted choice. However, it
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 97 may cause problem when a vehicle is required to verify the signatures of other vehicles by itself and hence trusted authorities are required. Each Certification Authority (C.A) is responsible for a region (national territory, district, county, etc.) and manages identities and credentials of all nodes registered with it. Each node is registered with only one CA, and has a unique long-term identity which may be an Electronic License Plate (ELP) with a long-term key and a certificate. To satisfy both the security and anonymity requirements, we rely on a short-term key authentication approach. Also, further we discuss how tradition PKI is unsuitable for communication and we will use short-term public key pairs instead. Fig. 1 shows security architecture for vehicular communication in which a large set of relevant security concepts [3] exists, including concepts for • Node identification, • Digital signatures and certificates, • Anonymizer for location privacy protection, • Detection of protocol violation, • Plausibility checks, • Tamper-resistant devices, • Access control policies, • Software certification, • In-vehicle network security, • secure positioning, and more. For enhancing the security, the header is divided into variable and invariable fields. Invariable are those fields thatremain unchanged from sender to destination , e.g., destination and source addresses and source position. Variable fields, such as sender location and time-to-live (TTL), are allowed to be altered by intermediate nodes. For packets being sent via multiple wireless hops, two signatures are added: an end-to- end signature is created by the sender node over the invariable fields of the packet header. Additionally, a hop-by-hop signature is added for the variable fields. On reception of a data packet a node verifies both signatures, and replaces the hop-by-hop signature by a new one for the altered variable fields and keeps the end-to-end signature. Eventually, the combination of end-to-end signatures results in a trusted forwarding chain [2]. In order to identify a particular vehicle taking part in communication there is a unique identifier. The Electronic License Plate (ELP) may serve as a unique identifier and acts as identity check mechanism. However, sending the original identifier may be prone to several risks such as masquerading attacks and hence the ELP needs to be mapped to a temporary identifier to be used for communication. There is a trusted authority namely the Certification Authority (C.A.) which keeps track of these unique identifiers and performs the job of mapping into a temporary unique identifier. This original solution however, had many problems like synchronization of different C.A’s and constant communication between V2I (vehicle to Infrastructure) causing further delay and loss of information. Hence the new proposed solution consists of a set (atleast 2) of permanent identifiers stored in each vehicle. Each vehicle consists of atleast 2 unique identifiers or public key. Each car communicates with only one of these stored keys for a certain period of time. This time during which it communicates with a single key is known as dwell time which is a pseudo-random number generated by its own hardware mechanism. It also acts as an added privacy mechanism for hiding user’s identity and making it difficult to track by an intruder. Fig – 1: Security Architecture
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 98 The Fig. 2 shows that every vehicle utilizes multiple short- term public key pairs instead of the old approach of using the same long-term public key for securing communications. The mapping between the long-term keys and the short-term credentials of each node (car) is maintained by the C.A. The main idea is that (i) every vehicle will be equipped with multiple certified public keys (anonymizers) that do not reveal the car’s identity, and (ii) the node uses every one of them for dwell time The multiple-anonymizer technique is adopted to attain location privacy. Particularly, vehicles are assigned with a set of identifiers, and the public keys that are alternatively used. Cars frequently change their key values or temporary identifiers used for authentication over time, and due to the unlinkability of old and new messages their location confidentiality preservation is attained. Moreover, the anonymizers can be linked to a specific vehicle by the CA so that the CA is able to trace and regulate the vehicle’s behavior. Fig- 2 Road map of vehicle using different keys 4. ADDITIONAL FEATURES 4.1 Group Message Furthermore, the signatures and public key certificates radically increase the packet length to cause intense message overhead. Furthermore, these cryptographic operations can incur very high computation and communication overhead. When V2V communication is performed in an urban area with many vehicles in each other’s communication range, this becomes a particularly serious problem. Each node M is equipped with a group vehicle key GVK , with the group members comprising all vehicles registered with the CA. A group key GVK generated by a group member allows for the validation (by any node) of any group signature with the help of CA. Intuitively, a group signature scheme allows any node V to sign a message on behalf of the group, without V ’s identity being revealed to the signature verifier. Moreover, it is impossible to link any two signatures of a legitimate group member. Note that no public key or other credentials need to be attached to an anonymously authenticated message. 4.2 Foreign Vehicle-short-term key Taking an analogy of a tourist place it is easy to spot a local person from the crowd as they look different from others. Taking the inverse in our case a foreign person is easier to be identified and more prone to threats. In C2C communication we use the identifier to relate a particular message to a particular car. However, the mapping between the permanent and temporary credentials also takes place by home C.A and hence this mapping will be completely different from the credentials assigned by a foreign C.A. Say, a car from United States comes to Canada with its permanent and temporary key pairs protecting the car’s identity. However, from a group of say hundred cars these temporary keys that will be used are still easy to distinguish from the keys used locally by the Canadian cars and hence easy to track its location and failing to protect its identity. These keys are like I.P addresses assigned to computers which itself tell its location like country, region, etc. Hence we propose to use new short term but permanent key pairs assigned to them whenever a foreign location is visited i.e. they register themselves with a foreign C.A first which in turn informs the home
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 99 Fig- 3 Communication in Vehicular Network C.A of the change of keys as long as they are in that region. This makes it difficult for an intruder to attack a specific foreign car. 4.3 Rapid Authentication To enable progress to authentication in C2C communication fast access or connectivity to infrastructure is highly needed. The speed with which the vehicle travels may exceed the speed with which the communication takes place between a car and a RSU (Road-Side Unit).The main cause of this delay is authentication mechanism and user privacy.Currently, there are a few strategies to improve this overhead by reducing the handoff latency in which the initial messages are protected and authenticated thereafter, the communication takes place unencrypted making it more prone to replay attacks, hijacking, masquerading and many more attacks. It may take time once for the RSU to authenticate the car then the communication takes place instantly. However, the range of one particular RSU is pretty limited compared to the distance the car covers and hence repeat authentication takes place. This repeated authentication cannot be avoided simply to speed-up the communication however; it can be facilitated with a shared secret key passed from one RSU to another. This shared secret has its own lifetime and the node (car) can be authenticated rapidly with the help of this key. The key is not known to any other car and changes frequently to avoid replay attacks. Here, the added security layer that has been provided is that the shared key may not be broadcasted to all RSU’s in vicinity but only to one that will be next in the range of the car. Hence, a prediction is made based on the messages broadcasted by the car: the direction, speed, brake light and turnsignal. Say there is a message broadcasted as presented below[4]: <Direction, Speed, Acceleration,Turn-Light, Traffic-Light>, where Direction denotes the direction a vehicle turns, such as east or west, and Speed denotes the velocity of a driving vehicle. Acceleration denotes whether a driving vehicle accelerates or decelerates. If the value of this field is positive, the vehicle is speeding up; otherwise, the vehicle is slowing down. The fourth field, Turn-Light, denotes signals of the turn light of a vehicle, particularly when a vehicle is going to turn at an intersection. If the car is travelling on highway with some speed then it’s easy to predict the next RSU and the next after that, saving time on authentication and improving road safety. If the car is travelling in a neighborhood area and suddenly the cars turns, A message will be broadcasted regarding this turnsignal and the RSU may predict the next RSU based on this turnsignal. This prediction may be added cost to RSU however it also reduces the burden of messages that other RSU services. In an ideal condition the authentication takes place the first time with one RSU using the lengthy authentication mechanism and thereafter all communication takes place using rapid authentication speeding up the communication process to almost double the original speed. 4.4 Revocation The revocation is concerned with excluding nodes from the system. The CA will contain a database of revoked node’s identifier and distributes this data to all nodes in the system if necessary, depending on the scale of the revocation decision and the extent to which the malicious activity has been
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 100 performed. A reaction to detected attacks carried out by a node is to exclude this node from the system. Moreover, verification of this malicious activity is also important as, due to flaws in security an intruder can perform such activity and masquerade itself as another node in which case the victim suffers unnecessarily. Also, depending on various factors the threat of that particular vehicle is detected. Factors like the number of nodes reporting the same malicious activity about the node, traffic density, validation of messages, authentication of nodes and position. For example, messages like emergency vehicle are broadcasted so if Trudy broadcasts this false message repeatedly in an urban area with say traffic density of 125 vehicles and only 1 or very few reports comes in then Trudy may not be included in the revocation list instead could be maintained in a temporary warning list for a certain amount of time by the C.A. till which further complaint comes in then appropriate and fast response could be achieved otherwise the node is simply ignored and deleted from temporary warning list . Other reasons not directly related to operation of system, such as a stolen unit or prevention of criminal activity may also require a revocation service. 5. CONCLUSIONS In this paper we propose the security framework for establishing communication and authentication along with privacy in ad hoc Car to Car communication. The different requirements of each user and car were studied and hence it is not appropriate to design a specific security framework for the System. Hence we established rapid authentication mechanism along with group messages to speed up the communication process and make C2C communication in ad hoc environment feasible. The proposed system establishes and maintains communication in the mentioned ad-hoc environment and also it provides a rigorous security infrastructure as a whole. Since these communication systems are to be used in high-end automobiles, cost of implementation and maintenance of Public key infrastructure is financially feasible. Our work will provide a new way to look at the security issues in C2C consortium. REFERENCES [1]. “Securing vehicular ad hoc networks,” Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Network, vol. 15 [2]. “Cross-Layer Privacy Enhancement and Non-Repudiation in Vehicular Communication,” in Proceedings of 4th Workshop on Mobile Ad-Hoc Networks (WMAN), Bern, Switzerland [3]. ”On the Performance of Secure Vehicular Communication System” - IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 8, NO. 6, [4]. Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication- Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, and Claudio E. Palazzi [5]. “The Car-to-Car Communication Consortium,” http://www.car-to-car.org, 2010. [6]. D. Chaum , “Security without Identification: Transaction Systems to Make Big Brother Obsolete,” Comm. ACM, vol. 28, no. 10, [7]. “DSRC: Dedicated Short Range Communications,” http://grouper.ieee.org/groups/scc32/dsrc/index.html, 2009. [8]. J. Blum, A. Eskandarian, and L. Hoffman, “Challenges of intervehicle adhoc networks,” IEEE Trans. Intell. Transp. Syst., vol. 5, no. 4, pp. 347–351, Dec. 2004. [9]. J. Blum and A. Eskandarian, “The threat of intelligent collision,” IEEE IT Prof., vol. 6, no. 1, pp. 24–29, Jan./Feb. 2004. [10]. A. Aijaz, B. Bochow, F. Dötzer, A. Festag, M. Gerlach, R. Kroh, [11]. “Dedicated Short Range Communication at 5.9 GHz StandardsGroup,” http://www.iteris.com/itsarch/html/standard/dsrc5ghz- b.htm,2009. [12]. “ISO TC204 Working Group 16,” http://www.calm.hu/, 2010. [13]. P. Papadimitratos, G. Mezzour, and J.-P. Hubaux, “Certificate Revocation List Distribution in Vehicular Communication Systems,” Proc. Fifth ACM Int’l Conf. Vehicular Ad Hoc Networks(VANET ’08), Sept. 2008. [14]. Y.-W. Lin, Y.-S. Chen, and S.-L. Lee, “Routing protocols in vehicular adhoc networks: A survey and future perspectives,” J. Inf. Sci. Eng., vol. 26, no. 3, pp. 913–932, May 2010. [15]. A. Broggi, P. Cerri, S. Ghidoni, P. Grisleri, and H. G. Jung, “A new approach to urban pedestrian detection for automatic braking,” IEEE Trans. Intell. Transp. Syst., vol. 10, no. 4, pp. 594–605, Dec. 2009. [16]. M.-T. Sun, W.-C. Feng, K. Fujimura, T.-H. Lai, H. Okada, and K. Fujimura, “GPS-based message broadcasting for inter vehicle communication,” in Proc. ICPP, Aug. 2000, pp. 279–286.