SlideShare a Scribd company logo
1 of 6
EMAP: Expedite Message Authentication Protocol for Vehicular Ad
Hoc Networks
Abstract
Vehicular ad hoc networks (VANETs) adopt the Public Key Infrastructure (PKI) and Certificate Revocation
Lists (CRLs) for their security. In any PKI system, the authentication of a received message is performed by
checking if the certificate of the sender is included in the current CRL, and verifying the authenticity of the
certificate and signature of the sender. In this paper, we propose an Expedite Message Authentication Protocol
(EMAP) for VANETs, which replaces the time-consuming CRL checking process by an efficient revocation
checking process. The revocation check process in EMAP uses a keyed Hash Message Authentication Code
HMACÞ, where the key used in calculating the MAC is shared only between no revoked On-Board Units
(OBUs). In addition, EMAP uses a novel probabilistic key distribution, which enables no revoked OBUs to
securely share and update a secret key. EMAP can significantly decrease the message loss ratio due to the
message verification delay compared with the conventional authentication methods employing CRL. By
conducting security analysis and performance evaluation, MAP is demonstrated to be secure and efficient.
EXISTING SYSTEM
The vehicles communicate through wireless channels; a variety of attacks such as injecting false information,
modifying and replaying the disseminated messages can be easily launched. A security attack on VANETs can
have severe harmful or fatal consequences to legitimate users. Consequently, ensuring secure vehicular
communications is a must before any VANET application can be put into practice. A well-recognized solution
to secure VANETs is to deploy Public Key Infrastructure (PKI), and to use Certificate Revocation Lists (CRLs)
for managing the revoked certificates. In PKI, each entity in the network holds an authentic certificate, and
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
every message should be digitally signed before its transmission. A CRL, usually issued by a Trusted Authority
(TA), is a list containing all the revoked certificates. In a PKI system, the authentication of any message is
performed by first checking if the sender’s certificate is included in the current. The first part of the
authentication, which checks the revocation status of the sender in a CRL, may incur long delay depending on
the CRL size and the employed mechanism for searching the CRL. Unfortunately, the CRL size in VANETs is
expected to be large for the following reasons: 1) To preserve the privacy of the drivers, i.e., to abstain the
leakage of the real identities and location information of the drivers from any external eavesdropper, each OBU
should be preloaded with a set of anonymous digital certificates, where the OBU has to periodically change its
anonymous certificate to mislead attackers.
Disadvantages
Consequently, a revocation of an OBU results in revoking all the certificates carried by hat OBU leading
to a large decrease.
The Wireless Access in Vehicular Environments (WAVE) standard does not state that either a no
optimized search algorithm, e.g., linear search, or some sort of optimized search algorithm such as
binary search, will be used for searching a CRL. In this paper, we consider both no optimized and
optimized search algorithms.
Proposed System
The interested in the computation complexity of the revocation status checking process which is
defined as the number of comparison operations required to check the revocation status of an OBU. Let
Nrev denote the total number of revoked certificates in a CRL. To check the revocation status of an
OBUu using the linear search algorithm, an entity has to compare the certificate identity of OBUu with
every certificate of the Nrev certificates in the CRL the entity performs one-to-one checking process.
Consequently, the computation complexities of employing the linear search algorithm to perform a
revocation status checkingin the middle, then half of the CRL with identities lower than that of OBUu
are discarded from the upcoming comparisons. If the certificate identity of OBUu is lower than that of
the entry in the middle, then half of the CRL with identities higher than that of OBUu are discarded. The
checking process is repeated until a match is found or the CRL is finished. It can be seen that at each
step in the binary search method half of the entries considered in the search is discarded. Thus, the
computation complexity of the binary search algorithm to perform a revocation status checking.
Advantages
The time required to perform a point multiplication on an elliptic curve. Consequently, the verification
of a certificate and message signature takes.
The authentication delay per message using EMAP, linear CRL checking process, and binary CRL
checking process versus the number of the revoked certificates, where the number of the revoked
certificates is an indication of the CRL size.
Modules
Primary security requirements
Efficient authentication
Message Authentication
Resistance to Colluding Attacks
Authentication Delay
End-to-End Delay
Message Loss Ratio
Module Description
Primary security requirements
The primary security requirements are identified as entity authentication, message integrity, no
repudiation, and privacy preservation. The PKI is the most viable technique to achieve these security
requirements. PKI employs CRLs to efficiently manage the revoked certificates. Since the CRL size is expected
to be very large, the delay of checking the revocation status of a certificate included in a received message is
expected to be long.
Efficient authentication
The propose an efficient authentication and revocation scheme called TACK. TACK adopts a hierarchy system
architecture consisting of a central trusted authority and regional authorities (RAs) distributed all over the
network. The authors adopted group signature where the trusted authority acts as the group manager and the
vehicles act as the group members. Upon entering a new region, each vehicle must update its certificate from
the RA dedicated for that region.
Message Authentication
The adopt a generic PKI system, the details of the TA signature on a certificate and an OBU signature
on a message are not discussed in this paper for the sake of generality. We only focus in how to accelerate the
revocation checking process, which is conventionally performed by checking the CRL for every received
certificate. The message signing and verification between different entities in the network are performed.
Resistance to Colluding Attacks
A colluding attack, a legitimate OBU colludes with a revoked OBU by releasing the current secret key
K~g such that the revoked vehicle can use this key to pass the revocation check process by calculating the
correct HMAC values for the transmitted messages. All the security materials of an OBU are stored in its
tamper-resistant HSM. In addition, all the keys update processes in Algorithms 3-5 are executed in the HSM,
which means that the new secret key K~g is stored in the HSM, and it cannot be transmitted in clear under any
circumstances.
Authentication Delay
The performs progressive search on a text file containing the unsorted identities of the revoked
certificates, while the binary CRL checking program performs a binary search on a text file containing the
sorted identities of the revoked certificates. For the second and third authentication phases, we employ Elliptic
Curve Digital Signature Algorithm (ECDSA) to check the authenticity of the certificate and the signature of the
sender.
End-to-End Delay
The further evaluate EMAP; we have conducted ns-2 simulation for the city street scenario shown. The
adopted simulation parameters are given. We select the dissemination of the road condition information by an
OBU every 300 msec to conform with the DSRC standards. The mobility traces adopted in this simulation are
generated using TraNS. The end-to-end delay, which is defined as the time to transmit a message from the
sender to the receiver. The end-to-end delay in msec versus the OBUs density, by employing authentication
using the proposed EMAP.
Message Loss Ratio
The average message loss ratio is defined as the average ratio between the number of messages dropped
every 300 msec, due to the message authentication delay, and the total number of messages received every 300
msec by an OBU. It should be noted that we are only interested in the message loss incurred by OBUs due to
V2V communications. According to DSRC, each OBU has to disseminate a message containing information
about the road condition every 300 msec. In order to react properly and instantly to the varying road conditions,
each OBU should verify the messages received during the last 300 msec before disseminating a new message
about the road condition. Therefore, we chose to measure the message loss ratio.
Flow Chart
CONCLUSIONS
We have proposed EMAP for VANETs, which expedites message authentication by replacing the time-
consuming CRL checking process with a fast revocation checking process employing HMAC function. The
proposed EMAP uses a novel key sharing mechanism which allows an OBU to update its compromised keys
even if it previously missed some revocation messages. In addition, EMAP has a modular feature rendering it
integrable with any PKI system. Furthermore, it is resistant to common attacks while outperforming the
authentication techniques employing the conventional CRL. Therefore, EMAP can significantly decrease the
message loss ratio due to message verification delay compared to the conventional authentication methods
employing CRL checking. Our future work will focus on the certificate and message signature authentication
acceleration.
REFERENCES
[1] P. Papadimitratos, A. Kung, J.P. Hubaux, and F. Kargl, “Privacy and Identity Management for Vehicular
Communication Systems: A Position Paper,” Proc. Workshop Standards for Privacy in User- Centric Identity
Management, July 2006.
[2] K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki, “CARAVAN: Providing
Location Privacy for VANET,” Proc. Embedded Security in Cars (ESCAR) Conf., Nov. 2005.
[3] A. Wasef, Y. Jiang, and X. Shen, “DCS: An Efficient Distributed Certificate Service Scheme for Vehicular
Networks,” IEEE Trans. Vehicular Technology, vol. 59, no. 2 pp. 533-549, Feb. 2010.
[4] M. Raya and J.-P. Hubaux, “Securing Vehicular Ad Hoc Networks,” J. Computer Security, vol. 15, no. 1,
pp. 39-68, 2007.
[5] Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, “An Efficient Pseudonymous Authentication Scheme with Strong
Privacy Preservation for Vehicular Communications,” IEEE Trans. Vehicular Technology, vol. 59, no. 7, pp.
3589-3603, Sept. 2010.
[6] R. Lu, X. Lin, H. Luan, X. Liang, and X. Shen, “Pseudonym Changing at Social Spots: An Effective
Strategy for Location Privacy in Vanets,” IEEE Trans. Vehicular Technology, vol. 61, no. 1, pp. 86-96, Jan.
2012.
[7] US Bureau of Transit Statistics, http://en.wikipedia.org/wiki/ Passenger_vehicles_in_the_United_States,
2012.
[8] J.J. Haas, Y. Hu, and K.P. Laberteaux, “Design and Analysis of a Lightweight Certificate Revocation
Mechanism for VANET,” Proc. Sixth ACM Int’l Workshop VehiculAr InterNETworking, pp. 89-98, 2009.

More Related Content

What's hot

Kerberos case study
Kerberos case studyKerberos case study
Kerberos case studyMayuri Patil
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...Ecway Technologies
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEcwaytech
 
Arun prjct dox
Arun prjct doxArun prjct dox
Arun prjct doxBaig Mirza
 
Review on tls or ssl session sharing based web cluster load balancing
Review on tls or ssl session sharing based web cluster load balancingReview on tls or ssl session sharing based web cluster load balancing
Review on tls or ssl session sharing based web cluster load balancingeSAT Publishing House
 
Review on tls or ssl session sharing based web cluster load balancing
Review on tls or ssl session sharing based web cluster load balancingReview on tls or ssl session sharing based web cluster load balancing
Review on tls or ssl session sharing based web cluster load balancingeSAT Journals
 
Efficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication MethodEfficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication MethodIJCERT
 
IEEE 2014 JAVA DATA MINING PROJECTS Secure outsourced attribute based signatures
IEEE 2014 JAVA DATA MINING PROJECTS Secure outsourced attribute based signaturesIEEE 2014 JAVA DATA MINING PROJECTS Secure outsourced attribute based signatures
IEEE 2014 JAVA DATA MINING PROJECTS Secure outsourced attribute based signaturesIEEEFINALYEARSTUDENTPROJECTS
 

What's hot (8)

Kerberos case study
Kerberos case studyKerberos case study
Kerberos case study
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Arun prjct dox
Arun prjct doxArun prjct dox
Arun prjct dox
 
Review on tls or ssl session sharing based web cluster load balancing
Review on tls or ssl session sharing based web cluster load balancingReview on tls or ssl session sharing based web cluster load balancing
Review on tls or ssl session sharing based web cluster load balancing
 
Review on tls or ssl session sharing based web cluster load balancing
Review on tls or ssl session sharing based web cluster load balancingReview on tls or ssl session sharing based web cluster load balancing
Review on tls or ssl session sharing based web cluster load balancing
 
Efficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication MethodEfficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication Method
 
IEEE 2014 JAVA DATA MINING PROJECTS Secure outsourced attribute based signatures
IEEE 2014 JAVA DATA MINING PROJECTS Secure outsourced attribute based signaturesIEEE 2014 JAVA DATA MINING PROJECTS Secure outsourced attribute based signatures
IEEE 2014 JAVA DATA MINING PROJECTS Secure outsourced attribute based signatures
 

Viewers also liked

Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11bguestd7b627
 
Vanet by Sujata Tiwari
Vanet by Sujata TiwariVanet by Sujata Tiwari
Vanet by Sujata Tiwarirahulpandey510
 
wear fin seminar report
wear fin seminar reportwear fin seminar report
wear fin seminar reportflobin
 
Fin presentation
Fin presentationFin presentation
Fin presentationamit gaur
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the CloudGGV Capital
 
A seminar on networks and networking
A seminar on networks and networkingA seminar on networks and networking
A seminar on networks and networkingNAGASHREE C
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedSlideShare
 

Viewers also liked (9)

HSTR Seminar
HSTR SeminarHSTR Seminar
HSTR Seminar
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
Vanet by Sujata Tiwari
Vanet by Sujata TiwariVanet by Sujata Tiwari
Vanet by Sujata Tiwari
 
wear fin seminar report
wear fin seminar reportwear fin seminar report
wear fin seminar report
 
Fin presentation
Fin presentationFin presentation
Fin presentation
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
REVIEW OF LABOUR MARKET2014_ukr
REVIEW OF LABOUR MARKET2014_ukrREVIEW OF LABOUR MARKET2014_ukr
REVIEW OF LABOUR MARKET2014_ukr
 
A seminar on networks and networking
A seminar on networks and networkingA seminar on networks and networking
A seminar on networks and networking
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
 

Similar to Emap expedite message authentication protocol for vehicular ad hoc networks

Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEcway Technologies
 
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Java  emap expedite message authentication protocol for vehicular ad hoc netw...Java  emap expedite message authentication protocol for vehicular ad hoc netw...
Java emap expedite message authentication protocol for vehicular ad hoc netw...ecwayerode
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksecway
 
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Java  emap expedite message authentication protocol for vehicular ad hoc netw...Java  emap expedite message authentication protocol for vehicular ad hoc netw...
Java emap expedite message authentication protocol for vehicular ad hoc netw...Ecway Technologies
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEcway Technologies
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...Ecwaytech
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksecwayprojects
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...Ecwayt
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEcwayt
 
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksEMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksPonmudiselvan.N Selvan
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol     for vehicular ad hoc networksEmap expedite message authentication protocol     for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksMadan Golla
 
An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobi...
An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobi...An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobi...
An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobi...CSCJournals
 
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETsAn Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETsJAYAPRAKASH JPINFOTECH
 
CACMAN COMPARISION WITH MOCA USING PKI ON MANET.
CACMAN COMPARISION WITH MOCA USING PKI  ON MANET.CACMAN COMPARISION WITH MOCA USING PKI  ON MANET.
CACMAN COMPARISION WITH MOCA USING PKI ON MANET.neeravkubavat
 
Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Improving Security Features In MANET Authentication Through Scrutiny Of The C...Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Improving Security Features In MANET Authentication Through Scrutiny Of The C...Editor IJMTER
 
Security in Large Networks by Raja Velampalli
Security in Large Networks by Raja VelampalliSecurity in Large Networks by Raja Velampalli
Security in Large Networks by Raja VelampalliRaja Velampalli
 
Accelerated broadcast authentication with signature amortization for wsns
Accelerated broadcast authentication with signature amortization for wsnsAccelerated broadcast authentication with signature amortization for wsns
Accelerated broadcast authentication with signature amortization for wsnseSAT Publishing House
 
Kerberos using public key cryptography
Kerberos using public key cryptographyKerberos using public key cryptography
Kerberos using public key cryptographyishmecse13
 

Similar to Emap expedite message authentication protocol for vehicular ad hoc networks (20)

Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Java  emap expedite message authentication protocol for vehicular ad hoc netw...Java  emap expedite message authentication protocol for vehicular ad hoc netw...
Java emap expedite message authentication protocol for vehicular ad hoc netw...
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Java  emap expedite message authentication protocol for vehicular ad hoc netw...Java  emap expedite message authentication protocol for vehicular ad hoc netw...
Java emap expedite message authentication protocol for vehicular ad hoc netw...
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksEMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol     for vehicular ad hoc networksEmap expedite message authentication protocol     for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobi...
An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobi...An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobi...
An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobi...
 
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETsAn Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
 
CACMAN COMPARISION WITH MOCA USING PKI ON MANET.
CACMAN COMPARISION WITH MOCA USING PKI  ON MANET.CACMAN COMPARISION WITH MOCA USING PKI  ON MANET.
CACMAN COMPARISION WITH MOCA USING PKI ON MANET.
 
Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Improving Security Features In MANET Authentication Through Scrutiny Of The C...Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Improving Security Features In MANET Authentication Through Scrutiny Of The C...
 
Paper1_Final
Paper1_FinalPaper1_Final
Paper1_Final
 
Security in Large Networks by Raja Velampalli
Security in Large Networks by Raja VelampalliSecurity in Large Networks by Raja Velampalli
Security in Large Networks by Raja Velampalli
 
Accelerated broadcast authentication with signature amortization for wsns
Accelerated broadcast authentication with signature amortization for wsnsAccelerated broadcast authentication with signature amortization for wsns
Accelerated broadcast authentication with signature amortization for wsns
 
W04404135146
W04404135146W04404135146
W04404135146
 
Kerberos using public key cryptography
Kerberos using public key cryptographyKerberos using public key cryptography
Kerberos using public key cryptography
 

More from IEEEFINALYEARPROJECTS

Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsIEEEFINALYEARPROJECTS
 
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsIEEEFINALYEARPROJECTS
 
Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...IEEEFINALYEARPROJECTS
 
Reversible data hiding with optimal value transfer
Reversible data hiding with optimal value transferReversible data hiding with optimal value transfer
Reversible data hiding with optimal value transferIEEEFINALYEARPROJECTS
 
Query adaptive image search with hash codes
Query adaptive image search with hash codesQuery adaptive image search with hash codes
Query adaptive image search with hash codesIEEEFINALYEARPROJECTS
 
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...IEEEFINALYEARPROJECTS
 
Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...IEEEFINALYEARPROJECTS
 
An access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la nsAn access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la nsIEEEFINALYEARPROJECTS
 
Towards differential query services in cost efficient clouds
Towards differential query services in cost efficient cloudsTowards differential query services in cost efficient clouds
Towards differential query services in cost efficient cloudsIEEEFINALYEARPROJECTS
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...IEEEFINALYEARPROJECTS
 
Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...IEEEFINALYEARPROJECTS
 
Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...IEEEFINALYEARPROJECTS
 
Harnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeHarnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeIEEEFINALYEARPROJECTS
 
Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...IEEEFINALYEARPROJECTS
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...IEEEFINALYEARPROJECTS
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...IEEEFINALYEARPROJECTS
 
A secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationA secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationIEEEFINALYEARPROJECTS
 
Utility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approachUtility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approachIEEEFINALYEARPROJECTS
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networksIEEEFINALYEARPROJECTS
 

More from IEEEFINALYEARPROJECTS (20)

Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
 
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
 
Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...
 
Reversible data hiding with optimal value transfer
Reversible data hiding with optimal value transferReversible data hiding with optimal value transfer
Reversible data hiding with optimal value transfer
 
Query adaptive image search with hash codes
Query adaptive image search with hash codesQuery adaptive image search with hash codes
Query adaptive image search with hash codes
 
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
 
Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...
 
An access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la nsAn access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la ns
 
Towards differential query services in cost efficient clouds
Towards differential query services in cost efficient cloudsTowards differential query services in cost efficient clouds
Towards differential query services in cost efficient clouds
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...
 
Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...
 
Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...
 
Non cooperative location privacy
Non cooperative location privacyNon cooperative location privacy
Non cooperative location privacy
 
Harnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeHarnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing large
 
Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...
 
A secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationA secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creation
 
Utility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approachUtility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approach
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Emap expedite message authentication protocol for vehicular ad hoc networks

  • 1. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks Abstract Vehicular ad hoc networks (VANETs) adopt the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs) for their security. In any PKI system, the authentication of a received message is performed by checking if the certificate of the sender is included in the current CRL, and verifying the authenticity of the certificate and signature of the sender. In this paper, we propose an Expedite Message Authentication Protocol (EMAP) for VANETs, which replaces the time-consuming CRL checking process by an efficient revocation checking process. The revocation check process in EMAP uses a keyed Hash Message Authentication Code HMACÞ, where the key used in calculating the MAC is shared only between no revoked On-Board Units (OBUs). In addition, EMAP uses a novel probabilistic key distribution, which enables no revoked OBUs to securely share and update a secret key. EMAP can significantly decrease the message loss ratio due to the message verification delay compared with the conventional authentication methods employing CRL. By conducting security analysis and performance evaluation, MAP is demonstrated to be secure and efficient. EXISTING SYSTEM The vehicles communicate through wireless channels; a variety of attacks such as injecting false information, modifying and replaying the disseminated messages can be easily launched. A security attack on VANETs can have severe harmful or fatal consequences to legitimate users. Consequently, ensuring secure vehicular communications is a must before any VANET application can be put into practice. A well-recognized solution to secure VANETs is to deploy Public Key Infrastructure (PKI), and to use Certificate Revocation Lists (CRLs) for managing the revoked certificates. In PKI, each entity in the network holds an authentic certificate, and GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. every message should be digitally signed before its transmission. A CRL, usually issued by a Trusted Authority (TA), is a list containing all the revoked certificates. In a PKI system, the authentication of any message is performed by first checking if the sender’s certificate is included in the current. The first part of the authentication, which checks the revocation status of the sender in a CRL, may incur long delay depending on the CRL size and the employed mechanism for searching the CRL. Unfortunately, the CRL size in VANETs is expected to be large for the following reasons: 1) To preserve the privacy of the drivers, i.e., to abstain the leakage of the real identities and location information of the drivers from any external eavesdropper, each OBU should be preloaded with a set of anonymous digital certificates, where the OBU has to periodically change its anonymous certificate to mislead attackers. Disadvantages Consequently, a revocation of an OBU results in revoking all the certificates carried by hat OBU leading to a large decrease. The Wireless Access in Vehicular Environments (WAVE) standard does not state that either a no optimized search algorithm, e.g., linear search, or some sort of optimized search algorithm such as binary search, will be used for searching a CRL. In this paper, we consider both no optimized and optimized search algorithms. Proposed System The interested in the computation complexity of the revocation status checking process which is defined as the number of comparison operations required to check the revocation status of an OBU. Let Nrev denote the total number of revoked certificates in a CRL. To check the revocation status of an OBUu using the linear search algorithm, an entity has to compare the certificate identity of OBUu with every certificate of the Nrev certificates in the CRL the entity performs one-to-one checking process. Consequently, the computation complexities of employing the linear search algorithm to perform a revocation status checkingin the middle, then half of the CRL with identities lower than that of OBUu are discarded from the upcoming comparisons. If the certificate identity of OBUu is lower than that of the entry in the middle, then half of the CRL with identities higher than that of OBUu are discarded. The checking process is repeated until a match is found or the CRL is finished. It can be seen that at each step in the binary search method half of the entries considered in the search is discarded. Thus, the computation complexity of the binary search algorithm to perform a revocation status checking.
  • 3. Advantages The time required to perform a point multiplication on an elliptic curve. Consequently, the verification of a certificate and message signature takes. The authentication delay per message using EMAP, linear CRL checking process, and binary CRL checking process versus the number of the revoked certificates, where the number of the revoked certificates is an indication of the CRL size. Modules Primary security requirements Efficient authentication Message Authentication Resistance to Colluding Attacks Authentication Delay End-to-End Delay Message Loss Ratio Module Description Primary security requirements The primary security requirements are identified as entity authentication, message integrity, no repudiation, and privacy preservation. The PKI is the most viable technique to achieve these security requirements. PKI employs CRLs to efficiently manage the revoked certificates. Since the CRL size is expected to be very large, the delay of checking the revocation status of a certificate included in a received message is expected to be long. Efficient authentication The propose an efficient authentication and revocation scheme called TACK. TACK adopts a hierarchy system architecture consisting of a central trusted authority and regional authorities (RAs) distributed all over the network. The authors adopted group signature where the trusted authority acts as the group manager and the vehicles act as the group members. Upon entering a new region, each vehicle must update its certificate from the RA dedicated for that region. Message Authentication The adopt a generic PKI system, the details of the TA signature on a certificate and an OBU signature on a message are not discussed in this paper for the sake of generality. We only focus in how to accelerate the
  • 4. revocation checking process, which is conventionally performed by checking the CRL for every received certificate. The message signing and verification between different entities in the network are performed. Resistance to Colluding Attacks A colluding attack, a legitimate OBU colludes with a revoked OBU by releasing the current secret key K~g such that the revoked vehicle can use this key to pass the revocation check process by calculating the correct HMAC values for the transmitted messages. All the security materials of an OBU are stored in its tamper-resistant HSM. In addition, all the keys update processes in Algorithms 3-5 are executed in the HSM, which means that the new secret key K~g is stored in the HSM, and it cannot be transmitted in clear under any circumstances. Authentication Delay The performs progressive search on a text file containing the unsorted identities of the revoked certificates, while the binary CRL checking program performs a binary search on a text file containing the sorted identities of the revoked certificates. For the second and third authentication phases, we employ Elliptic Curve Digital Signature Algorithm (ECDSA) to check the authenticity of the certificate and the signature of the sender. End-to-End Delay The further evaluate EMAP; we have conducted ns-2 simulation for the city street scenario shown. The adopted simulation parameters are given. We select the dissemination of the road condition information by an OBU every 300 msec to conform with the DSRC standards. The mobility traces adopted in this simulation are generated using TraNS. The end-to-end delay, which is defined as the time to transmit a message from the sender to the receiver. The end-to-end delay in msec versus the OBUs density, by employing authentication using the proposed EMAP. Message Loss Ratio The average message loss ratio is defined as the average ratio between the number of messages dropped every 300 msec, due to the message authentication delay, and the total number of messages received every 300 msec by an OBU. It should be noted that we are only interested in the message loss incurred by OBUs due to V2V communications. According to DSRC, each OBU has to disseminate a message containing information about the road condition every 300 msec. In order to react properly and instantly to the varying road conditions, each OBU should verify the messages received during the last 300 msec before disseminating a new message about the road condition. Therefore, we chose to measure the message loss ratio.
  • 5. Flow Chart CONCLUSIONS We have proposed EMAP for VANETs, which expedites message authentication by replacing the time- consuming CRL checking process with a fast revocation checking process employing HMAC function. The proposed EMAP uses a novel key sharing mechanism which allows an OBU to update its compromised keys even if it previously missed some revocation messages. In addition, EMAP has a modular feature rendering it integrable with any PKI system. Furthermore, it is resistant to common attacks while outperforming the authentication techniques employing the conventional CRL. Therefore, EMAP can significantly decrease the message loss ratio due to message verification delay compared to the conventional authentication methods employing CRL checking. Our future work will focus on the certificate and message signature authentication acceleration.
  • 6. REFERENCES [1] P. Papadimitratos, A. Kung, J.P. Hubaux, and F. Kargl, “Privacy and Identity Management for Vehicular Communication Systems: A Position Paper,” Proc. Workshop Standards for Privacy in User- Centric Identity Management, July 2006. [2] K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki, “CARAVAN: Providing Location Privacy for VANET,” Proc. Embedded Security in Cars (ESCAR) Conf., Nov. 2005. [3] A. Wasef, Y. Jiang, and X. Shen, “DCS: An Efficient Distributed Certificate Service Scheme for Vehicular Networks,” IEEE Trans. Vehicular Technology, vol. 59, no. 2 pp. 533-549, Feb. 2010. [4] M. Raya and J.-P. Hubaux, “Securing Vehicular Ad Hoc Networks,” J. Computer Security, vol. 15, no. 1, pp. 39-68, 2007. [5] Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, “An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Communications,” IEEE Trans. Vehicular Technology, vol. 59, no. 7, pp. 3589-3603, Sept. 2010. [6] R. Lu, X. Lin, H. Luan, X. Liang, and X. Shen, “Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in Vanets,” IEEE Trans. Vehicular Technology, vol. 61, no. 1, pp. 86-96, Jan. 2012. [7] US Bureau of Transit Statistics, http://en.wikipedia.org/wiki/ Passenger_vehicles_in_the_United_States, 2012. [8] J.J. Haas, Y. Hu, and K.P. Laberteaux, “Design and Analysis of a Lightweight Certificate Revocation Mechanism for VANET,” Proc. Sixth ACM Int’l Workshop VehiculAr InterNETworking, pp. 89-98, 2009.