SlideShare a Scribd company logo
1 of 2
An Attribute-Based Framework for Secure Communications
in Vehicular Ad Hoc Networks
ABSTRACT:
In this paper, we introduce an attribute-based framework to achieve secure
communications in vehicular ad hoc networks (VANETs), which enjoys several
advantageous features. The proposed framework employs attribute-based signature
(ABS) to achieve message authentication and integrity and protect vehicle privacy,
which greatly mitigates the overhead caused by pseudonym/private key change or
update in the existing solutions for VANETs based on symmetric key, asymmetric
key, and identity-based cryptography and group signature. In addition, we extend a
standard ABS scheme with traceability and revocation mechanisms and seamlessly
integrate them into the proposed framework to support vehicle traceability and
revocation by a trusted authority, and thus, the resulting scheme for vehicular
communications does not suffer from the anonymity misuse issue, which has been
a challenge for anonymous credential-based vehicular protocols. Finally, we
implement the proposed ABS scheme using a rapid prototyping tool called Charm
to evaluate its performance.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium Dual Core.
 Hard Disk : 120 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 Ram : 1 GB
SOFTWARE REQUIREMENTS:
 Operating system : UBUNTU/Windows XP/7
 Implementation : NS2
 NS2 Version : NS2.2.28
 Front End : OTCL (Object Oriented Tool
Command Language)
 Tool : Cygwin (To simulate in Windows
OS)
REFERENCE:
Hui Cui , Robert H. Deng , Fellow, IEEE, and Guilin Wang, “An Attribute-Based
Framework for Secure Communications in Vehicular Ad Hoc Networks”,
IEEE/ACM Transactions on Networking, Volume: 27 , Issue: 2 , April 2019.

More Related Content

Similar to An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Networks

An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETsAn Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETsJAYAPRAKASH JPINFOTECH
 
eMAS Multifactor Authentication
eMAS Multifactor AuthenticationeMAS Multifactor Authentication
eMAS Multifactor AuthenticationKalyana Sundaram
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol     for vehicular ad hoc networksEmap expedite message authentication protocol     for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksMadan Golla
 
Dynamic audit services for outsourced storages in clouds
Dynamic audit services for outsourced storages in cloudsDynamic audit services for outsourced storages in clouds
Dynamic audit services for outsourced storages in cloudsJPINFOTECH JAYAPRAKASH
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through TokenIRJET Journal
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsKamal Spring
 
certificate less remote anonymous authentication schemes for wireless body ar...
certificate less remote anonymous authentication schemes for wireless body ar...certificate less remote anonymous authentication schemes for wireless body ar...
certificate less remote anonymous authentication schemes for wireless body ar...swathi78
 
Mobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsMobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsVijay Karan
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com msudan92
 
IEEE 2014 JAVA DATA MINING PROJECTS Secure outsourced attribute based signatures
IEEE 2014 JAVA DATA MINING PROJECTS Secure outsourced attribute based signaturesIEEE 2014 JAVA DATA MINING PROJECTS Secure outsourced attribute based signatures
IEEE 2014 JAVA DATA MINING PROJECTS Secure outsourced attribute based signaturesIEEEFINALYEARSTUDENTPROJECTS
 
2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures
2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures
2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signaturesIEEEMEMTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures
2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures
2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signaturesIEEEFINALYEARSTUDENTPROJECT
 
Mobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projectsMobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projectsVijay Karan
 
Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud allan sam
 
Certificateless remote anonymous authentication
Certificateless remote anonymous authenticationCertificateless remote anonymous authentication
Certificateless remote anonymous authenticationShakas Technologies
 
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
JPJ1449 Efficient Authentication for Mobile and Pervasive ComputingJPJ1449 Efficient Authentication for Mobile and Pervasive Computing
JPJ1449 Efficient Authentication for Mobile and Pervasive Computingchennaijp
 
Attribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionAttribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionJPINFOTECH JAYAPRAKASH
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksJPINFOTECH JAYAPRAKASH
 
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsBlockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsIJCNCJournal
 

Similar to An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Networks (20)

An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETsAn Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
 
eMAS Multifactor Authentication
eMAS Multifactor AuthenticationeMAS Multifactor Authentication
eMAS Multifactor Authentication
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol     for vehicular ad hoc networksEmap expedite message authentication protocol     for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Dynamic audit services for outsourced storages in clouds
Dynamic audit services for outsourced storages in cloudsDynamic audit services for outsourced storages in clouds
Dynamic audit services for outsourced storages in clouds
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
certificate less remote anonymous authentication schemes for wireless body ar...
certificate less remote anonymous authentication schemes for wireless body ar...certificate less remote anonymous authentication schemes for wireless body ar...
certificate less remote anonymous authentication schemes for wireless body ar...
 
Mobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsMobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 Projects
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com
 
IEEE 2014 JAVA DATA MINING PROJECTS Secure outsourced attribute based signatures
IEEE 2014 JAVA DATA MINING PROJECTS Secure outsourced attribute based signaturesIEEE 2014 JAVA DATA MINING PROJECTS Secure outsourced attribute based signatures
IEEE 2014 JAVA DATA MINING PROJECTS Secure outsourced attribute based signatures
 
2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures
2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures
2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures
 
2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures
2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures
2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures
 
Two Factor Authentication for VPN
Two Factor Authentication for VPNTwo Factor Authentication for VPN
Two Factor Authentication for VPN
 
Mobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projectsMobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projects
 
Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud
 
Certificateless remote anonymous authentication
Certificateless remote anonymous authenticationCertificateless remote anonymous authentication
Certificateless remote anonymous authentication
 
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
JPJ1449 Efficient Authentication for Mobile and Pervasive ComputingJPJ1449 Efficient Authentication for Mobile and Pervasive Computing
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
 
Attribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionAttribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryption
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsBlockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
 

More from JAYAPRAKASH JPINFOTECH

Java Web Application Project Titles 2023-2024.pdf
Java Web Application Project Titles 2023-2024.pdfJava Web Application Project Titles 2023-2024.pdf
Java Web Application Project Titles 2023-2024.pdfJAYAPRAKASH JPINFOTECH
 
Dot Net Final Year IEEE Project Titles.pdf
Dot Net Final Year IEEE Project Titles.pdfDot Net Final Year IEEE Project Titles.pdf
Dot Net Final Year IEEE Project Titles.pdfJAYAPRAKASH JPINFOTECH
 
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdfMATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdfJAYAPRAKASH JPINFOTECH
 
Python IEEE Project Titles 2023 - 2024.pdf
Python IEEE Project Titles 2023 - 2024.pdfPython IEEE Project Titles 2023 - 2024.pdf
Python IEEE Project Titles 2023 - 2024.pdfJAYAPRAKASH JPINFOTECH
 
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
Python ieee project titles 2021 -  2022 | Machine Learning Final Year Project...Python ieee project titles 2021 -  2022 | Machine Learning Final Year Project...
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...JAYAPRAKASH JPINFOTECH
 
Spammer detection and fake user Identification on Social Networks
Spammer detection and fake user Identification on Social NetworksSpammer detection and fake user Identification on Social Networks
Spammer detection and fake user Identification on Social NetworksJAYAPRAKASH JPINFOTECH
 
Sentiment Classification using N-gram IDF and Automated Machine Learning
Sentiment Classification using N-gram IDF and Automated Machine LearningSentiment Classification using N-gram IDF and Automated Machine Learning
Sentiment Classification using N-gram IDF and Automated Machine LearningJAYAPRAKASH JPINFOTECH
 
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...JAYAPRAKASH JPINFOTECH
 
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
FunkR-pDAE: Personalized Project Recommendation Using Deep LearningFunkR-pDAE: Personalized Project Recommendation Using Deep Learning
FunkR-pDAE: Personalized Project Recommendation Using Deep LearningJAYAPRAKASH JPINFOTECH
 
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...JAYAPRAKASH JPINFOTECH
 
Crop Yield Prediction and Efficient use of Fertilizers
Crop Yield Prediction and Efficient use of FertilizersCrop Yield Prediction and Efficient use of Fertilizers
Crop Yield Prediction and Efficient use of FertilizersJAYAPRAKASH JPINFOTECH
 
Collaborative Filtering-based Electricity Plan Recommender System
Collaborative Filtering-based Electricity Plan Recommender SystemCollaborative Filtering-based Electricity Plan Recommender System
Collaborative Filtering-based Electricity Plan Recommender SystemJAYAPRAKASH JPINFOTECH
 
Achieving Data Truthfulness and Privacy Preservation in Data Markets
Achieving Data Truthfulness and Privacy Preservation in Data MarketsAchieving Data Truthfulness and Privacy Preservation in Data Markets
Achieving Data Truthfulness and Privacy Preservation in Data MarketsJAYAPRAKASH JPINFOTECH
 
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...JAYAPRAKASH JPINFOTECH
 
Towards Fast and Reliable Multi-hop Routing in VANETs
Towards Fast and Reliable Multi-hop Routing in VANETsTowards Fast and Reliable Multi-hop Routing in VANETs
Towards Fast and Reliable Multi-hop Routing in VANETsJAYAPRAKASH JPINFOTECH
 
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...JAYAPRAKASH JPINFOTECH
 
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc NetworksRobust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc NetworksJAYAPRAKASH JPINFOTECH
 
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...JAYAPRAKASH JPINFOTECH
 
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
Novel Intrusion Detection and Prevention for Mobile Ad Hoc NetworksNovel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
Novel Intrusion Detection and Prevention for Mobile Ad Hoc NetworksJAYAPRAKASH JPINFOTECH
 
Node-Level Trust Evaluation in Wireless Sensor Networks
Node-Level Trust Evaluation in Wireless Sensor NetworksNode-Level Trust Evaluation in Wireless Sensor Networks
Node-Level Trust Evaluation in Wireless Sensor NetworksJAYAPRAKASH JPINFOTECH
 

More from JAYAPRAKASH JPINFOTECH (20)

Java Web Application Project Titles 2023-2024.pdf
Java Web Application Project Titles 2023-2024.pdfJava Web Application Project Titles 2023-2024.pdf
Java Web Application Project Titles 2023-2024.pdf
 
Dot Net Final Year IEEE Project Titles.pdf
Dot Net Final Year IEEE Project Titles.pdfDot Net Final Year IEEE Project Titles.pdf
Dot Net Final Year IEEE Project Titles.pdf
 
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdfMATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
 
Python IEEE Project Titles 2023 - 2024.pdf
Python IEEE Project Titles 2023 - 2024.pdfPython IEEE Project Titles 2023 - 2024.pdf
Python IEEE Project Titles 2023 - 2024.pdf
 
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
Python ieee project titles 2021 -  2022 | Machine Learning Final Year Project...Python ieee project titles 2021 -  2022 | Machine Learning Final Year Project...
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
 
Spammer detection and fake user Identification on Social Networks
Spammer detection and fake user Identification on Social NetworksSpammer detection and fake user Identification on Social Networks
Spammer detection and fake user Identification on Social Networks
 
Sentiment Classification using N-gram IDF and Automated Machine Learning
Sentiment Classification using N-gram IDF and Automated Machine LearningSentiment Classification using N-gram IDF and Automated Machine Learning
Sentiment Classification using N-gram IDF and Automated Machine Learning
 
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
 
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
FunkR-pDAE: Personalized Project Recommendation Using Deep LearningFunkR-pDAE: Personalized Project Recommendation Using Deep Learning
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
 
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
 
Crop Yield Prediction and Efficient use of Fertilizers
Crop Yield Prediction and Efficient use of FertilizersCrop Yield Prediction and Efficient use of Fertilizers
Crop Yield Prediction and Efficient use of Fertilizers
 
Collaborative Filtering-based Electricity Plan Recommender System
Collaborative Filtering-based Electricity Plan Recommender SystemCollaborative Filtering-based Electricity Plan Recommender System
Collaborative Filtering-based Electricity Plan Recommender System
 
Achieving Data Truthfulness and Privacy Preservation in Data Markets
Achieving Data Truthfulness and Privacy Preservation in Data MarketsAchieving Data Truthfulness and Privacy Preservation in Data Markets
Achieving Data Truthfulness and Privacy Preservation in Data Markets
 
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
 
Towards Fast and Reliable Multi-hop Routing in VANETs
Towards Fast and Reliable Multi-hop Routing in VANETsTowards Fast and Reliable Multi-hop Routing in VANETs
Towards Fast and Reliable Multi-hop Routing in VANETs
 
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
 
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc NetworksRobust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
 
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
 
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
Novel Intrusion Detection and Prevention for Mobile Ad Hoc NetworksNovel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
 
Node-Level Trust Evaluation in Wireless Sensor Networks
Node-Level Trust Evaluation in Wireless Sensor NetworksNode-Level Trust Evaluation in Wireless Sensor Networks
Node-Level Trust Evaluation in Wireless Sensor Networks
 

Recently uploaded

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Networks

  • 1. An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Networks ABSTRACT: In this paper, we introduce an attribute-based framework to achieve secure communications in vehicular ad hoc networks (VANETs), which enjoys several advantageous features. The proposed framework employs attribute-based signature (ABS) to achieve message authentication and integrity and protect vehicle privacy, which greatly mitigates the overhead caused by pseudonym/private key change or update in the existing solutions for VANETs based on symmetric key, asymmetric key, and identity-based cryptography and group signature. In addition, we extend a standard ABS scheme with traceability and revocation mechanisms and seamlessly integrate them into the proposed framework to support vehicle traceability and revocation by a trusted authority, and thus, the resulting scheme for vehicular communications does not suffer from the anonymity misuse issue, which has been a challenge for anonymous credential-based vehicular protocols. Finally, we implement the proposed ABS scheme using a rapid prototyping tool called Charm to evaluate its performance. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium Dual Core.  Hard Disk : 120 GB.  Monitor : 15’’ LED
  • 2.  Input Devices : Keyboard, Mouse  Ram : 1 GB SOFTWARE REQUIREMENTS:  Operating system : UBUNTU/Windows XP/7  Implementation : NS2  NS2 Version : NS2.2.28  Front End : OTCL (Object Oriented Tool Command Language)  Tool : Cygwin (To simulate in Windows OS) REFERENCE: Hui Cui , Robert H. Deng , Fellow, IEEE, and Guilin Wang, “An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Networks”, IEEE/ACM Transactions on Networking, Volume: 27 , Issue: 2 , April 2019.