SlideShare a Scribd company logo
1 of 1
Download to read offline
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

EMAP: EXPEDITE MESSAGE AUTHENTICATION PROTOCOL
FOR VEHICULAR AD HOC NETWORKS

ABSTRACT:

Vehicular ad hoc networks (VANETs) adopt the Public Key Infrastructure (PKI) and Certificate
Revocation Lists (CRLs) for their security. In any PKI system, the authentication of a received
message is performed by checking if the certificate of the sender is included in the current CRL,
and verifying the authenticity of the certificate and signature of the sender.

In this paper, we propose an Expedite Message Authentication Protocol (EMAP) for VANETs,
which replaces the time-consuming CRL checking process by an efficient revocation checking
process. The revocation check process in EMAP uses a keyed Hash Message Authentication
Code HMAC, where the key used in calculating the HMAC is shared only between nonrevoked
On-Board Units (OBUs).

EMAP uses a novel probabilistic key distribution, which enables non revoked OBUs to securely
share and update a secret key. EMAP can significantly decrease the message loss ratio due to the
message verification delay compared with the conventional authentication methods employing
CRL. By conducting security analysis and performance evaluation, EMAP is demonstrated to be
secure and efficient.

More Related Content

Viewers also liked

Relatório Guerreiras Grenás 2011
Relatório Guerreiras Grenás 2011Relatório Guerreiras Grenás 2011
Relatório Guerreiras Grenás 2011guerreirasgrenas
 
Conclusões - Livro Marketing Básico
Conclusões - Livro Marketing BásicoConclusões - Livro Marketing Básico
Conclusões - Livro Marketing BásicoDiGo Nascimento
 
Programa de governo do Pastor Everaldo
Programa de governo do Pastor EveraldoPrograma de governo do Pastor Everaldo
Programa de governo do Pastor EveraldoPortal Canal Rural
 
Carta Aberta dos Suinocultores ao país
Carta Aberta dos Suinocultores ao paísCarta Aberta dos Suinocultores ao país
Carta Aberta dos Suinocultores ao paísPortal Canal Rural
 
Boletim Semanal Imea - Milho - 06/02/2012
Boletim Semanal Imea - Milho - 06/02/2012Boletim Semanal Imea - Milho - 06/02/2012
Boletim Semanal Imea - Milho - 06/02/2012Portal Canal Rural
 
Infrome 4 de toxicologia
Infrome  4 de  toxicologiaInfrome  4 de  toxicologia
Infrome 4 de toxicologiaDayDer Valencia
 
ATLAS DO ESPAÇO RURAL BRASILEIRO
ATLAS DO ESPAÇO RURAL BRASILEIROATLAS DO ESPAÇO RURAL BRASILEIRO
ATLAS DO ESPAÇO RURAL BRASILEIROPortal Canal Rural
 
JBS divulga auditoria e plano de trabalho para combater desmatamento na Amazô...
JBS divulga auditoria e plano de trabalho para combater desmatamento na Amazô...JBS divulga auditoria e plano de trabalho para combater desmatamento na Amazô...
JBS divulga auditoria e plano de trabalho para combater desmatamento na Amazô...Portal Canal Rural
 
Instrução Normativa define padrões para classificação do azeite de oliva e do...
Instrução Normativa define padrões para classificação do azeite de oliva e do...Instrução Normativa define padrões para classificação do azeite de oliva e do...
Instrução Normativa define padrões para classificação do azeite de oliva e do...Portal Canal Rural
 
Produtividade da soja em Mato Grosso diminui, aponta Imea
Produtividade da soja em Mato Grosso diminui, aponta ImeaProdutividade da soja em Mato Grosso diminui, aponta Imea
Produtividade da soja em Mato Grosso diminui, aponta ImeaPortal Canal Rural
 
Estudo dos Efeitos Socioeconômicos da Regulamentação, pela Anvisa, dos Assunt...
Estudo dos Efeitos Socioeconômicos da Regulamentação, pela Anvisa, dos Assunt...Estudo dos Efeitos Socioeconômicos da Regulamentação, pela Anvisa, dos Assunt...
Estudo dos Efeitos Socioeconômicos da Regulamentação, pela Anvisa, dos Assunt...Portal Canal Rural
 

Viewers also liked (18)

Md100
Md100Md100
Md100
 
Relatório Guerreiras Grenás 2011
Relatório Guerreiras Grenás 2011Relatório Guerreiras Grenás 2011
Relatório Guerreiras Grenás 2011
 
Inf.10
Inf.10Inf.10
Inf.10
 
Conclusões - Livro Marketing Básico
Conclusões - Livro Marketing BásicoConclusões - Livro Marketing Básico
Conclusões - Livro Marketing Básico
 
Programa de governo do Pastor Everaldo
Programa de governo do Pastor EveraldoPrograma de governo do Pastor Everaldo
Programa de governo do Pastor Everaldo
 
Carta Aberta dos Suinocultores ao país
Carta Aberta dos Suinocultores ao paísCarta Aberta dos Suinocultores ao país
Carta Aberta dos Suinocultores ao país
 
Boletim Semanal Imea - Milho - 06/02/2012
Boletim Semanal Imea - Milho - 06/02/2012Boletim Semanal Imea - Milho - 06/02/2012
Boletim Semanal Imea - Milho - 06/02/2012
 
Infrome 4 de toxicologia
Infrome  4 de  toxicologiaInfrome  4 de  toxicologia
Infrome 4 de toxicologia
 
ATLAS DO ESPAÇO RURAL BRASILEIRO
ATLAS DO ESPAÇO RURAL BRASILEIROATLAS DO ESPAÇO RURAL BRASILEIRO
ATLAS DO ESPAÇO RURAL BRASILEIRO
 
JBS divulga auditoria e plano de trabalho para combater desmatamento na Amazô...
JBS divulga auditoria e plano de trabalho para combater desmatamento na Amazô...JBS divulga auditoria e plano de trabalho para combater desmatamento na Amazô...
JBS divulga auditoria e plano de trabalho para combater desmatamento na Amazô...
 
Panarabismo
PanarabismoPanarabismo
Panarabismo
 
Instrução Normativa define padrões para classificação do azeite de oliva e do...
Instrução Normativa define padrões para classificação do azeite de oliva e do...Instrução Normativa define padrões para classificação do azeite de oliva e do...
Instrução Normativa define padrões para classificação do azeite de oliva e do...
 
101 artigo enapegs
101 artigo enapegs101 artigo enapegs
101 artigo enapegs
 
Informe #1
Informe #1 Informe #1
Informe #1
 
Practica 14
Practica 14Practica 14
Practica 14
 
Produtividade da soja em Mato Grosso diminui, aponta Imea
Produtividade da soja em Mato Grosso diminui, aponta ImeaProdutividade da soja em Mato Grosso diminui, aponta Imea
Produtividade da soja em Mato Grosso diminui, aponta Imea
 
Estudo dos Efeitos Socioeconômicos da Regulamentação, pela Anvisa, dos Assunt...
Estudo dos Efeitos Socioeconômicos da Regulamentação, pela Anvisa, dos Assunt...Estudo dos Efeitos Socioeconômicos da Regulamentação, pela Anvisa, dos Assunt...
Estudo dos Efeitos Socioeconômicos da Regulamentação, pela Anvisa, dos Assunt...
 
Acórdão regimental
Acórdão regimentalAcórdão regimental
Acórdão regimental
 

Similar to Emap expedite message authentication protocol for vehicular ad hoc networks

Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEcway Technologies
 
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Java  emap expedite message authentication protocol for vehicular ad hoc netw...Java  emap expedite message authentication protocol for vehicular ad hoc netw...
Java emap expedite message authentication protocol for vehicular ad hoc netw...ecwayerode
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksecway
 
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Java  emap expedite message authentication protocol for vehicular ad hoc netw...Java  emap expedite message authentication protocol for vehicular ad hoc netw...
Java emap expedite message authentication protocol for vehicular ad hoc netw...Ecway Technologies
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...Ecway Technologies
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEcway Technologies
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksIEEEFINALYEARPROJECTS
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksJPINFOTECH JAYAPRAKASH
 
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksEMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksPonmudiselvan.N Selvan
 
Vehicular ad hoc_networks
Vehicular ad hoc_networksVehicular ad hoc_networks
Vehicular ad hoc_networksAbdulrub Moshin
 
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksEMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksKaashivInfoTech Company
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol     for vehicular ad hoc networksEmap expedite message authentication protocol     for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksMadan Golla
 
Dotnet cluster-based certificate revocation with vindication capability for ...
Dotnet  cluster-based certificate revocation with vindication capability for ...Dotnet  cluster-based certificate revocation with vindication capability for ...
Dotnet cluster-based certificate revocation with vindication capability for ...Ecwayt
 
Cluster based certificate revocation with vindication capability for mobile a...
Cluster based certificate revocation with vindication capability for mobile a...Cluster based certificate revocation with vindication capability for mobile a...
Cluster based certificate revocation with vindication capability for mobile a...ecwayprojects
 
Dotnet cluster-based certificate revocation with vindication capability for ...
Dotnet  cluster-based certificate revocation with vindication capability for ...Dotnet  cluster-based certificate revocation with vindication capability for ...
Dotnet cluster-based certificate revocation with vindication capability for ...Ecwaytech
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...IEEEMEMTECHSTUDENTPROJECTS
 
Effective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksEffective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksNagamalleswararao Tadikonda
 
Effective key management in dynamic wireless sensor network
Effective key management in dynamic wireless sensor networkEffective key management in dynamic wireless sensor network
Effective key management in dynamic wireless sensor networkPvrtechnologies Nellore
 

Similar to Emap expedite message authentication protocol for vehicular ad hoc networks (20)

32
3232
32
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Java  emap expedite message authentication protocol for vehicular ad hoc netw...Java  emap expedite message authentication protocol for vehicular ad hoc netw...
Java emap expedite message authentication protocol for vehicular ad hoc netw...
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Java  emap expedite message authentication protocol for vehicular ad hoc netw...Java  emap expedite message authentication protocol for vehicular ad hoc netw...
Java emap expedite message authentication protocol for vehicular ad hoc netw...
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksEMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
 
Vehicular ad hoc_networks
Vehicular ad hoc_networksVehicular ad hoc_networks
Vehicular ad hoc_networks
 
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksEMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol     for vehicular ad hoc networksEmap expedite message authentication protocol     for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
ieeehs042204d
ieeehs042204dieeehs042204d
ieeehs042204d
 
Dotnet cluster-based certificate revocation with vindication capability for ...
Dotnet  cluster-based certificate revocation with vindication capability for ...Dotnet  cluster-based certificate revocation with vindication capability for ...
Dotnet cluster-based certificate revocation with vindication capability for ...
 
Cluster based certificate revocation with vindication capability for mobile a...
Cluster based certificate revocation with vindication capability for mobile a...Cluster based certificate revocation with vindication capability for mobile a...
Cluster based certificate revocation with vindication capability for mobile a...
 
Dotnet cluster-based certificate revocation with vindication capability for ...
Dotnet  cluster-based certificate revocation with vindication capability for ...Dotnet  cluster-based certificate revocation with vindication capability for ...
Dotnet cluster-based certificate revocation with vindication capability for ...
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
 
Effective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksEffective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networks
 
Effective key management in dynamic wireless sensor network
Effective key management in dynamic wireless sensor networkEffective key management in dynamic wireless sensor network
Effective key management in dynamic wireless sensor network
 

More from ecwayprojects

Model based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsModel based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsecwayprojects
 
Min max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matchingMin max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matchingecwayprojects
 
Mining semantic context information for intelligent video surveillance of tra...
Mining semantic context information for intelligent video surveillance of tra...Mining semantic context information for intelligent video surveillance of tra...
Mining semantic context information for intelligent video surveillance of tra...ecwayprojects
 
Microarchitecture of a coarse grain out-of-order superscalar processor
Microarchitecture of a coarse grain out-of-order superscalar processorMicroarchitecture of a coarse grain out-of-order superscalar processor
Microarchitecture of a coarse grain out-of-order superscalar processorecwayprojects
 
Maximum likelihood estimation from uncertain data in the belief function fram...
Maximum likelihood estimation from uncertain data in the belief function fram...Maximum likelihood estimation from uncertain data in the belief function fram...
Maximum likelihood estimation from uncertain data in the belief function fram...ecwayprojects
 
Localization based radio model calibration for fault-tolerant wireless mesh n...
Localization based radio model calibration for fault-tolerant wireless mesh n...Localization based radio model calibration for fault-tolerant wireless mesh n...
Localization based radio model calibration for fault-tolerant wireless mesh n...ecwayprojects
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine systemecwayprojects
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine systemecwayprojects
 
In network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksIn network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksecwayprojects
 
Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...ecwayprojects
 
Idm an indirect dissemination mechanism for spatial voice interaction in netw...
Idm an indirect dissemination mechanism for spatial voice interaction in netw...Idm an indirect dissemination mechanism for spatial voice interaction in netw...
Idm an indirect dissemination mechanism for spatial voice interaction in netw...ecwayprojects
 
Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...ecwayprojects
 
Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...ecwayprojects
 
Finding rare classes active learning with generative and discriminative models
Finding rare classes active learning with generative and discriminative modelsFinding rare classes active learning with generative and discriminative models
Finding rare classes active learning with generative and discriminative modelsecwayprojects
 
Fast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video deliveryFast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video deliveryecwayprojects
 
Fast activity detection indexing for temporal stochastic automaton based acti...
Fast activity detection indexing for temporal stochastic automaton based acti...Fast activity detection indexing for temporal stochastic automaton based acti...
Fast activity detection indexing for temporal stochastic automaton based acti...ecwayprojects
 
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...ecwayprojects
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisecwayprojects
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsecwayprojects
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksecwayprojects
 

More from ecwayprojects (20)

Model based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsModel based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applications
 
Min max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matchingMin max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matching
 
Mining semantic context information for intelligent video surveillance of tra...
Mining semantic context information for intelligent video surveillance of tra...Mining semantic context information for intelligent video surveillance of tra...
Mining semantic context information for intelligent video surveillance of tra...
 
Microarchitecture of a coarse grain out-of-order superscalar processor
Microarchitecture of a coarse grain out-of-order superscalar processorMicroarchitecture of a coarse grain out-of-order superscalar processor
Microarchitecture of a coarse grain out-of-order superscalar processor
 
Maximum likelihood estimation from uncertain data in the belief function fram...
Maximum likelihood estimation from uncertain data in the belief function fram...Maximum likelihood estimation from uncertain data in the belief function fram...
Maximum likelihood estimation from uncertain data in the belief function fram...
 
Localization based radio model calibration for fault-tolerant wireless mesh n...
Localization based radio model calibration for fault-tolerant wireless mesh n...Localization based radio model calibration for fault-tolerant wireless mesh n...
Localization based radio model calibration for fault-tolerant wireless mesh n...
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine system
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine system
 
In network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksIn network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networks
 
Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...
 
Idm an indirect dissemination mechanism for spatial voice interaction in netw...
Idm an indirect dissemination mechanism for spatial voice interaction in netw...Idm an indirect dissemination mechanism for spatial voice interaction in netw...
Idm an indirect dissemination mechanism for spatial voice interaction in netw...
 
Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...
 
Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...
 
Finding rare classes active learning with generative and discriminative models
Finding rare classes active learning with generative and discriminative modelsFinding rare classes active learning with generative and discriminative models
Finding rare classes active learning with generative and discriminative models
 
Fast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video deliveryFast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video delivery
 
Fast activity detection indexing for temporal stochastic automaton based acti...
Fast activity detection indexing for temporal stochastic automaton based acti...Fast activity detection indexing for temporal stochastic automaton based acti...
Fast activity detection indexing for temporal stochastic automaton based acti...
 
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysis
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networks
 

Emap expedite message authentication protocol for vehicular ad hoc networks

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com EMAP: EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VEHICULAR AD HOC NETWORKS ABSTRACT: Vehicular ad hoc networks (VANETs) adopt the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs) for their security. In any PKI system, the authentication of a received message is performed by checking if the certificate of the sender is included in the current CRL, and verifying the authenticity of the certificate and signature of the sender. In this paper, we propose an Expedite Message Authentication Protocol (EMAP) for VANETs, which replaces the time-consuming CRL checking process by an efficient revocation checking process. The revocation check process in EMAP uses a keyed Hash Message Authentication Code HMAC, where the key used in calculating the HMAC is shared only between nonrevoked On-Board Units (OBUs). EMAP uses a novel probabilistic key distribution, which enables non revoked OBUs to securely share and update a secret key. EMAP can significantly decrease the message loss ratio due to the message verification delay compared with the conventional authentication methods employing CRL. By conducting security analysis and performance evaluation, EMAP is demonstrated to be secure and efficient.