SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7944
SIGNRECRYPTING PROXY RE-SIGNATURE IN SECURE VANET
C. Suncia Ashrine 1, M. Thurai Pandian2
1PG Student, Department of CSE, Lord Jagannath College of Engineering and Technology, Tamil Nadu, India
2Associate Professor, Department of CSE, Lord Jagannath College of Engineering and Technology,
Tamil Nadu, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Vehicular Ad hocNetworkisanemergingareaas
a key component of the intelligent transport system. Despite
the immense researches going on in this area, it is yet to be
deployed at its full scale due to lack of trust, safety, and
condentiality in the network. Moreover, the security
algorithms proposed till now are complex, and calculations
involved are difficult to be completed within the strict real-
time constraints. This paper introduces the SignReCrypting
Proxy Re-signature scheme, which reduces the time taken for
encryption at sender side as well as for decryption at receiver
side. Signcryption reduces the computation costbyconverting
two steps of signature and encryption into one, whereas re-
encryption and re-signature enable Alice todecryptandsigna
message on behalf of Bob. These three terminologies
altogether with group signaturemaketheproposedalgorithm
robust, secure, and efficient. The compromised vehicle is
revoked from group usingdynamicaccumulators, andsecurity
is verified using automated validation of Internet security
protocols and applications.
Key Words: AVISPA, dynamic accumulator, group
signature, proxy re-encryption, proxy re-signature,
signcryption, VANET.
1. INTRODUCTION
Even after several advancements in vehicular technology,
road accidents and immense traffic are inevitable fate of the
common folks travelling via roadways. Inexperienced
driving may not necessarilybethecause;badweathercondi-
tions, health related issues and other uncontrollable
situations may cause serious vehicle crashing [1]. The
increasing cases of smog in leading cities of world, where
drivers are not able to see what lies ahead of them, are very
distressing. To control these in an automatedway,Vehicular
Ad-hoc Network (VANET) is a popular technology in which
automobiles can communicate with each other to avoid
collisions and jams. Based on the routing scheme used in
network, vehicles may send messages only to vehicles/RSUs
ahead of them ignoring the behind ones or may
communicate only with pre-declared authenticated
members e.g., in a group. Whatever the routing technique or
channel selecting criteria is, examining it on network before
deployment is a necessary overhead, to avoid any unknown
interference. Since vehicles need to communicate in real
time, even a single minute delay in message delivery is not
permissible.
1.1 Cloud Computing
Cloud computing is the delivery of computing services—
servers, storage, databases, networking, software, analytics,
intelligence and more over the Internet (“the cloud”) to offer
faster innovation, flexible resources and economies of scale.
You typically pay only for cloud services you use, helping
lower your operating costs, run your infrastructure more
efficiently and scale as your business needs change.
2. PROBLEM DEFINITION
Signcryption is the hot topic since it was introduced in 1997
by Zheng [2]. The clear reduction in computation cost aswell
as message expansion was shownbytheauthor.Accordingto
the paper, the expanded bits added to an original message
because of the signature can be shrunk to almost 90% if we
use the signcryption technique which also saves 50% of the
computation and transmission time invested on that
particular message.Later, the prospect diverted from simple
composition of encryption with signature to breeding the
same with already successful techniques in various areas.
The first ever SignRecryption was mentioned in 2006 by
Ateniese et al. Although the proposal was toprovidesecurity
extension to the original re-encryption scheme given by
Blaze, Bleumer, and Strauss (BBS) , signcryption drew many
scholar's attention, for which they even got their patent
published in the year 2012 . They advanced their research
with unidirectional identity based re-encryption,
overcoming the BBS's bidirectional perspective,in whichthe
identity of a node can be converted to identity of another
node with the help of an authenticated proxy.
3. PROPOSED WORK
In this paper, A signcryption technique along with re-
encryption and re-signature schemes, called as SRCPR,
stands for SignReCrypting Proxy Re-signature which starts
with key generation, followed by vehicle registration,
signcryption, message verification at the receiver end, and
then decryption. In the system setup phase, CC first selects
its master private key and public parameters, computes the
corresponding public key, and publishes its public key and
public parameters. In the VC registration phase, VCj submits
its identity, which serves as the public key, and obtains the
corresponding private key generated by CC. In the user
registration phase, CC issues a smart card to Ui. In the phase
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7945
of authentication between Ui and CC, the SS-3FAKAprotocol
is executed between Ui and CC. Ui can request a service
ticket from CC through the established secure channel inthe
ticket request phase. In the phase of authentication between
Ui and VCj, Ui presents the ticket to VCj to establish a secure
channel between Ui and VCj. Finally, the password change
and smart card revocation phases can be invoked to change
the user password and revoke a lost/stolen smart card
without the demand for user identity changing.
Fig -1: Proposed AKA framework
3.1 User Registration
In this phase, the operations are the same as those in SS-
3FAKA.Reg. MM broadcasts its public key in the network, in
a fixed period of time. Whenever any vehicle enters in the
network, it needs to send its identificationdetailsrequesting
membership registration
3.2 Authentication between User and CC
In this phase, the operations are the same as those in SS-
3FAKA.Auth, and the session keys kCC is shared between Ui
and CC after the operations.
3.3 Ticket Request
After Ui has been authenticated by CC, Ui canrequesta ticket
from VCj through a secure channel.
Step 1: Ui first sends a ticket request MSG3=<IDi, IDVCj> to
CC.
Step 2: Upon receiving the request, CC generates a
temporary key tkVCj, defines the validity period of theticket
lifetime, and Ticket VCj= {tkVCj, IDi, lifetime}shkVCj, and
sendsMSG4 = <tkVCj, IDVCj, lifetime, Ticket VCj> to Ui. Here,
{M}K denotes the cipher text of message M encrypted by a
key K.
3.4 Authentication between User and VC
Ui can authenticate VCj using the obtained ticket :
Step 1: Ui generates a one-time random numbernonce1 and
computes M1 = h(nonce1||tkVCj)and sends VCj the ticket
authentication request MSG5 = <Ticket VCj, nonce1, M1>.
Step 2: VCj decrypts the ticket to obtain(tk’VCj, IDi, lifetime).
VCj first verifies whether the ticket is valid. If it is expired,
VCj rejects the authentication request; otherwise, it
computesM’1 = h(nonce1||tk’VCj).IfM’1=M1,VCjabortsthis
session; otherwise, Ui is authorized to access its resources
and services. VCj generates a nonce nonce2, computes M2=
h(nonce1||nonce2||tk’VCj) and the session key skVCj =
h(tk’VCj||nonce1||nonce2), and sends the message MSG6 =
<nonce2, M2> toUi.
Step 3: Ui computes M’2 =h(nonce1||nonce2||tkVCj).IfM’2=
M2, Ui computes skVCj =h(tkVCj||nonce1||nonce2), whichis
the session key between UiandVCj;otherwise,Ui terminates
this session.
The subsequent phases (i.e., passwordand biometric change
and revocation and re-registration)are the same as those in
the SS-3FAKA protocol.
4. RESULTS
Fig -2: Vehicle Registration Page
Fig -3: RSU upload a file
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7946
Fig -4: Vehicle(user) Register with a RSU
Fig -5: RSU sends the Request to Admin
Fig -6: Admin Send the Approval to RSU
Fig -7: File Download
Table -1: Comparison between Proposed and Existing
System
Keys for
Comparison
SHA MD5
Security
High secure than
MD5
Less secure than
SHA
Message Digest
Length
160 bits 128 bits
Attacks required to
find out Original
Message
2160 bit operations
required to break
2128 bit operations
required to break
Attacks to try and
find two messages
producing the
same MD
280 bit operations
required to break
264 bit operations
required to break
Speed
Slower than MD%,
Required 80
iterations
Faster, only 64
iterations
Successful attacks
so far
No such attack
report yet
Attacks reported
to some extents
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7947
Chart -1: Comparison of RSA required file size with other
methods
Chart -2: Comparison of RSA computational time with
other methods
4. CONCLUSIONS
This project introduces the architecture of VCC and
presented the challenges of designing the efficient AKA
protocol in VCC to secure the interactionsbetweenusersand
VCs. It proposed an integrated AKA framework that caters
for the scalability and flexibility required in VCC. The
framework can support single sign-on, such that a user is
able to securely access multiple VCswithout registeringwith
each VC repeatedly.
The performance analysis demonstrates that the proposed
framework provides firm securitywhileensuring acceptable
computational cost and low communication overhead.
REFERENCES
[1] A. H. A. Hanan, M. Y. Idris, O. Kaiwartya, M. Prasad, and R.
R. Shah, ``Real traffic-data based evaluation of vehicular
traffic environment and state-of-the-art withfutureissuesin
location-centric data dissemination for VANETs,'' Digit.
Communication. Network., vol. 3, no. 3, pp. 195 210, 2017.
[2] Y. Zheng, ``Digital signcryption or how to achieve cost
(signature & encryption)cost(signature)C cost(encryption),''
in Proc. Annu. Int. Cryptol. Conf., 1997, pp. 165 179.
[3] S. Kanchan, G. Singh, and N. S. Chaudhari, ``Re-encrypting
secure and efficient routing in VANET groups usingsharable
clouds,'' in Proc. IEEE 4th Int. Conf. Recent Adv. Inf. Technol.
(RAIT), Mar. 2018, pp. 16.
[4] J. Zhang and X. A. Wang, ``Non-transitive bidirectional
proxy re-encryption scheme,'' in Proc. IEEE Int. Conf. Netw.
Digit. Soc., vol. 1, May 2009, pp. 213 216.
[5] G. Ateniese and S. Hohenberger, ``Proxy re-signatures:
New definitions, algorithms, and applications,'' in Proc.12th
ACMConf. Comput. Commun. Secur., 2005, pp. 310 319.
[6] C.-L. Chen, Y.-F. Lin, A. Castiglione, and F. Palmieri, ``A
secure payment system for multimedia on demand on
mobile VANET clouds,'' Secure.Commun.Network,vol.9,no.
17, pp. 4378 4390, 2016.
[7] C. Sur, Y. Park, and K. H. Rhee, ``An efficient and secure
navigation protocol basedon vehicularcloud,''Int.J.Comput.
Math., vol. 93, no. 2, pp. 325344, 2016.
[8] J. Ni, A. Zhang, X. Lin, and X. S. Shen, ``Security, privacy,
and fairness in fog-based vehicular crowd sensing,'' IEEE
Commun. Mag., vol. 55, no. 6, pp. 146 152, Jun. 2017.
[9] C. Wang, C. Liu, Y. Li, H. Qiao, and L.Chen,``Multi-message
and multi- receiver heterogeneous signcryption scheme for
ad-hoc networks,'' Inf. Secure. J., Global Perspective, vol. 26,
no. 3, pp. 136 152, 2017.

More Related Content

What's hot

Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
Iaetsd Iaetsd
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
Conference Papers
 

What's hot (11)

Cryptanalysis and Security Enhancement of a Khan et al.'s Scheme
Cryptanalysis and Security Enhancement of a Khan et al.'s SchemeCryptanalysis and Security Enhancement of a Khan et al.'s Scheme
Cryptanalysis and Security Enhancement of a Khan et al.'s Scheme
 
A performance comparison of proposed approach of multiserver authentication a...
A performance comparison of proposed approach of multiserver authentication a...A performance comparison of proposed approach of multiserver authentication a...
A performance comparison of proposed approach of multiserver authentication a...
 
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate System
 
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing AttacksIRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
 
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
 
IRJET - Authentication using Image Selection and Voice Recognition
IRJET - Authentication using Image Selection and Voice RecognitionIRJET - Authentication using Image Selection and Voice Recognition
IRJET - Authentication using Image Selection and Voice Recognition
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
 
Elevating security in mobile adhoc network using
Elevating security in mobile adhoc network usingElevating security in mobile adhoc network using
Elevating security in mobile adhoc network using
 

Similar to IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet

Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communication
eSAT Journals
 

Similar to IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet (20)

IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
Active Directory Golden Ticket Attack Detection
Active Directory Golden Ticket Attack DetectionActive Directory Golden Ticket Attack Detection
Active Directory Golden Ticket Attack Detection
 
IRJET- Decentralized E-Voting System
IRJET-  	  Decentralized E-Voting SystemIRJET-  	  Decentralized E-Voting System
IRJET- Decentralized E-Voting System
 
Smart Contract for Insurance: Opportunities and Challenges for Insurers
Smart Contract for Insurance: Opportunities and Challenges for InsurersSmart Contract for Insurance: Opportunities and Challenges for Insurers
Smart Contract for Insurance: Opportunities and Challenges for Insurers
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
 
IRJET- Internal Security in Metropolitan Area Network using Kerberos
IRJET- Internal Security in Metropolitan Area Network using KerberosIRJET- Internal Security in Metropolitan Area Network using Kerberos
IRJET- Internal Security in Metropolitan Area Network using Kerberos
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communication
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communication
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
 
Blockchain Based Electronic Ballot System
Blockchain Based Electronic Ballot SystemBlockchain Based Electronic Ballot System
Blockchain Based Electronic Ballot System
 
ONLINE DOCUMENT VERIFICATION
ONLINE DOCUMENT VERIFICATIONONLINE DOCUMENT VERIFICATION
ONLINE DOCUMENT VERIFICATION
 
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODE
 
Blockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT DevicesBlockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT Devices
 
Digital Certificate Verification using Blockchain
Digital Certificate Verification using BlockchainDigital Certificate Verification using Blockchain
Digital Certificate Verification using Blockchain
 
IRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET - Precise and Efficient Processing of Data in Permissioned BlockchainIRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 

Recently uploaded (20)

Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 

IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7944 SIGNRECRYPTING PROXY RE-SIGNATURE IN SECURE VANET C. Suncia Ashrine 1, M. Thurai Pandian2 1PG Student, Department of CSE, Lord Jagannath College of Engineering and Technology, Tamil Nadu, India 2Associate Professor, Department of CSE, Lord Jagannath College of Engineering and Technology, Tamil Nadu, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Vehicular Ad hocNetworkisanemergingareaas a key component of the intelligent transport system. Despite the immense researches going on in this area, it is yet to be deployed at its full scale due to lack of trust, safety, and condentiality in the network. Moreover, the security algorithms proposed till now are complex, and calculations involved are difficult to be completed within the strict real- time constraints. This paper introduces the SignReCrypting Proxy Re-signature scheme, which reduces the time taken for encryption at sender side as well as for decryption at receiver side. Signcryption reduces the computation costbyconverting two steps of signature and encryption into one, whereas re- encryption and re-signature enable Alice todecryptandsigna message on behalf of Bob. These three terminologies altogether with group signaturemaketheproposedalgorithm robust, secure, and efficient. The compromised vehicle is revoked from group usingdynamicaccumulators, andsecurity is verified using automated validation of Internet security protocols and applications. Key Words: AVISPA, dynamic accumulator, group signature, proxy re-encryption, proxy re-signature, signcryption, VANET. 1. INTRODUCTION Even after several advancements in vehicular technology, road accidents and immense traffic are inevitable fate of the common folks travelling via roadways. Inexperienced driving may not necessarilybethecause;badweathercondi- tions, health related issues and other uncontrollable situations may cause serious vehicle crashing [1]. The increasing cases of smog in leading cities of world, where drivers are not able to see what lies ahead of them, are very distressing. To control these in an automatedway,Vehicular Ad-hoc Network (VANET) is a popular technology in which automobiles can communicate with each other to avoid collisions and jams. Based on the routing scheme used in network, vehicles may send messages only to vehicles/RSUs ahead of them ignoring the behind ones or may communicate only with pre-declared authenticated members e.g., in a group. Whatever the routing technique or channel selecting criteria is, examining it on network before deployment is a necessary overhead, to avoid any unknown interference. Since vehicles need to communicate in real time, even a single minute delay in message delivery is not permissible. 1.1 Cloud Computing Cloud computing is the delivery of computing services— servers, storage, databases, networking, software, analytics, intelligence and more over the Internet (“the cloud”) to offer faster innovation, flexible resources and economies of scale. You typically pay only for cloud services you use, helping lower your operating costs, run your infrastructure more efficiently and scale as your business needs change. 2. PROBLEM DEFINITION Signcryption is the hot topic since it was introduced in 1997 by Zheng [2]. The clear reduction in computation cost aswell as message expansion was shownbytheauthor.Accordingto the paper, the expanded bits added to an original message because of the signature can be shrunk to almost 90% if we use the signcryption technique which also saves 50% of the computation and transmission time invested on that particular message.Later, the prospect diverted from simple composition of encryption with signature to breeding the same with already successful techniques in various areas. The first ever SignRecryption was mentioned in 2006 by Ateniese et al. Although the proposal was toprovidesecurity extension to the original re-encryption scheme given by Blaze, Bleumer, and Strauss (BBS) , signcryption drew many scholar's attention, for which they even got their patent published in the year 2012 . They advanced their research with unidirectional identity based re-encryption, overcoming the BBS's bidirectional perspective,in whichthe identity of a node can be converted to identity of another node with the help of an authenticated proxy. 3. PROPOSED WORK In this paper, A signcryption technique along with re- encryption and re-signature schemes, called as SRCPR, stands for SignReCrypting Proxy Re-signature which starts with key generation, followed by vehicle registration, signcryption, message verification at the receiver end, and then decryption. In the system setup phase, CC first selects its master private key and public parameters, computes the corresponding public key, and publishes its public key and public parameters. In the VC registration phase, VCj submits its identity, which serves as the public key, and obtains the corresponding private key generated by CC. In the user registration phase, CC issues a smart card to Ui. In the phase
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7945 of authentication between Ui and CC, the SS-3FAKAprotocol is executed between Ui and CC. Ui can request a service ticket from CC through the established secure channel inthe ticket request phase. In the phase of authentication between Ui and VCj, Ui presents the ticket to VCj to establish a secure channel between Ui and VCj. Finally, the password change and smart card revocation phases can be invoked to change the user password and revoke a lost/stolen smart card without the demand for user identity changing. Fig -1: Proposed AKA framework 3.1 User Registration In this phase, the operations are the same as those in SS- 3FAKA.Reg. MM broadcasts its public key in the network, in a fixed period of time. Whenever any vehicle enters in the network, it needs to send its identificationdetailsrequesting membership registration 3.2 Authentication between User and CC In this phase, the operations are the same as those in SS- 3FAKA.Auth, and the session keys kCC is shared between Ui and CC after the operations. 3.3 Ticket Request After Ui has been authenticated by CC, Ui canrequesta ticket from VCj through a secure channel. Step 1: Ui first sends a ticket request MSG3=<IDi, IDVCj> to CC. Step 2: Upon receiving the request, CC generates a temporary key tkVCj, defines the validity period of theticket lifetime, and Ticket VCj= {tkVCj, IDi, lifetime}shkVCj, and sendsMSG4 = <tkVCj, IDVCj, lifetime, Ticket VCj> to Ui. Here, {M}K denotes the cipher text of message M encrypted by a key K. 3.4 Authentication between User and VC Ui can authenticate VCj using the obtained ticket : Step 1: Ui generates a one-time random numbernonce1 and computes M1 = h(nonce1||tkVCj)and sends VCj the ticket authentication request MSG5 = <Ticket VCj, nonce1, M1>. Step 2: VCj decrypts the ticket to obtain(tk’VCj, IDi, lifetime). VCj first verifies whether the ticket is valid. If it is expired, VCj rejects the authentication request; otherwise, it computesM’1 = h(nonce1||tk’VCj).IfM’1=M1,VCjabortsthis session; otherwise, Ui is authorized to access its resources and services. VCj generates a nonce nonce2, computes M2= h(nonce1||nonce2||tk’VCj) and the session key skVCj = h(tk’VCj||nonce1||nonce2), and sends the message MSG6 = <nonce2, M2> toUi. Step 3: Ui computes M’2 =h(nonce1||nonce2||tkVCj).IfM’2= M2, Ui computes skVCj =h(tkVCj||nonce1||nonce2), whichis the session key between UiandVCj;otherwise,Ui terminates this session. The subsequent phases (i.e., passwordand biometric change and revocation and re-registration)are the same as those in the SS-3FAKA protocol. 4. RESULTS Fig -2: Vehicle Registration Page Fig -3: RSU upload a file
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7946 Fig -4: Vehicle(user) Register with a RSU Fig -5: RSU sends the Request to Admin Fig -6: Admin Send the Approval to RSU Fig -7: File Download Table -1: Comparison between Proposed and Existing System Keys for Comparison SHA MD5 Security High secure than MD5 Less secure than SHA Message Digest Length 160 bits 128 bits Attacks required to find out Original Message 2160 bit operations required to break 2128 bit operations required to break Attacks to try and find two messages producing the same MD 280 bit operations required to break 264 bit operations required to break Speed Slower than MD%, Required 80 iterations Faster, only 64 iterations Successful attacks so far No such attack report yet Attacks reported to some extents
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7947 Chart -1: Comparison of RSA required file size with other methods Chart -2: Comparison of RSA computational time with other methods 4. CONCLUSIONS This project introduces the architecture of VCC and presented the challenges of designing the efficient AKA protocol in VCC to secure the interactionsbetweenusersand VCs. It proposed an integrated AKA framework that caters for the scalability and flexibility required in VCC. The framework can support single sign-on, such that a user is able to securely access multiple VCswithout registeringwith each VC repeatedly. The performance analysis demonstrates that the proposed framework provides firm securitywhileensuring acceptable computational cost and low communication overhead. REFERENCES [1] A. H. A. Hanan, M. Y. Idris, O. Kaiwartya, M. Prasad, and R. R. Shah, ``Real traffic-data based evaluation of vehicular traffic environment and state-of-the-art withfutureissuesin location-centric data dissemination for VANETs,'' Digit. Communication. Network., vol. 3, no. 3, pp. 195 210, 2017. [2] Y. Zheng, ``Digital signcryption or how to achieve cost (signature & encryption)cost(signature)C cost(encryption),'' in Proc. Annu. Int. Cryptol. Conf., 1997, pp. 165 179. [3] S. Kanchan, G. Singh, and N. S. Chaudhari, ``Re-encrypting secure and efficient routing in VANET groups usingsharable clouds,'' in Proc. IEEE 4th Int. Conf. Recent Adv. Inf. Technol. (RAIT), Mar. 2018, pp. 16. [4] J. Zhang and X. A. Wang, ``Non-transitive bidirectional proxy re-encryption scheme,'' in Proc. IEEE Int. Conf. Netw. Digit. Soc., vol. 1, May 2009, pp. 213 216. [5] G. Ateniese and S. Hohenberger, ``Proxy re-signatures: New definitions, algorithms, and applications,'' in Proc.12th ACMConf. Comput. Commun. Secur., 2005, pp. 310 319. [6] C.-L. Chen, Y.-F. Lin, A. Castiglione, and F. Palmieri, ``A secure payment system for multimedia on demand on mobile VANET clouds,'' Secure.Commun.Network,vol.9,no. 17, pp. 4378 4390, 2016. [7] C. Sur, Y. Park, and K. H. Rhee, ``An efficient and secure navigation protocol basedon vehicularcloud,''Int.J.Comput. Math., vol. 93, no. 2, pp. 325344, 2016. [8] J. Ni, A. Zhang, X. Lin, and X. S. Shen, ``Security, privacy, and fairness in fog-based vehicular crowd sensing,'' IEEE Commun. Mag., vol. 55, no. 6, pp. 146 152, Jun. 2017. [9] C. Wang, C. Liu, Y. Li, H. Qiao, and L.Chen,``Multi-message and multi- receiver heterogeneous signcryption scheme for ad-hoc networks,'' Inf. Secure. J., Global Perspective, vol. 26, no. 3, pp. 136 152, 2017.