SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 95
BRISK AND SECURE AD-HOC VEHICULAR COMMUNICATION
Miraj Shah1
, Imaad Ukaye2
, Narendra Shekokar3
1, 2
Student, 3
Head of Department, Computer Engg, Dwarkadas J. Sanghvi COE
Abstract
The idea of Car-to-Car communication is a revolutionary phenomenon in the automobile industry. This idea will surely change the
future of humanity for good. This technology will surely change the perception of how a traditional automotive was initially thought of
by adding endless applications as a boon to mankind. The application of cars communicating with each other is enormous and has
already been discussed by many researchers by now. But, the important thing here is how to put it in practice with the increasing
demand for cars and making it safe to use it, at least improve the current condition by this new technology and not worsen the
situation by digital hacking and other flaws. Since the nature of the Communication System is highly dynamic a strict security
mechanism is mandatory for its seamless functioning. We propose to encrypt the communication taking place in C2C communication
which is not the same as using the Internet security mechanism due to limitation of its speed and residing hardware servers.
Symmetric Cryptography thus fails to incorporate the scope of various security disciplines and hence it is ineffective to use such
techniques. Asymmetric Cryptography on the other hand provides an ideal trade-off among various security disciplines and hence it is
considered as an alternative approach to accomplish a secure system but it fails when applied in an ad-hoc environment. However,
the traditional Public Key Infrastructure (PKI) technique fails in several ways so we propose a modified form of communication and
authentication technique along with rapid communication and group messages to fasten the speed of communication.
Keywords: Protocol, Communication, Security, Privacy
---------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
The concept Car-to-Car(C2C) communication is now an
evolving trend as a large portion of research funds has been
invested all over the globe. Many major car manufacturers
have responded positively and are actively working together in
bringing this promising technology to fruition. After the
concept of autonomous vehicle, cooperative control of
multiple vehicles has receives substantial attention in the
industry. The key techniques that are being considered include
Vehicle-to-Vehicle (V2V), Car-to- Infrastructure (V2I) and
Vehicle-to-C.A (V2CA).With advancements in technology in
C2C communication various trending problems can be tackled
such as automotive safety, user privacy, authentication and
validation of vehicles, report to RSU about malevolent cars,
etc. Roadside units (RSUs) can be deployed every few miles
along the highway for users to communicate about road-safety
and obtain other information. Vehicles can use RSUs to report
real-time traffic information and request location- based
services such as finding restaurants, gas stations, or available
parking space. For the sake of cooperation among multiple
vehicles effective communication medium is imperative.
Although third-generation (3G) networks or satellite
techniques can be used to achieve this goal, RSUs have the
advantage of low cost, easy deployment, and high bandwidth.
Although the primary purpose of system is to enable
communication-based automotive safety applications like
collision warning, it also provides for a range of business
applications, thereby making this technology more cost
effective. A Wireless adhoc network perfectly fulfills all the
necessary requirements for such a system but at the same time
its adhoc nature makes it highly vulnerable to various
networking threats. So, securing communication and
minimizing communication boundary must be considered for
commercial and military applications. To provide a solution
we propose a framework for communication among multiple
vehicles. Our elucidation is to put forward a new way to
visualize multiple vehicles with secure communication and to
provide a distributed method to address the problem
cooperatively.
Security mechanism will protect all traffic sent over the C2C
communication network. While securing communication has
its own advantages along with privacy and other security goals
this high-rate communication would incur high overhead, both
in terms of communication and processing. Consider, for
example, a vehicle receiving digitally certificate, signing the
message, verifying the receiver’s identity, RSU verifying its
identity, safety messages from vehicles; it would need to
validate a hundreds of vehicles within range within a short
delay in the order of a hundred milliseconds [7]. Even if
vehicle is effective under such dense network conditions, the
additional security overhead could cause failure in meeting the
delay and reliability requirements of safety applications. This
is especially so because the vehicle environment lacks
appropriate algorithm to reduce the load on processing and
transfer the load to high speed internal or backbone
communication network. The proposed rapid communication
and group signing of messages solves these problems and
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 96
meets the security goals with the help of a set of public keys
for securing the communication and maintaining anonymity of
users or vehicles.
First we outline why we actually need to secure car to car
open wireless communication by stating various security
threats from using open wireless communication or loosely
structured security framework. Then in Section II we establish
the security model i.e. security goals around which the
security of every C2C communication should lie. The review
of related work and its analysis along with its drawback is
discussed in Section III. Then extending to our own security
architecture for our proposed solution is followed by in
Section III. Section IV discusses additional mechanism to
hasten the authentication process, tracking intruders and
closing any gaps in security framework.
2. SECURITY THREATS AND GOALS:
Unlike traditional wired/wireless system a C2C
communication system is highly dynamic. Along with
handling provisions for normal communication and keeping
the system secure, it also has to tackle the system dependent
problems such as handovers. Handover from one
infrastructure to another can be costly as it requires
verification of identity at the same time maintaining user-
privacy and cost-effective communication.
Such a system can also be used for enhancement of road-
safety by using various signaling techniques such as collision
warning, intersection collision, emergency vehicle, brake-light
warning, motorcycle warning, etc. In this communication,
security plays a very important role as we discuss the attacks
on vehicular communication.
1. Phony information. One or several legitimate
members of the network send out false information to
misguide other vehicles about traffic conditions.
2. False location. Transmission of a false position
message by a malicious vehicle that pretends to be at
a claimed position.
3. Tracking identity: A global entity can monitor
trajectories of targeted vehicles and use these data for
many purposes.
4. False Messages: Such attacks include aggressive
transmission of fake messages like accident or traffic
jam or emergency vehicle.
5. Masquerade. The attacker claims to be another
vehicle by using false identities.
We propose modified public key communication and rapid
communication technique for enhancing the speed of
communication along with additional security specification
and architecture. Also, we propose new C2C communication
techniques such as group messaging and foreign-vehicle short-
term key. We stress that every communication should ensure
these security goals. [5]
• Confidentiality:
Confidentiality is observed to protect sensitive
information from getting manipulated and analyzed by
eavesdropping as wireless communication medium is
open and broadcasted over the air. By using end-to-
end encryption, which requires the presence of mutual
authentication and key agreement, the confidentiality
objective can be achieved
• Authentication: Authentication techniques are
observed to verify the identity of the vehicular nodes
in communication. In particular, the authentication
includes two levels: authentication between vehicles
(V2V authentication) to provide link-to-link security,
and authentication between the vehicle and RSU as
well as the service provider (V2Iauthentication).
• Privacy: Privacy issues for service provisioning in
VANETs regard primarily preserving the anonymity
of a vehicle and/or the privacy of its location. Privacy
protection tries to prevent adversaries (e.g., another
vehicle or an external observer) from linking the
vehicle to the driver’s name, license plate, speed,
position, and traveling routes along with their
relationships to compromise the sender’s privacy
• Message Non-Refutation Every message should be
binded to the sender so that the sender cannot deny
having sent a message. Anonymizer ensures
anonymity of sender to other nodes and ensures
privacy but does not compromise in security and its
association with each sender.
• Anonymity: Privacy of vehicles can be protected by
introducing a mapping between permanent key and
temporary key as one approach, which is an
anonymous key pair that can be changed frequently.
Another approach is having a set of short-term public
keys ,each being used for a random time called the
dwell period. An alternative for providing anonymity
in vehicular networks is the use of group signatures
3. SECURING COMMUNICATION
Although there were few studies regarding the security to
different extents, they have all failed in taking the extension
ability issue and resultant communication overhead, the time
required in authentication of a vehicle versus the required
response time into consideration. Authentication of messages
must be implemented to allow vehicle users to differentiate
reliable information from phony information and to defend
against modification attacks and masquerading attacks. An
appealing solution to this problem is to digitally sign messages
before sending them; not only does this allow the receiver to
identify the sender, but the signature also prevents the
message contents from being modified in transit. Digital
signatures[6] are the basic tool to secure communications,
used for all messages. In terms of authentication and
integrity-check, digital signature in conventional public key
infrastructure (PKI) [1] is a good accepted choice. However, it
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 97
may cause problem when a vehicle is required to verify the
signatures of other vehicles by itself and hence trusted
authorities are required. Each Certification Authority (C.A) is
responsible for a region (national territory, district, county,
etc.) and manages identities and credentials of all nodes
registered with it. Each node is registered with only one CA,
and has a unique long-term identity which may be an
Electronic License Plate (ELP) with a long-term key and a
certificate. To satisfy both the security and anonymity
requirements, we rely on a short-term key authentication
approach. Also, further we discuss how tradition PKI is
unsuitable for communication and we will use short-term
public key pairs instead.
Fig. 1 shows security architecture for vehicular
communication in which a large set of relevant security
concepts [3] exists, including concepts for
• Node identification,
• Digital signatures and certificates,
• Anonymizer for location privacy protection,
• Detection of protocol violation,
• Plausibility checks,
• Tamper-resistant devices,
• Access control policies,
• Software certification,
• In-vehicle network security,
• secure positioning, and more.
For enhancing the security, the header is divided into variable
and invariable fields. Invariable are those fields thatremain
unchanged from sender to destination , e.g., destination and
source addresses and source position. Variable fields, such as
sender location and time-to-live (TTL), are allowed to be
altered by intermediate nodes. For packets being sent via
multiple wireless hops, two signatures are added: an end-to-
end signature is created by the sender node over the invariable
fields of the packet header. Additionally, a hop-by-hop
signature is added for the variable fields. On reception of a
data packet a node verifies both signatures, and replaces the
hop-by-hop signature by a new one for the altered variable
fields and keeps the end-to-end signature. Eventually, the
combination of end-to-end signatures results in a trusted
forwarding chain [2].
In order to identify a particular vehicle taking part in
communication there is a unique identifier. The Electronic
License Plate (ELP) may serve as a unique identifier and acts
as identity check mechanism. However, sending the original
identifier may be prone to several risks such as masquerading
attacks and hence the ELP needs to be mapped to a temporary
identifier to be used for communication. There is a trusted
authority namely the Certification Authority (C.A.) which
keeps track of these unique identifiers and performs the job of
mapping into a temporary unique identifier. This original
solution however, had many problems like synchronization of
different C.A’s and constant communication between V2I
(vehicle to Infrastructure) causing further delay and loss of
information. Hence the new proposed solution consists of a set
(atleast 2) of permanent identifiers stored in each vehicle.
Each vehicle consists of atleast 2 unique identifiers or public
key. Each car communicates with only one of these stored
keys for a certain period of time. This time during which it
communicates with a single key is known as dwell time which
is a pseudo-random number generated by its own hardware
mechanism. It also acts as an added privacy mechanism for
hiding user’s identity and making it difficult to track by an
intruder.
Fig – 1: Security Architecture
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 98
The Fig. 2 shows that every vehicle utilizes multiple short-
term public key pairs instead of the old approach of using the
same long-term public key for securing communications. The
mapping between the long-term keys and the short-term
credentials of each node (car) is maintained by the C.A. The
main idea is that (i) every vehicle will be equipped with
multiple certified public keys (anonymizers) that do not reveal
the car’s identity, and (ii) the node uses every one of them for
dwell time
The multiple-anonymizer technique is adopted to attain
location privacy. Particularly, vehicles are assigned with a set
of identifiers, and the public keys that are alternatively used.
Cars frequently change their key values or temporary
identifiers used for authentication over time, and due to the
unlinkability of old and new messages their location
confidentiality preservation is attained.
Moreover, the anonymizers can be linked to a specific vehicle
by the CA so that the CA is able to trace and regulate the
vehicle’s behavior.
Fig- 2 Road map of vehicle using different keys
4. ADDITIONAL FEATURES
4.1 Group Message
Furthermore, the signatures and public key certificates
radically increase the packet length to cause intense message
overhead. Furthermore, these cryptographic operations can
incur very high computation and communication overhead.
When V2V communication is performed in an urban area with
many vehicles in each other’s communication range, this
becomes a particularly serious problem.
Each node M is equipped with a group vehicle key GVK ,
with the group members comprising all vehicles registered
with the CA. A group key GVK generated by a group member
allows for the validation (by any node) of any group signature
with the help of CA. Intuitively, a group signature scheme
allows any node V to sign a message on behalf of the group,
without V ’s identity being revealed to the signature verifier.
Moreover, it is impossible to link any two signatures of a
legitimate group member. Note that no public key or other
credentials need to be attached to an anonymously
authenticated message.
4.2 Foreign Vehicle-short-term key
Taking an analogy of a tourist place it is easy to spot a local
person from the crowd as they look different from others.
Taking the inverse in our case a foreign person is easier to be
identified and more prone to threats. In C2C communication
we use the identifier to relate a particular message to a
particular car. However, the mapping between the permanent
and temporary credentials also takes place by home C.A and
hence this mapping will be completely different from the
credentials assigned by a foreign C.A. Say, a car from United
States comes to Canada with its permanent and temporary key
pairs protecting the car’s identity. However, from a group of
say hundred cars these temporary keys that will be used are
still easy to distinguish from the keys used locally by the
Canadian cars and hence easy to track its location and failing
to protect its identity. These keys are like I.P addresses
assigned to computers which itself tell its location like
country, region, etc. Hence we propose to use new short term
but permanent key pairs assigned to them whenever a foreign
location is visited i.e. they register themselves with a foreign
C.A first which in turn informs the home
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 99
Fig- 3 Communication in Vehicular Network
C.A of the change of keys as long as they are in that region.
This makes it difficult for an intruder to attack a specific
foreign car.
4.3 Rapid Authentication
To enable progress to authentication in C2C communication
fast access or connectivity to infrastructure is highly needed.
The speed with which the vehicle travels may exceed the
speed with which the communication takes place between a
car and a RSU (Road-Side Unit).The main cause of this delay
is authentication mechanism and user privacy.Currently, there
are a few strategies to improve this overhead by reducing the
handoff latency in which the initial messages are protected and
authenticated thereafter, the communication takes place
unencrypted making it more prone to replay attacks, hijacking,
masquerading and many more attacks.
It may take time once for the RSU to authenticate the car then
the communication takes place instantly. However, the range
of one particular RSU is pretty limited compared to the
distance the car covers and hence repeat authentication takes
place. This repeated authentication cannot be avoided simply
to speed-up the communication however; it can be facilitated
with a shared secret key passed from one RSU to another. This
shared secret has its own lifetime and the node (car) can be
authenticated rapidly with the help of this key. The key is not
known to any other car and changes frequently to avoid replay
attacks. Here, the added security layer that has been provided
is that the shared key may not be broadcasted to all RSU’s in
vicinity but only to one that will be next in the range of the
car. Hence, a prediction is made based on the messages
broadcasted by the car: the direction, speed, brake light and
turnsignal. Say there is a message broadcasted as presented
below[4]: <Direction, Speed, Acceleration,Turn-Light,
Traffic-Light>, where Direction denotes the direction a vehicle
turns, such as east or west, and Speed denotes the velocity of a
driving vehicle. Acceleration denotes whether a driving
vehicle accelerates or decelerates. If the value of this field is
positive, the vehicle is speeding up; otherwise, the vehicle is
slowing down. The fourth field, Turn-Light, denotes signals of
the turn light of a vehicle, particularly when a vehicle is going
to turn at an intersection.
If the car is travelling on highway with some speed then it’s
easy to predict the next RSU and the next after that, saving
time on authentication and improving road safety. If the car is
travelling in a neighborhood area and suddenly the cars turns,
A message will be broadcasted regarding this turnsignal and
the RSU may predict the next RSU based on this turnsignal.
This prediction may be added cost to RSU however it also
reduces the burden of messages that other RSU services. In an
ideal condition the authentication takes place the first time
with one RSU using the lengthy authentication mechanism and
thereafter all communication takes place using rapid
authentication speeding up the communication process to
almost double the original speed.
4.4 Revocation
The revocation is concerned with excluding nodes from the
system. The CA will contain a database of revoked node’s
identifier and distributes this data to all nodes in the system if
necessary, depending on the scale of the revocation decision
and the extent to which the malicious activity has been
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 100
performed. A reaction to detected attacks carried out by a node
is to exclude this node from the system. Moreover, verification
of this malicious activity is also important as, due to flaws in
security an intruder can perform such activity and masquerade
itself as another node in which case the victim suffers
unnecessarily. Also, depending on various factors the threat of
that particular vehicle is detected. Factors like the number of
nodes reporting the same malicious activity about the node,
traffic density, validation of messages, authentication of nodes
and position. For example, messages like emergency vehicle
are broadcasted so if Trudy broadcasts this false message
repeatedly in an urban area with say traffic density of 125
vehicles and only 1 or very few reports comes in then Trudy
may not be included in the revocation list instead could be
maintained in a temporary warning list for a certain amount of
time by the C.A. till which further complaint comes in then
appropriate and fast response could be achieved otherwise the
node is simply ignored and deleted from temporary warning
list . Other reasons not directly related to operation of system,
such as a stolen unit or prevention of criminal activity may
also require a revocation service.
5. CONCLUSIONS
In this paper we propose the security framework for
establishing communication and authentication along with
privacy in ad hoc Car to Car communication. The different
requirements of each user and car were studied and hence it is
not appropriate to design a specific security framework for the
System. Hence we established rapid authentication mechanism
along with group messages to speed up the communication
process and make C2C communication in ad hoc environment
feasible. The proposed system establishes and maintains
communication in the mentioned ad-hoc environment and also
it provides a rigorous security infrastructure as a whole. Since
these communication systems are to be used in high-end
automobiles, cost of implementation and maintenance of
Public key infrastructure is financially feasible. Our work will
provide a new way to look at the security issues in C2C
consortium.
REFERENCES
[1]. “Securing vehicular ad hoc networks,” Journal of
Computer Security - Special Issue on Security of Ad-hoc and
Sensor Network, vol. 15
[2]. “Cross-Layer Privacy Enhancement and Non-Repudiation
in Vehicular Communication,” in Proceedings of 4th
Workshop on Mobile Ad-Hoc Networks (WMAN), Bern,
Switzerland
[3]. ”On the Performance of Secure Vehicular Communication
System” - IEEE TRANSACTIONS ON DEPENDABLE AND
SECURE COMPUTING, VOL. 8, NO. 6,
[4]. Fast and Secure Multihop Broadcast Solutions for
Intervehicular Communication- Wafa Ben Jaballah, Mauro
Conti, Mohamed Mosbah, and Claudio E. Palazzi
[5]. “The Car-to-Car Communication Consortium,”
http://www.car-to-car.org, 2010.
[6]. D. Chaum , “Security without Identification: Transaction
Systems to Make Big Brother Obsolete,” Comm. ACM, vol.
28, no. 10,
[7]. “DSRC: Dedicated Short Range Communications,”
http://grouper.ieee.org/groups/scc32/dsrc/index.html, 2009.
[8]. J. Blum, A. Eskandarian, and L. Hoffman, “Challenges of
intervehicle adhoc networks,” IEEE Trans. Intell. Transp.
Syst., vol. 5, no. 4, pp. 347–351, Dec. 2004.
[9]. J. Blum and A. Eskandarian, “The threat of intelligent
collision,” IEEE IT Prof., vol. 6, no. 1, pp. 24–29, Jan./Feb.
2004.
[10]. A. Aijaz, B. Bochow, F. Dötzer, A. Festag, M. Gerlach,
R. Kroh,
[11]. “Dedicated Short Range Communication at 5.9 GHz
StandardsGroup,”
http://www.iteris.com/itsarch/html/standard/dsrc5ghz-
b.htm,2009.
[12]. “ISO TC204 Working Group 16,” http://www.calm.hu/,
2010.
[13]. P. Papadimitratos, G. Mezzour, and J.-P. Hubaux,
“Certificate Revocation List Distribution in Vehicular
Communication Systems,” Proc. Fifth ACM Int’l Conf.
Vehicular Ad Hoc Networks(VANET ’08), Sept. 2008.
[14]. Y.-W. Lin, Y.-S. Chen, and S.-L. Lee, “Routing
protocols in vehicular adhoc networks: A survey and future
perspectives,” J. Inf. Sci. Eng., vol. 26, no. 3, pp. 913–932,
May 2010.
[15]. A. Broggi, P. Cerri, S. Ghidoni, P. Grisleri, and H. G.
Jung, “A new approach to urban pedestrian detection for
automatic braking,” IEEE Trans. Intell. Transp. Syst., vol. 10,
no. 4, pp. 594–605, Dec. 2009.
[16]. M.-T. Sun, W.-C. Feng, K. Fujimura, T.-H. Lai, H.
Okada, and K. Fujimura, “GPS-based message broadcasting
for inter vehicle communication,” in Proc. ICPP, Aug. 2000,
pp. 279–286.

More Related Content

What's hot

Global mobility and handover management for heterogeneous network in vanet
Global mobility and handover management for heterogeneous network in vanetGlobal mobility and handover management for heterogeneous network in vanet
Global mobility and handover management for heterogeneous network in vanet
ijngnjournal
 
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
IJCNCJournal
 
5G Coupler Design for Intelligent Transportation System (ITS) Application
5G Coupler Design for Intelligent Transportation System (ITS) Application 5G Coupler Design for Intelligent Transportation System (ITS) Application
5G Coupler Design for Intelligent Transportation System (ITS) Application
IJECEIAES
 
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
pijans
 
Ijret20150424005
Ijret20150424005Ijret20150424005
Ijret20150424005
shilpaHD2
 
08
0808
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
IJCNCJournal
 
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
pijans
 
Intelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIntelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIAEME Publication
 
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS
pijans
 
Full-duplex user-centric communication using non-orthogonal multiple access
Full-duplex user-centric communication using non-orthogonal multiple accessFull-duplex user-centric communication using non-orthogonal multiple access
Full-duplex user-centric communication using non-orthogonal multiple access
TELKOMNIKA JOURNAL
 
A Review on Energy Efficient Modulation and Coding Techniques for Clustered W...
A Review on Energy Efficient Modulation and Coding Techniques for Clustered W...A Review on Energy Efficient Modulation and Coding Techniques for Clustered W...
A Review on Energy Efficient Modulation and Coding Techniques for Clustered W...
Editor IJARCET
 
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
eSAT Publishing House
 
ADAPTIVE RANDOM SPATIAL BASED CHANNEL ESTIMATION (ARSCE) FOR MILLIMETER WAVE ...
ADAPTIVE RANDOM SPATIAL BASED CHANNEL ESTIMATION (ARSCE) FOR MILLIMETER WAVE ...ADAPTIVE RANDOM SPATIAL BASED CHANNEL ESTIMATION (ARSCE) FOR MILLIMETER WAVE ...
ADAPTIVE RANDOM SPATIAL BASED CHANNEL ESTIMATION (ARSCE) FOR MILLIMETER WAVE ...
IJCNCJournal
 
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
IRJET Journal
 
Performance analysis of iterative idma scheme in power line communication usi...
Performance analysis of iterative idma scheme in power line communication usi...Performance analysis of iterative idma scheme in power line communication usi...
Performance analysis of iterative idma scheme in power line communication usi...
Alexander Decker
 
Dl34689693
Dl34689693Dl34689693
Dl34689693
IJERA Editor
 
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK
IJCNCJournal
 
Modified Timed Efficient Stream Loss-tolerant Authentication to Secure Power ...
Modified Timed Efficient Stream Loss-tolerant Authentication to Secure Power ...Modified Timed Efficient Stream Loss-tolerant Authentication to Secure Power ...
Modified Timed Efficient Stream Loss-tolerant Authentication to Secure Power ...
IJECEIAES
 

What's hot (20)

Ijetcas14 357
Ijetcas14 357Ijetcas14 357
Ijetcas14 357
 
Global mobility and handover management for heterogeneous network in vanet
Global mobility and handover management for heterogeneous network in vanetGlobal mobility and handover management for heterogeneous network in vanet
Global mobility and handover management for heterogeneous network in vanet
 
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
 
5G Coupler Design for Intelligent Transportation System (ITS) Application
5G Coupler Design for Intelligent Transportation System (ITS) Application 5G Coupler Design for Intelligent Transportation System (ITS) Application
5G Coupler Design for Intelligent Transportation System (ITS) Application
 
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
 
Ijret20150424005
Ijret20150424005Ijret20150424005
Ijret20150424005
 
08
0808
08
 
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
 
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
 
Intelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIntelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networks
 
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS
 
Full-duplex user-centric communication using non-orthogonal multiple access
Full-duplex user-centric communication using non-orthogonal multiple accessFull-duplex user-centric communication using non-orthogonal multiple access
Full-duplex user-centric communication using non-orthogonal multiple access
 
A Review on Energy Efficient Modulation and Coding Techniques for Clustered W...
A Review on Energy Efficient Modulation and Coding Techniques for Clustered W...A Review on Energy Efficient Modulation and Coding Techniques for Clustered W...
A Review on Energy Efficient Modulation and Coding Techniques for Clustered W...
 
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
 
ADAPTIVE RANDOM SPATIAL BASED CHANNEL ESTIMATION (ARSCE) FOR MILLIMETER WAVE ...
ADAPTIVE RANDOM SPATIAL BASED CHANNEL ESTIMATION (ARSCE) FOR MILLIMETER WAVE ...ADAPTIVE RANDOM SPATIAL BASED CHANNEL ESTIMATION (ARSCE) FOR MILLIMETER WAVE ...
ADAPTIVE RANDOM SPATIAL BASED CHANNEL ESTIMATION (ARSCE) FOR MILLIMETER WAVE ...
 
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
 
Performance analysis of iterative idma scheme in power line communication usi...
Performance analysis of iterative idma scheme in power line communication usi...Performance analysis of iterative idma scheme in power line communication usi...
Performance analysis of iterative idma scheme in power line communication usi...
 
Dl34689693
Dl34689693Dl34689693
Dl34689693
 
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK
 
Modified Timed Efficient Stream Loss-tolerant Authentication to Secure Power ...
Modified Timed Efficient Stream Loss-tolerant Authentication to Secure Power ...Modified Timed Efficient Stream Loss-tolerant Authentication to Secure Power ...
Modified Timed Efficient Stream Loss-tolerant Authentication to Secure Power ...
 

Viewers also liked

Enhancement of torsional resistance in fibrous normal strength concrete beams
Enhancement of torsional resistance in fibrous normal strength concrete beamsEnhancement of torsional resistance in fibrous normal strength concrete beams
Enhancement of torsional resistance in fibrous normal strength concrete beams
eSAT Journals
 
Development of microcontroller based instrument for checking quality of edibl...
Development of microcontroller based instrument for checking quality of edibl...Development of microcontroller based instrument for checking quality of edibl...
Development of microcontroller based instrument for checking quality of edibl...
eSAT Journals
 
River monitoring through wireless sensor network
River monitoring through wireless sensor networkRiver monitoring through wireless sensor network
River monitoring through wireless sensor network
eSAT Journals
 
Single to multiple kernel learning with four popular svm kernels (survey)
Single to multiple kernel learning with four popular svm kernels (survey)Single to multiple kernel learning with four popular svm kernels (survey)
Single to multiple kernel learning with four popular svm kernels (survey)
eSAT Journals
 
Performance comparison of blind adaptive multiuser detection algorithms
Performance comparison of blind adaptive multiuser detection algorithmsPerformance comparison of blind adaptive multiuser detection algorithms
Performance comparison of blind adaptive multiuser detection algorithms
eSAT Journals
 
Recent developments in paper currency recognition system
Recent developments in paper currency recognition systemRecent developments in paper currency recognition system
Recent developments in paper currency recognition system
eSAT Journals
 
Design and analysing of compact microstrip antenna with defected ground struc...
Design and analysing of compact microstrip antenna with defected ground struc...Design and analysing of compact microstrip antenna with defected ground struc...
Design and analysing of compact microstrip antenna with defected ground struc...
eSAT Journals
 
Investigation of the appropriate cooking temperature for freshly harvested ma...
Investigation of the appropriate cooking temperature for freshly harvested ma...Investigation of the appropriate cooking temperature for freshly harvested ma...
Investigation of the appropriate cooking temperature for freshly harvested ma...
eSAT Journals
 
Analysis of stress in circular hollow section by fea and analytical technique
Analysis of stress in circular hollow section by fea and analytical techniqueAnalysis of stress in circular hollow section by fea and analytical technique
Analysis of stress in circular hollow section by fea and analytical technique
eSAT Journals
 
Using landsat 8 data to explorethe correlation between urban heat island and ...
Using landsat 8 data to explorethe correlation between urban heat island and ...Using landsat 8 data to explorethe correlation between urban heat island and ...
Using landsat 8 data to explorethe correlation between urban heat island and ...
eSAT Journals
 
Preliminary study of on cladding process on gray cast iron substrate
Preliminary study of on cladding process on gray cast iron substratePreliminary study of on cladding process on gray cast iron substrate
Preliminary study of on cladding process on gray cast iron substrate
eSAT Journals
 
The development of supervisory system for electricity control in smgg, guntur...
The development of supervisory system for electricity control in smgg, guntur...The development of supervisory system for electricity control in smgg, guntur...
The development of supervisory system for electricity control in smgg, guntur...
eSAT Journals
 
Brain tumor detection and segmentation using watershed segmentation and morph...
Brain tumor detection and segmentation using watershed segmentation and morph...Brain tumor detection and segmentation using watershed segmentation and morph...
Brain tumor detection and segmentation using watershed segmentation and morph...
eSAT Journals
 
Partial replacement of cement in concrete using waste glass powder and m sand...
Partial replacement of cement in concrete using waste glass powder and m sand...Partial replacement of cement in concrete using waste glass powder and m sand...
Partial replacement of cement in concrete using waste glass powder and m sand...
eSAT Journals
 
Arm recognition encryption by using aes algorithm
Arm recognition    encryption by using aes algorithmArm recognition    encryption by using aes algorithm
Arm recognition encryption by using aes algorithm
eSAT Journals
 
Effects of replacement of metakaolin with cement on the mechanical properties...
Effects of replacement of metakaolin with cement on the mechanical properties...Effects of replacement of metakaolin with cement on the mechanical properties...
Effects of replacement of metakaolin with cement on the mechanical properties...
eSAT Journals
 
Prediction of pollutants emissions dispersion of phosphate fertilizers produc...
Prediction of pollutants emissions dispersion of phosphate fertilizers produc...Prediction of pollutants emissions dispersion of phosphate fertilizers produc...
Prediction of pollutants emissions dispersion of phosphate fertilizers produc...
eSAT Journals
 
A three level disposal site selection criteria system for toxic and hazardous...
A three level disposal site selection criteria system for toxic and hazardous...A three level disposal site selection criteria system for toxic and hazardous...
A three level disposal site selection criteria system for toxic and hazardous...
eSAT Journals
 
Privacy preserving data mining in four group randomized response technique us...
Privacy preserving data mining in four group randomized response technique us...Privacy preserving data mining in four group randomized response technique us...
Privacy preserving data mining in four group randomized response technique us...
eSAT Journals
 

Viewers also liked (19)

Enhancement of torsional resistance in fibrous normal strength concrete beams
Enhancement of torsional resistance in fibrous normal strength concrete beamsEnhancement of torsional resistance in fibrous normal strength concrete beams
Enhancement of torsional resistance in fibrous normal strength concrete beams
 
Development of microcontroller based instrument for checking quality of edibl...
Development of microcontroller based instrument for checking quality of edibl...Development of microcontroller based instrument for checking quality of edibl...
Development of microcontroller based instrument for checking quality of edibl...
 
River monitoring through wireless sensor network
River monitoring through wireless sensor networkRiver monitoring through wireless sensor network
River monitoring through wireless sensor network
 
Single to multiple kernel learning with four popular svm kernels (survey)
Single to multiple kernel learning with four popular svm kernels (survey)Single to multiple kernel learning with four popular svm kernels (survey)
Single to multiple kernel learning with four popular svm kernels (survey)
 
Performance comparison of blind adaptive multiuser detection algorithms
Performance comparison of blind adaptive multiuser detection algorithmsPerformance comparison of blind adaptive multiuser detection algorithms
Performance comparison of blind adaptive multiuser detection algorithms
 
Recent developments in paper currency recognition system
Recent developments in paper currency recognition systemRecent developments in paper currency recognition system
Recent developments in paper currency recognition system
 
Design and analysing of compact microstrip antenna with defected ground struc...
Design and analysing of compact microstrip antenna with defected ground struc...Design and analysing of compact microstrip antenna with defected ground struc...
Design and analysing of compact microstrip antenna with defected ground struc...
 
Investigation of the appropriate cooking temperature for freshly harvested ma...
Investigation of the appropriate cooking temperature for freshly harvested ma...Investigation of the appropriate cooking temperature for freshly harvested ma...
Investigation of the appropriate cooking temperature for freshly harvested ma...
 
Analysis of stress in circular hollow section by fea and analytical technique
Analysis of stress in circular hollow section by fea and analytical techniqueAnalysis of stress in circular hollow section by fea and analytical technique
Analysis of stress in circular hollow section by fea and analytical technique
 
Using landsat 8 data to explorethe correlation between urban heat island and ...
Using landsat 8 data to explorethe correlation between urban heat island and ...Using landsat 8 data to explorethe correlation between urban heat island and ...
Using landsat 8 data to explorethe correlation between urban heat island and ...
 
Preliminary study of on cladding process on gray cast iron substrate
Preliminary study of on cladding process on gray cast iron substratePreliminary study of on cladding process on gray cast iron substrate
Preliminary study of on cladding process on gray cast iron substrate
 
The development of supervisory system for electricity control in smgg, guntur...
The development of supervisory system for electricity control in smgg, guntur...The development of supervisory system for electricity control in smgg, guntur...
The development of supervisory system for electricity control in smgg, guntur...
 
Brain tumor detection and segmentation using watershed segmentation and morph...
Brain tumor detection and segmentation using watershed segmentation and morph...Brain tumor detection and segmentation using watershed segmentation and morph...
Brain tumor detection and segmentation using watershed segmentation and morph...
 
Partial replacement of cement in concrete using waste glass powder and m sand...
Partial replacement of cement in concrete using waste glass powder and m sand...Partial replacement of cement in concrete using waste glass powder and m sand...
Partial replacement of cement in concrete using waste glass powder and m sand...
 
Arm recognition encryption by using aes algorithm
Arm recognition    encryption by using aes algorithmArm recognition    encryption by using aes algorithm
Arm recognition encryption by using aes algorithm
 
Effects of replacement of metakaolin with cement on the mechanical properties...
Effects of replacement of metakaolin with cement on the mechanical properties...Effects of replacement of metakaolin with cement on the mechanical properties...
Effects of replacement of metakaolin with cement on the mechanical properties...
 
Prediction of pollutants emissions dispersion of phosphate fertilizers produc...
Prediction of pollutants emissions dispersion of phosphate fertilizers produc...Prediction of pollutants emissions dispersion of phosphate fertilizers produc...
Prediction of pollutants emissions dispersion of phosphate fertilizers produc...
 
A three level disposal site selection criteria system for toxic and hazardous...
A three level disposal site selection criteria system for toxic and hazardous...A three level disposal site selection criteria system for toxic and hazardous...
A three level disposal site selection criteria system for toxic and hazardous...
 
Privacy preserving data mining in four group randomized response technique us...
Privacy preserving data mining in four group randomized response technique us...Privacy preserving data mining in four group randomized response technique us...
Privacy preserving data mining in four group randomized response technique us...
 

Similar to Brisk and secure ad hoc vehicular communication

Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Dr. Amarjeet Singh
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd Iaetsd
 
Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks Ashok Mishra
 
LSKA-ID: A lightweight security and key agreement protocol based on an identi...
LSKA-ID: A lightweight security and key agreement protocol based on an identi...LSKA-ID: A lightweight security and key agreement protocol based on an identi...
LSKA-ID: A lightweight security and key agreement protocol based on an identi...
TELKOMNIKA JOURNAL
 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network
IRJET Journal
 
A novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud securityA novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud security
TELKOMNIKA JOURNAL
 
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsBlockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
IJCNCJournal
 
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSBLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
IJCNCJournal
 
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road MapSecurity and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Maanak Gupta, Ph.D.
 
Jb3515641568
Jb3515641568Jb3515641568
Jb3515641568
IJERA Editor
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
IRJET Journal
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
eSAT Journals
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
eSAT Publishing House
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
inventionjournals
 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc NetworksCooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
csandit
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
Trusted computing for infrastructure
Trusted computing for infrastructureTrusted computing for infrastructure
Trusted computing for infrastructure
Ericsson
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Similar to Brisk and secure ad hoc vehicular communication (20)

Sustainability 07-02028
Sustainability 07-02028Sustainability 07-02028
Sustainability 07-02028
 
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
 
Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks
 
LSKA-ID: A lightweight security and key agreement protocol based on an identi...
LSKA-ID: A lightweight security and key agreement protocol based on an identi...LSKA-ID: A lightweight security and key agreement protocol based on an identi...
LSKA-ID: A lightweight security and key agreement protocol based on an identi...
 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network
 
A novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud securityA novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud security
 
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsBlockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
 
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSBLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
 
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road MapSecurity and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
 
Jb3515641568
Jb3515641568Jb3515641568
Jb3515641568
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc NetworksCooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
Trusted computing for infrastructure
Trusted computing for infrastructureTrusted computing for infrastructure
Trusted computing for infrastructure
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
eSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
eSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
eSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
eSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
eSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
eSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
eSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
eSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
 
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniquesEstimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
eSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniquesEstimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 

Recently uploaded (20)

Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 

Brisk and secure ad hoc vehicular communication

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 95 BRISK AND SECURE AD-HOC VEHICULAR COMMUNICATION Miraj Shah1 , Imaad Ukaye2 , Narendra Shekokar3 1, 2 Student, 3 Head of Department, Computer Engg, Dwarkadas J. Sanghvi COE Abstract The idea of Car-to-Car communication is a revolutionary phenomenon in the automobile industry. This idea will surely change the future of humanity for good. This technology will surely change the perception of how a traditional automotive was initially thought of by adding endless applications as a boon to mankind. The application of cars communicating with each other is enormous and has already been discussed by many researchers by now. But, the important thing here is how to put it in practice with the increasing demand for cars and making it safe to use it, at least improve the current condition by this new technology and not worsen the situation by digital hacking and other flaws. Since the nature of the Communication System is highly dynamic a strict security mechanism is mandatory for its seamless functioning. We propose to encrypt the communication taking place in C2C communication which is not the same as using the Internet security mechanism due to limitation of its speed and residing hardware servers. Symmetric Cryptography thus fails to incorporate the scope of various security disciplines and hence it is ineffective to use such techniques. Asymmetric Cryptography on the other hand provides an ideal trade-off among various security disciplines and hence it is considered as an alternative approach to accomplish a secure system but it fails when applied in an ad-hoc environment. However, the traditional Public Key Infrastructure (PKI) technique fails in several ways so we propose a modified form of communication and authentication technique along with rapid communication and group messages to fasten the speed of communication. Keywords: Protocol, Communication, Security, Privacy ---------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION The concept Car-to-Car(C2C) communication is now an evolving trend as a large portion of research funds has been invested all over the globe. Many major car manufacturers have responded positively and are actively working together in bringing this promising technology to fruition. After the concept of autonomous vehicle, cooperative control of multiple vehicles has receives substantial attention in the industry. The key techniques that are being considered include Vehicle-to-Vehicle (V2V), Car-to- Infrastructure (V2I) and Vehicle-to-C.A (V2CA).With advancements in technology in C2C communication various trending problems can be tackled such as automotive safety, user privacy, authentication and validation of vehicles, report to RSU about malevolent cars, etc. Roadside units (RSUs) can be deployed every few miles along the highway for users to communicate about road-safety and obtain other information. Vehicles can use RSUs to report real-time traffic information and request location- based services such as finding restaurants, gas stations, or available parking space. For the sake of cooperation among multiple vehicles effective communication medium is imperative. Although third-generation (3G) networks or satellite techniques can be used to achieve this goal, RSUs have the advantage of low cost, easy deployment, and high bandwidth. Although the primary purpose of system is to enable communication-based automotive safety applications like collision warning, it also provides for a range of business applications, thereby making this technology more cost effective. A Wireless adhoc network perfectly fulfills all the necessary requirements for such a system but at the same time its adhoc nature makes it highly vulnerable to various networking threats. So, securing communication and minimizing communication boundary must be considered for commercial and military applications. To provide a solution we propose a framework for communication among multiple vehicles. Our elucidation is to put forward a new way to visualize multiple vehicles with secure communication and to provide a distributed method to address the problem cooperatively. Security mechanism will protect all traffic sent over the C2C communication network. While securing communication has its own advantages along with privacy and other security goals this high-rate communication would incur high overhead, both in terms of communication and processing. Consider, for example, a vehicle receiving digitally certificate, signing the message, verifying the receiver’s identity, RSU verifying its identity, safety messages from vehicles; it would need to validate a hundreds of vehicles within range within a short delay in the order of a hundred milliseconds [7]. Even if vehicle is effective under such dense network conditions, the additional security overhead could cause failure in meeting the delay and reliability requirements of safety applications. This is especially so because the vehicle environment lacks appropriate algorithm to reduce the load on processing and transfer the load to high speed internal or backbone communication network. The proposed rapid communication and group signing of messages solves these problems and
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 96 meets the security goals with the help of a set of public keys for securing the communication and maintaining anonymity of users or vehicles. First we outline why we actually need to secure car to car open wireless communication by stating various security threats from using open wireless communication or loosely structured security framework. Then in Section II we establish the security model i.e. security goals around which the security of every C2C communication should lie. The review of related work and its analysis along with its drawback is discussed in Section III. Then extending to our own security architecture for our proposed solution is followed by in Section III. Section IV discusses additional mechanism to hasten the authentication process, tracking intruders and closing any gaps in security framework. 2. SECURITY THREATS AND GOALS: Unlike traditional wired/wireless system a C2C communication system is highly dynamic. Along with handling provisions for normal communication and keeping the system secure, it also has to tackle the system dependent problems such as handovers. Handover from one infrastructure to another can be costly as it requires verification of identity at the same time maintaining user- privacy and cost-effective communication. Such a system can also be used for enhancement of road- safety by using various signaling techniques such as collision warning, intersection collision, emergency vehicle, brake-light warning, motorcycle warning, etc. In this communication, security plays a very important role as we discuss the attacks on vehicular communication. 1. Phony information. One or several legitimate members of the network send out false information to misguide other vehicles about traffic conditions. 2. False location. Transmission of a false position message by a malicious vehicle that pretends to be at a claimed position. 3. Tracking identity: A global entity can monitor trajectories of targeted vehicles and use these data for many purposes. 4. False Messages: Such attacks include aggressive transmission of fake messages like accident or traffic jam or emergency vehicle. 5. Masquerade. The attacker claims to be another vehicle by using false identities. We propose modified public key communication and rapid communication technique for enhancing the speed of communication along with additional security specification and architecture. Also, we propose new C2C communication techniques such as group messaging and foreign-vehicle short- term key. We stress that every communication should ensure these security goals. [5] • Confidentiality: Confidentiality is observed to protect sensitive information from getting manipulated and analyzed by eavesdropping as wireless communication medium is open and broadcasted over the air. By using end-to- end encryption, which requires the presence of mutual authentication and key agreement, the confidentiality objective can be achieved • Authentication: Authentication techniques are observed to verify the identity of the vehicular nodes in communication. In particular, the authentication includes two levels: authentication between vehicles (V2V authentication) to provide link-to-link security, and authentication between the vehicle and RSU as well as the service provider (V2Iauthentication). • Privacy: Privacy issues for service provisioning in VANETs regard primarily preserving the anonymity of a vehicle and/or the privacy of its location. Privacy protection tries to prevent adversaries (e.g., another vehicle or an external observer) from linking the vehicle to the driver’s name, license plate, speed, position, and traveling routes along with their relationships to compromise the sender’s privacy • Message Non-Refutation Every message should be binded to the sender so that the sender cannot deny having sent a message. Anonymizer ensures anonymity of sender to other nodes and ensures privacy but does not compromise in security and its association with each sender. • Anonymity: Privacy of vehicles can be protected by introducing a mapping between permanent key and temporary key as one approach, which is an anonymous key pair that can be changed frequently. Another approach is having a set of short-term public keys ,each being used for a random time called the dwell period. An alternative for providing anonymity in vehicular networks is the use of group signatures 3. SECURING COMMUNICATION Although there were few studies regarding the security to different extents, they have all failed in taking the extension ability issue and resultant communication overhead, the time required in authentication of a vehicle versus the required response time into consideration. Authentication of messages must be implemented to allow vehicle users to differentiate reliable information from phony information and to defend against modification attacks and masquerading attacks. An appealing solution to this problem is to digitally sign messages before sending them; not only does this allow the receiver to identify the sender, but the signature also prevents the message contents from being modified in transit. Digital signatures[6] are the basic tool to secure communications, used for all messages. In terms of authentication and integrity-check, digital signature in conventional public key infrastructure (PKI) [1] is a good accepted choice. However, it
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 97 may cause problem when a vehicle is required to verify the signatures of other vehicles by itself and hence trusted authorities are required. Each Certification Authority (C.A) is responsible for a region (national territory, district, county, etc.) and manages identities and credentials of all nodes registered with it. Each node is registered with only one CA, and has a unique long-term identity which may be an Electronic License Plate (ELP) with a long-term key and a certificate. To satisfy both the security and anonymity requirements, we rely on a short-term key authentication approach. Also, further we discuss how tradition PKI is unsuitable for communication and we will use short-term public key pairs instead. Fig. 1 shows security architecture for vehicular communication in which a large set of relevant security concepts [3] exists, including concepts for • Node identification, • Digital signatures and certificates, • Anonymizer for location privacy protection, • Detection of protocol violation, • Plausibility checks, • Tamper-resistant devices, • Access control policies, • Software certification, • In-vehicle network security, • secure positioning, and more. For enhancing the security, the header is divided into variable and invariable fields. Invariable are those fields thatremain unchanged from sender to destination , e.g., destination and source addresses and source position. Variable fields, such as sender location and time-to-live (TTL), are allowed to be altered by intermediate nodes. For packets being sent via multiple wireless hops, two signatures are added: an end-to- end signature is created by the sender node over the invariable fields of the packet header. Additionally, a hop-by-hop signature is added for the variable fields. On reception of a data packet a node verifies both signatures, and replaces the hop-by-hop signature by a new one for the altered variable fields and keeps the end-to-end signature. Eventually, the combination of end-to-end signatures results in a trusted forwarding chain [2]. In order to identify a particular vehicle taking part in communication there is a unique identifier. The Electronic License Plate (ELP) may serve as a unique identifier and acts as identity check mechanism. However, sending the original identifier may be prone to several risks such as masquerading attacks and hence the ELP needs to be mapped to a temporary identifier to be used for communication. There is a trusted authority namely the Certification Authority (C.A.) which keeps track of these unique identifiers and performs the job of mapping into a temporary unique identifier. This original solution however, had many problems like synchronization of different C.A’s and constant communication between V2I (vehicle to Infrastructure) causing further delay and loss of information. Hence the new proposed solution consists of a set (atleast 2) of permanent identifiers stored in each vehicle. Each vehicle consists of atleast 2 unique identifiers or public key. Each car communicates with only one of these stored keys for a certain period of time. This time during which it communicates with a single key is known as dwell time which is a pseudo-random number generated by its own hardware mechanism. It also acts as an added privacy mechanism for hiding user’s identity and making it difficult to track by an intruder. Fig – 1: Security Architecture
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 98 The Fig. 2 shows that every vehicle utilizes multiple short- term public key pairs instead of the old approach of using the same long-term public key for securing communications. The mapping between the long-term keys and the short-term credentials of each node (car) is maintained by the C.A. The main idea is that (i) every vehicle will be equipped with multiple certified public keys (anonymizers) that do not reveal the car’s identity, and (ii) the node uses every one of them for dwell time The multiple-anonymizer technique is adopted to attain location privacy. Particularly, vehicles are assigned with a set of identifiers, and the public keys that are alternatively used. Cars frequently change their key values or temporary identifiers used for authentication over time, and due to the unlinkability of old and new messages their location confidentiality preservation is attained. Moreover, the anonymizers can be linked to a specific vehicle by the CA so that the CA is able to trace and regulate the vehicle’s behavior. Fig- 2 Road map of vehicle using different keys 4. ADDITIONAL FEATURES 4.1 Group Message Furthermore, the signatures and public key certificates radically increase the packet length to cause intense message overhead. Furthermore, these cryptographic operations can incur very high computation and communication overhead. When V2V communication is performed in an urban area with many vehicles in each other’s communication range, this becomes a particularly serious problem. Each node M is equipped with a group vehicle key GVK , with the group members comprising all vehicles registered with the CA. A group key GVK generated by a group member allows for the validation (by any node) of any group signature with the help of CA. Intuitively, a group signature scheme allows any node V to sign a message on behalf of the group, without V ’s identity being revealed to the signature verifier. Moreover, it is impossible to link any two signatures of a legitimate group member. Note that no public key or other credentials need to be attached to an anonymously authenticated message. 4.2 Foreign Vehicle-short-term key Taking an analogy of a tourist place it is easy to spot a local person from the crowd as they look different from others. Taking the inverse in our case a foreign person is easier to be identified and more prone to threats. In C2C communication we use the identifier to relate a particular message to a particular car. However, the mapping between the permanent and temporary credentials also takes place by home C.A and hence this mapping will be completely different from the credentials assigned by a foreign C.A. Say, a car from United States comes to Canada with its permanent and temporary key pairs protecting the car’s identity. However, from a group of say hundred cars these temporary keys that will be used are still easy to distinguish from the keys used locally by the Canadian cars and hence easy to track its location and failing to protect its identity. These keys are like I.P addresses assigned to computers which itself tell its location like country, region, etc. Hence we propose to use new short term but permanent key pairs assigned to them whenever a foreign location is visited i.e. they register themselves with a foreign C.A first which in turn informs the home
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 99 Fig- 3 Communication in Vehicular Network C.A of the change of keys as long as they are in that region. This makes it difficult for an intruder to attack a specific foreign car. 4.3 Rapid Authentication To enable progress to authentication in C2C communication fast access or connectivity to infrastructure is highly needed. The speed with which the vehicle travels may exceed the speed with which the communication takes place between a car and a RSU (Road-Side Unit).The main cause of this delay is authentication mechanism and user privacy.Currently, there are a few strategies to improve this overhead by reducing the handoff latency in which the initial messages are protected and authenticated thereafter, the communication takes place unencrypted making it more prone to replay attacks, hijacking, masquerading and many more attacks. It may take time once for the RSU to authenticate the car then the communication takes place instantly. However, the range of one particular RSU is pretty limited compared to the distance the car covers and hence repeat authentication takes place. This repeated authentication cannot be avoided simply to speed-up the communication however; it can be facilitated with a shared secret key passed from one RSU to another. This shared secret has its own lifetime and the node (car) can be authenticated rapidly with the help of this key. The key is not known to any other car and changes frequently to avoid replay attacks. Here, the added security layer that has been provided is that the shared key may not be broadcasted to all RSU’s in vicinity but only to one that will be next in the range of the car. Hence, a prediction is made based on the messages broadcasted by the car: the direction, speed, brake light and turnsignal. Say there is a message broadcasted as presented below[4]: <Direction, Speed, Acceleration,Turn-Light, Traffic-Light>, where Direction denotes the direction a vehicle turns, such as east or west, and Speed denotes the velocity of a driving vehicle. Acceleration denotes whether a driving vehicle accelerates or decelerates. If the value of this field is positive, the vehicle is speeding up; otherwise, the vehicle is slowing down. The fourth field, Turn-Light, denotes signals of the turn light of a vehicle, particularly when a vehicle is going to turn at an intersection. If the car is travelling on highway with some speed then it’s easy to predict the next RSU and the next after that, saving time on authentication and improving road safety. If the car is travelling in a neighborhood area and suddenly the cars turns, A message will be broadcasted regarding this turnsignal and the RSU may predict the next RSU based on this turnsignal. This prediction may be added cost to RSU however it also reduces the burden of messages that other RSU services. In an ideal condition the authentication takes place the first time with one RSU using the lengthy authentication mechanism and thereafter all communication takes place using rapid authentication speeding up the communication process to almost double the original speed. 4.4 Revocation The revocation is concerned with excluding nodes from the system. The CA will contain a database of revoked node’s identifier and distributes this data to all nodes in the system if necessary, depending on the scale of the revocation decision and the extent to which the malicious activity has been
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 100 performed. A reaction to detected attacks carried out by a node is to exclude this node from the system. Moreover, verification of this malicious activity is also important as, due to flaws in security an intruder can perform such activity and masquerade itself as another node in which case the victim suffers unnecessarily. Also, depending on various factors the threat of that particular vehicle is detected. Factors like the number of nodes reporting the same malicious activity about the node, traffic density, validation of messages, authentication of nodes and position. For example, messages like emergency vehicle are broadcasted so if Trudy broadcasts this false message repeatedly in an urban area with say traffic density of 125 vehicles and only 1 or very few reports comes in then Trudy may not be included in the revocation list instead could be maintained in a temporary warning list for a certain amount of time by the C.A. till which further complaint comes in then appropriate and fast response could be achieved otherwise the node is simply ignored and deleted from temporary warning list . Other reasons not directly related to operation of system, such as a stolen unit or prevention of criminal activity may also require a revocation service. 5. CONCLUSIONS In this paper we propose the security framework for establishing communication and authentication along with privacy in ad hoc Car to Car communication. The different requirements of each user and car were studied and hence it is not appropriate to design a specific security framework for the System. Hence we established rapid authentication mechanism along with group messages to speed up the communication process and make C2C communication in ad hoc environment feasible. The proposed system establishes and maintains communication in the mentioned ad-hoc environment and also it provides a rigorous security infrastructure as a whole. Since these communication systems are to be used in high-end automobiles, cost of implementation and maintenance of Public key infrastructure is financially feasible. Our work will provide a new way to look at the security issues in C2C consortium. REFERENCES [1]. “Securing vehicular ad hoc networks,” Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Network, vol. 15 [2]. “Cross-Layer Privacy Enhancement and Non-Repudiation in Vehicular Communication,” in Proceedings of 4th Workshop on Mobile Ad-Hoc Networks (WMAN), Bern, Switzerland [3]. ”On the Performance of Secure Vehicular Communication System” - IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 8, NO. 6, [4]. Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication- Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, and Claudio E. Palazzi [5]. “The Car-to-Car Communication Consortium,” http://www.car-to-car.org, 2010. [6]. D. Chaum , “Security without Identification: Transaction Systems to Make Big Brother Obsolete,” Comm. ACM, vol. 28, no. 10, [7]. “DSRC: Dedicated Short Range Communications,” http://grouper.ieee.org/groups/scc32/dsrc/index.html, 2009. [8]. J. Blum, A. Eskandarian, and L. Hoffman, “Challenges of intervehicle adhoc networks,” IEEE Trans. Intell. Transp. Syst., vol. 5, no. 4, pp. 347–351, Dec. 2004. [9]. J. Blum and A. Eskandarian, “The threat of intelligent collision,” IEEE IT Prof., vol. 6, no. 1, pp. 24–29, Jan./Feb. 2004. [10]. A. Aijaz, B. Bochow, F. Dötzer, A. Festag, M. Gerlach, R. Kroh, [11]. “Dedicated Short Range Communication at 5.9 GHz StandardsGroup,” http://www.iteris.com/itsarch/html/standard/dsrc5ghz- b.htm,2009. [12]. “ISO TC204 Working Group 16,” http://www.calm.hu/, 2010. [13]. P. Papadimitratos, G. Mezzour, and J.-P. Hubaux, “Certificate Revocation List Distribution in Vehicular Communication Systems,” Proc. Fifth ACM Int’l Conf. Vehicular Ad Hoc Networks(VANET ’08), Sept. 2008. [14]. Y.-W. Lin, Y.-S. Chen, and S.-L. Lee, “Routing protocols in vehicular adhoc networks: A survey and future perspectives,” J. Inf. Sci. Eng., vol. 26, no. 3, pp. 913–932, May 2010. [15]. A. Broggi, P. Cerri, S. Ghidoni, P. Grisleri, and H. G. Jung, “A new approach to urban pedestrian detection for automatic braking,” IEEE Trans. Intell. Transp. Syst., vol. 10, no. 4, pp. 594–605, Dec. 2009. [16]. M.-T. Sun, W.-C. Feng, K. Fujimura, T.-H. Lai, H. Okada, and K. Fujimura, “GPS-based message broadcasting for inter vehicle communication,” in Proc. ICPP, Aug. 2000, pp. 279–286.