SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 95
BRISK AND SECURE AD-HOC VEHICULAR COMMUNICATION
Miraj Shah1
, Imaad Ukaye2
, Narendra Shekokar3
1, 2
Student, 3
Head of Department, Computer Engg, Dwarkadas J. Sanghvi COE
Abstract
The idea of Car-to-Car communication is a revolutionary phenomenon in the automobile industry. This idea will surely change the
future of humanity for good. This technology will surely change the perception of how a traditional automotive was initially thought of
by adding endless applications as a boon to mankind. The application of cars communicating with each other is enormous and has
already been discussed by many researchers by now. But, the important thing here is how to put it in practice with the increasing
demand for cars and making it safe to use it, at least improve the current condition by this new technology and not worsen the
situation by digital hacking and other flaws. Since the nature of the Communication System is highly dynamic a strict security
mechanism is mandatory for its seamless functioning. We propose to encrypt the communication taking place in C2C communication
which is not the same as using the Internet security mechanism due to limitation of its speed and residing hardware servers.
Symmetric Cryptography thus fails to incorporate the scope of various security disciplines and hence it is ineffective to use such
techniques. Asymmetric Cryptography on the other hand provides an ideal trade-off among various security disciplines and hence it is
considered as an alternative approach to accomplish a secure system but it fails when applied in an ad-hoc environment. However,
the traditional Public Key Infrastructure (PKI) technique fails in several ways so we propose a modified form of communication and
authentication technique along with rapid communication and group messages to fasten the speed of communication.
Keywords: Protocol, Communication, Security, Privacy
---------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
The concept Car-to-Car(C2C) communication is now an
evolving trend as a large portion of research funds has been
invested all over the globe. Many major car manufacturers
have responded positively and are actively working together in
bringing this promising technology to fruition. After the
concept of autonomous vehicle, cooperative control of
multiple vehicles has receives substantial attention in the
industry. The key techniques that are being considered include
Vehicle-to-Vehicle (V2V), Car-to- Infrastructure (V2I) and
Vehicle-to-C.A (V2CA).With advancements in technology in
C2C communication various trending problems can be tackled
such as automotive safety, user privacy, authentication and
validation of vehicles, report to RSU about malevolent cars,
etc. Roadside units (RSUs) can be deployed every few miles
along the highway for users to communicate about road-safety
and obtain other information. Vehicles can use RSUs to report
real-time traffic information and request location- based
services such as finding restaurants, gas stations, or available
parking space. For the sake of cooperation among multiple
vehicles effective communication medium is imperative.
Although third-generation (3G) networks or satellite
techniques can be used to achieve this goal, RSUs have the
advantage of low cost, easy deployment, and high bandwidth.
Although the primary purpose of system is to enable
communication-based automotive safety applications like
collision warning, it also provides for a range of business
applications, thereby making this technology more cost
effective. A Wireless adhoc network perfectly fulfills all the
necessary requirements for such a system but at the same time
its adhoc nature makes it highly vulnerable to various
networking threats. So, securing communication and
minimizing communication boundary must be considered for
commercial and military applications. To provide a solution
we propose a framework for communication among multiple
vehicles. Our elucidation is to put forward a new way to
visualize multiple vehicles with secure communication and to
provide a distributed method to address the problem
cooperatively.
Security mechanism will protect all traffic sent over the C2C
communication network. While securing communication has
its own advantages along with privacy and other security goals
this high-rate communication would incur high overhead, both
in terms of communication and processing. Consider, for
example, a vehicle receiving digitally certificate, signing the
message, verifying the receiver’s identity, RSU verifying its
identity, safety messages from vehicles; it would need to
validate a hundreds of vehicles within range within a short
delay in the order of a hundred milliseconds [7]. Even if
vehicle is effective under such dense network conditions, the
additional security overhead could cause failure in meeting the
delay and reliability requirements of safety applications. This
is especially so because the vehicle environment lacks
appropriate algorithm to reduce the load on processing and
transfer the load to high speed internal or backbone
communication network. The proposed rapid communication
and group signing of messages solves these problems and
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 96
meets the security goals with the help of a set of public keys
for securing the communication and maintaining anonymity of
users or vehicles.
First we outline why we actually need to secure car to car
open wireless communication by stating various security
threats from using open wireless communication or loosely
structured security framework. Then in Section II we establish
the security model i.e. security goals around which the
security of every C2C communication should lie. The review
of related work and its analysis along with its drawback is
discussed in Section III. Then extending to our own security
architecture for our proposed solution is followed by in
Section III. Section IV discusses additional mechanism to
hasten the authentication process, tracking intruders and
closing any gaps in security framework.
2. SECURITY THREATS AND GOALS:
Unlike traditional wired/wireless system a C2C
communication system is highly dynamic. Along with
handling provisions for normal communication and keeping
the system secure, it also has to tackle the system dependent
problems such as handovers. Handover from one
infrastructure to another can be costly as it requires
verification of identity at the same time maintaining user-
privacy and cost-effective communication.
Such a system can also be used for enhancement of road-
safety by using various signaling techniques such as collision
warning, intersection collision, emergency vehicle, brake-light
warning, motorcycle warning, etc. In this communication,
security plays a very important role as we discuss the attacks
on vehicular communication.
1. Phony information. One or several legitimate
members of the network send out false information to
misguide other vehicles about traffic conditions.
2. False location. Transmission of a false position
message by a malicious vehicle that pretends to be at
a claimed position.
3. Tracking identity: A global entity can monitor
trajectories of targeted vehicles and use these data for
many purposes.
4. False Messages: Such attacks include aggressive
transmission of fake messages like accident or traffic
jam or emergency vehicle.
5. Masquerade. The attacker claims to be another
vehicle by using false identities.
We propose modified public key communication and rapid
communication technique for enhancing the speed of
communication along with additional security specification
and architecture. Also, we propose new C2C communication
techniques such as group messaging and foreign-vehicle short-
term key. We stress that every communication should ensure
these security goals. [5]
• Confidentiality:
Confidentiality is observed to protect sensitive
information from getting manipulated and analyzed by
eavesdropping as wireless communication medium is
open and broadcasted over the air. By using end-to-
end encryption, which requires the presence of mutual
authentication and key agreement, the confidentiality
objective can be achieved
• Authentication: Authentication techniques are
observed to verify the identity of the vehicular nodes
in communication. In particular, the authentication
includes two levels: authentication between vehicles
(V2V authentication) to provide link-to-link security,
and authentication between the vehicle and RSU as
well as the service provider (V2Iauthentication).
• Privacy: Privacy issues for service provisioning in
VANETs regard primarily preserving the anonymity
of a vehicle and/or the privacy of its location. Privacy
protection tries to prevent adversaries (e.g., another
vehicle or an external observer) from linking the
vehicle to the driver’s name, license plate, speed,
position, and traveling routes along with their
relationships to compromise the sender’s privacy
• Message Non-Refutation Every message should be
binded to the sender so that the sender cannot deny
having sent a message. Anonymizer ensures
anonymity of sender to other nodes and ensures
privacy but does not compromise in security and its
association with each sender.
• Anonymity: Privacy of vehicles can be protected by
introducing a mapping between permanent key and
temporary key as one approach, which is an
anonymous key pair that can be changed frequently.
Another approach is having a set of short-term public
keys ,each being used for a random time called the
dwell period. An alternative for providing anonymity
in vehicular networks is the use of group signatures
3. SECURING COMMUNICATION
Although there were few studies regarding the security to
different extents, they have all failed in taking the extension
ability issue and resultant communication overhead, the time
required in authentication of a vehicle versus the required
response time into consideration. Authentication of messages
must be implemented to allow vehicle users to differentiate
reliable information from phony information and to defend
against modification attacks and masquerading attacks. An
appealing solution to this problem is to digitally sign messages
before sending them; not only does this allow the receiver to
identify the sender, but the signature also prevents the
message contents from being modified in transit. Digital
signatures[6] are the basic tool to secure communications,
used for all messages. In terms of authentication and
integrity-check, digital signature in conventional public key
infrastructure (PKI) [1] is a good accepted choice. However, it
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 97
may cause problem when a vehicle is required to verify the
signatures of other vehicles by itself and hence trusted
authorities are required. Each Certification Authority (C.A) is
responsible for a region (national territory, district, county,
etc.) and manages identities and credentials of all nodes
registered with it. Each node is registered with only one CA,
and has a unique long-term identity which may be an
Electronic License Plate (ELP) with a long-term key and a
certificate. To satisfy both the security and anonymity
requirements, we rely on a short-term key authentication
approach. Also, further we discuss how tradition PKI is
unsuitable for communication and we will use short-term
public key pairs instead.
Fig. 1 shows security architecture for vehicular
communication in which a large set of relevant security
concepts [3] exists, including concepts for
• Node identification,
• Digital signatures and certificates,
• Anonymizer for location privacy protection,
• Detection of protocol violation,
• Plausibility checks,
• Tamper-resistant devices,
• Access control policies,
• Software certification,
• In-vehicle network security,
• secure positioning, and more.
For enhancing the security, the header is divided into variable
and invariable fields. Invariable are those fields thatremain
unchanged from sender to destination , e.g., destination and
source addresses and source position. Variable fields, such as
sender location and time-to-live (TTL), are allowed to be
altered by intermediate nodes. For packets being sent via
multiple wireless hops, two signatures are added: an end-to-
end signature is created by the sender node over the invariable
fields of the packet header. Additionally, a hop-by-hop
signature is added for the variable fields. On reception of a
data packet a node verifies both signatures, and replaces the
hop-by-hop signature by a new one for the altered variable
fields and keeps the end-to-end signature. Eventually, the
combination of end-to-end signatures results in a trusted
forwarding chain [2].
In order to identify a particular vehicle taking part in
communication there is a unique identifier. The Electronic
License Plate (ELP) may serve as a unique identifier and acts
as identity check mechanism. However, sending the original
identifier may be prone to several risks such as masquerading
attacks and hence the ELP needs to be mapped to a temporary
identifier to be used for communication. There is a trusted
authority namely the Certification Authority (C.A.) which
keeps track of these unique identifiers and performs the job of
mapping into a temporary unique identifier. This original
solution however, had many problems like synchronization of
different C.A’s and constant communication between V2I
(vehicle to Infrastructure) causing further delay and loss of
information. Hence the new proposed solution consists of a set
(atleast 2) of permanent identifiers stored in each vehicle.
Each vehicle consists of atleast 2 unique identifiers or public
key. Each car communicates with only one of these stored
keys for a certain period of time. This time during which it
communicates with a single key is known as dwell time which
is a pseudo-random number generated by its own hardware
mechanism. It also acts as an added privacy mechanism for
hiding user’s identity and making it difficult to track by an
intruder.
Fig – 1: Security Architecture
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 98
The Fig. 2 shows that every vehicle utilizes multiple short-
term public key pairs instead of the old approach of using the
same long-term public key for securing communications. The
mapping between the long-term keys and the short-term
credentials of each node (car) is maintained by the C.A. The
main idea is that (i) every vehicle will be equipped with
multiple certified public keys (anonymizers) that do not reveal
the car’s identity, and (ii) the node uses every one of them for
dwell time
The multiple-anonymizer technique is adopted to attain
location privacy. Particularly, vehicles are assigned with a set
of identifiers, and the public keys that are alternatively used.
Cars frequently change their key values or temporary
identifiers used for authentication over time, and due to the
unlinkability of old and new messages their location
confidentiality preservation is attained.
Moreover, the anonymizers can be linked to a specific vehicle
by the CA so that the CA is able to trace and regulate the
vehicle’s behavior.
Fig- 2 Road map of vehicle using different keys
4. ADDITIONAL FEATURES
4.1 Group Message
Furthermore, the signatures and public key certificates
radically increase the packet length to cause intense message
overhead. Furthermore, these cryptographic operations can
incur very high computation and communication overhead.
When V2V communication is performed in an urban area with
many vehicles in each other’s communication range, this
becomes a particularly serious problem.
Each node M is equipped with a group vehicle key GVK ,
with the group members comprising all vehicles registered
with the CA. A group key GVK generated by a group member
allows for the validation (by any node) of any group signature
with the help of CA. Intuitively, a group signature scheme
allows any node V to sign a message on behalf of the group,
without V ’s identity being revealed to the signature verifier.
Moreover, it is impossible to link any two signatures of a
legitimate group member. Note that no public key or other
credentials need to be attached to an anonymously
authenticated message.
4.2 Foreign Vehicle-short-term key
Taking an analogy of a tourist place it is easy to spot a local
person from the crowd as they look different from others.
Taking the inverse in our case a foreign person is easier to be
identified and more prone to threats. In C2C communication
we use the identifier to relate a particular message to a
particular car. However, the mapping between the permanent
and temporary credentials also takes place by home C.A and
hence this mapping will be completely different from the
credentials assigned by a foreign C.A. Say, a car from United
States comes to Canada with its permanent and temporary key
pairs protecting the car’s identity. However, from a group of
say hundred cars these temporary keys that will be used are
still easy to distinguish from the keys used locally by the
Canadian cars and hence easy to track its location and failing
to protect its identity. These keys are like I.P addresses
assigned to computers which itself tell its location like
country, region, etc. Hence we propose to use new short term
but permanent key pairs assigned to them whenever a foreign
location is visited i.e. they register themselves with a foreign
C.A first which in turn informs the home
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 99
Fig- 3 Communication in Vehicular Network
C.A of the change of keys as long as they are in that region.
This makes it difficult for an intruder to attack a specific
foreign car.
4.3 Rapid Authentication
To enable progress to authentication in C2C communication
fast access or connectivity to infrastructure is highly needed.
The speed with which the vehicle travels may exceed the
speed with which the communication takes place between a
car and a RSU (Road-Side Unit).The main cause of this delay
is authentication mechanism and user privacy.Currently, there
are a few strategies to improve this overhead by reducing the
handoff latency in which the initial messages are protected and
authenticated thereafter, the communication takes place
unencrypted making it more prone to replay attacks, hijacking,
masquerading and many more attacks.
It may take time once for the RSU to authenticate the car then
the communication takes place instantly. However, the range
of one particular RSU is pretty limited compared to the
distance the car covers and hence repeat authentication takes
place. This repeated authentication cannot be avoided simply
to speed-up the communication however; it can be facilitated
with a shared secret key passed from one RSU to another. This
shared secret has its own lifetime and the node (car) can be
authenticated rapidly with the help of this key. The key is not
known to any other car and changes frequently to avoid replay
attacks. Here, the added security layer that has been provided
is that the shared key may not be broadcasted to all RSU’s in
vicinity but only to one that will be next in the range of the
car. Hence, a prediction is made based on the messages
broadcasted by the car: the direction, speed, brake light and
turnsignal. Say there is a message broadcasted as presented
below[4]: <Direction, Speed, Acceleration,Turn-Light,
Traffic-Light>, where Direction denotes the direction a vehicle
turns, such as east or west, and Speed denotes the velocity of a
driving vehicle. Acceleration denotes whether a driving
vehicle accelerates or decelerates. If the value of this field is
positive, the vehicle is speeding up; otherwise, the vehicle is
slowing down. The fourth field, Turn-Light, denotes signals of
the turn light of a vehicle, particularly when a vehicle is going
to turn at an intersection.
If the car is travelling on highway with some speed then it’s
easy to predict the next RSU and the next after that, saving
time on authentication and improving road safety. If the car is
travelling in a neighborhood area and suddenly the cars turns,
A message will be broadcasted regarding this turnsignal and
the RSU may predict the next RSU based on this turnsignal.
This prediction may be added cost to RSU however it also
reduces the burden of messages that other RSU services. In an
ideal condition the authentication takes place the first time
with one RSU using the lengthy authentication mechanism and
thereafter all communication takes place using rapid
authentication speeding up the communication process to
almost double the original speed.
4.4 Revocation
The revocation is concerned with excluding nodes from the
system. The CA will contain a database of revoked node’s
identifier and distributes this data to all nodes in the system if
necessary, depending on the scale of the revocation decision
and the extent to which the malicious activity has been
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 100
performed. A reaction to detected attacks carried out by a node
is to exclude this node from the system. Moreover, verification
of this malicious activity is also important as, due to flaws in
security an intruder can perform such activity and masquerade
itself as another node in which case the victim suffers
unnecessarily. Also, depending on various factors the threat of
that particular vehicle is detected. Factors like the number of
nodes reporting the same malicious activity about the node,
traffic density, validation of messages, authentication of nodes
and position. For example, messages like emergency vehicle
are broadcasted so if Trudy broadcasts this false message
repeatedly in an urban area with say traffic density of 125
vehicles and only 1 or very few reports comes in then Trudy
may not be included in the revocation list instead could be
maintained in a temporary warning list for a certain amount of
time by the C.A. till which further complaint comes in then
appropriate and fast response could be achieved otherwise the
node is simply ignored and deleted from temporary warning
list . Other reasons not directly related to operation of system,
such as a stolen unit or prevention of criminal activity may
also require a revocation service.
5. CONCLUSIONS
In this paper we propose the security framework for
establishing communication and authentication along with
privacy in ad hoc Car to Car communication. The different
requirements of each user and car were studied and hence it is
not appropriate to design a specific security framework for the
System. Hence we established rapid authentication mechanism
along with group messages to speed up the communication
process and make C2C communication in ad hoc environment
feasible. The proposed system establishes and maintains
communication in the mentioned ad-hoc environment and also
it provides a rigorous security infrastructure as a whole. Since
these communication systems are to be used in high-end
automobiles, cost of implementation and maintenance of
Public key infrastructure is financially feasible. Our work will
provide a new way to look at the security issues in C2C
consortium.
REFERENCES
[1]. “Securing vehicular ad hoc networks,” Journal of
Computer Security - Special Issue on Security of Ad-hoc and
Sensor Network, vol. 15
[2]. “Cross-Layer Privacy Enhancement and Non-Repudiation
in Vehicular Communication,” in Proceedings of 4th
Workshop on Mobile Ad-Hoc Networks (WMAN), Bern,
Switzerland
[3]. ”On the Performance of Secure Vehicular Communication
System” - IEEE TRANSACTIONS ON DEPENDABLE AND
SECURE COMPUTING, VOL. 8, NO. 6,
[4]. Fast and Secure Multihop Broadcast Solutions for
Intervehicular Communication- Wafa Ben Jaballah, Mauro
Conti, Mohamed Mosbah, and Claudio E. Palazzi
[5]. “The Car-to-Car Communication Consortium,”
http://www.car-to-car.org, 2010.
[6]. D. Chaum , “Security without Identification: Transaction
Systems to Make Big Brother Obsolete,” Comm. ACM, vol.
28, no. 10,
[7]. “DSRC: Dedicated Short Range Communications,”
http://grouper.ieee.org/groups/scc32/dsrc/index.html, 2009.
[8]. J. Blum, A. Eskandarian, and L. Hoffman, “Challenges of
intervehicle adhoc networks,” IEEE Trans. Intell. Transp.
Syst., vol. 5, no. 4, pp. 347–351, Dec. 2004.
[9]. J. Blum and A. Eskandarian, “The threat of intelligent
collision,” IEEE IT Prof., vol. 6, no. 1, pp. 24–29, Jan./Feb.
2004.
[10]. A. Aijaz, B. Bochow, F. Dötzer, A. Festag, M. Gerlach,
R. Kroh,
[11]. “Dedicated Short Range Communication at 5.9 GHz
StandardsGroup,”
http://www.iteris.com/itsarch/html/standard/dsrc5ghz-
b.htm,2009.
[12]. “ISO TC204 Working Group 16,” http://www.calm.hu/,
2010.
[13]. P. Papadimitratos, G. Mezzour, and J.-P. Hubaux,
“Certificate Revocation List Distribution in Vehicular
Communication Systems,” Proc. Fifth ACM Int’l Conf.
Vehicular Ad Hoc Networks(VANET ’08), Sept. 2008.
[14]. Y.-W. Lin, Y.-S. Chen, and S.-L. Lee, “Routing
protocols in vehicular adhoc networks: A survey and future
perspectives,” J. Inf. Sci. Eng., vol. 26, no. 3, pp. 913–932,
May 2010.
[15]. A. Broggi, P. Cerri, S. Ghidoni, P. Grisleri, and H. G.
Jung, “A new approach to urban pedestrian detection for
automatic braking,” IEEE Trans. Intell. Transp. Syst., vol. 10,
no. 4, pp. 594–605, Dec. 2009.
[16]. M.-T. Sun, W.-C. Feng, K. Fujimura, T.-H. Lai, H.
Okada, and K. Fujimura, “GPS-based message broadcasting
for inter vehicle communication,” in Proc. ICPP, Aug. 2000,
pp. 279–286.

More Related Content

What's hot

Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Editor IJARCET
 
Dn3211571160
Dn3211571160Dn3211571160
Dn3211571160IJMER
 
Cyber DoS attack-based security simulator for VANET
Cyber DoS attack-based security simulator for VANET Cyber DoS attack-based security simulator for VANET
Cyber DoS attack-based security simulator for VANET
IJECEIAES
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
TELKOMNIKA JOURNAL
 
MPROVING THE PRIVACY-PRESERVING OF COVID-19 BLUETOOTH-BASED CONTACT TRACI...
MPROVING THE PRIVACY-PRESERVING   OF COVID-19 BLUETOOTH-BASED   CONTACT TRACI...MPROVING THE PRIVACY-PRESERVING   OF COVID-19 BLUETOOTH-BASED   CONTACT TRACI...
MPROVING THE PRIVACY-PRESERVING OF COVID-19 BLUETOOTH-BASED CONTACT TRACI...
AIRCC Publishing Corporation
 
Examining Modern Data Security and Privacy Protocols in Autonomous Vehicles
Examining Modern Data Security and Privacy Protocols in Autonomous VehiclesExamining Modern Data Security and Privacy Protocols in Autonomous Vehicles
Examining Modern Data Security and Privacy Protocols in Autonomous Vehicles
AIRCC Publishing Corporation
 
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
CSCJournals
 
Instant messaging tech scet
Instant messaging tech scetInstant messaging tech scet
Instant messaging tech scet
pankaj gamit
 
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Dr. Amarjeet Singh
 
Security in Vehicular Ad Hoc Networks through Mix-Zones Based Privacy
Security in Vehicular Ad Hoc Networks through Mix-Zones Based PrivacySecurity in Vehicular Ad Hoc Networks through Mix-Zones Based Privacy
Security in Vehicular Ad Hoc Networks through Mix-Zones Based Privacy
International Journal of Science and Research (IJSR)
 
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
IOSR Journals
 
Trustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social NetworkTrustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social Network
ijsrd.com
 
Secure instant messanger service
Secure instant messanger serviceSecure instant messanger service
Secure instant messanger service
Aditya Gupta
 
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
S3 Infotech IEEE Projects
 
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET Journal
 
A Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS BankingA Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS Banking
IRJET Journal
 
Authentication Systems in Internet of Things
Authentication Systems in Internet of ThingsAuthentication Systems in Internet of Things
Authentication Systems in Internet of Things
Eswar Publications
 
Study on analysis of commercial mobile keypad schemes and modeling of shoulde...
Study on analysis of commercial mobile keypad schemes and modeling of shoulde...Study on analysis of commercial mobile keypad schemes and modeling of shoulde...
Study on analysis of commercial mobile keypad schemes and modeling of shoulde...
csandit
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
IRJET Journal
 

What's hot (19)

Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404
 
Dn3211571160
Dn3211571160Dn3211571160
Dn3211571160
 
Cyber DoS attack-based security simulator for VANET
Cyber DoS attack-based security simulator for VANET Cyber DoS attack-based security simulator for VANET
Cyber DoS attack-based security simulator for VANET
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
 
MPROVING THE PRIVACY-PRESERVING OF COVID-19 BLUETOOTH-BASED CONTACT TRACI...
MPROVING THE PRIVACY-PRESERVING   OF COVID-19 BLUETOOTH-BASED   CONTACT TRACI...MPROVING THE PRIVACY-PRESERVING   OF COVID-19 BLUETOOTH-BASED   CONTACT TRACI...
MPROVING THE PRIVACY-PRESERVING OF COVID-19 BLUETOOTH-BASED CONTACT TRACI...
 
Examining Modern Data Security and Privacy Protocols in Autonomous Vehicles
Examining Modern Data Security and Privacy Protocols in Autonomous VehiclesExamining Modern Data Security and Privacy Protocols in Autonomous Vehicles
Examining Modern Data Security and Privacy Protocols in Autonomous Vehicles
 
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
 
Instant messaging tech scet
Instant messaging tech scetInstant messaging tech scet
Instant messaging tech scet
 
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
 
Security in Vehicular Ad Hoc Networks through Mix-Zones Based Privacy
Security in Vehicular Ad Hoc Networks through Mix-Zones Based PrivacySecurity in Vehicular Ad Hoc Networks through Mix-Zones Based Privacy
Security in Vehicular Ad Hoc Networks through Mix-Zones Based Privacy
 
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
 
Trustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social NetworkTrustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social Network
 
Secure instant messanger service
Secure instant messanger serviceSecure instant messanger service
Secure instant messanger service
 
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
 
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
 
A Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS BankingA Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS Banking
 
Authentication Systems in Internet of Things
Authentication Systems in Internet of ThingsAuthentication Systems in Internet of Things
Authentication Systems in Internet of Things
 
Study on analysis of commercial mobile keypad schemes and modeling of shoulde...
Study on analysis of commercial mobile keypad schemes and modeling of shoulde...Study on analysis of commercial mobile keypad schemes and modeling of shoulde...
Study on analysis of commercial mobile keypad schemes and modeling of shoulde...
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 

Viewers also liked

Performance status of common effluent treatment
Performance status of common effluent treatmentPerformance status of common effluent treatment
Performance status of common effluent treatment
eSAT Publishing House
 
A survey on mobility models for vehicular ad hoc networks
A survey on mobility models for vehicular ad hoc networksA survey on mobility models for vehicular ad hoc networks
A survey on mobility models for vehicular ad hoc networks
eSAT Publishing House
 
A comparative evaluation on the properties of hma with variations in aggregat...
A comparative evaluation on the properties of hma with variations in aggregat...A comparative evaluation on the properties of hma with variations in aggregat...
A comparative evaluation on the properties of hma with variations in aggregat...
eSAT Publishing House
 
Zigbee based smart fall detection and notification
Zigbee based smart fall detection and notificationZigbee based smart fall detection and notification
Zigbee based smart fall detection and notification
eSAT Publishing House
 
A new cascaded multilevel inverter with less no of switches
A new cascaded multilevel inverter with less no of switchesA new cascaded multilevel inverter with less no of switches
A new cascaded multilevel inverter with less no of switches
eSAT Publishing House
 
Optimization of condenser using microchannel
Optimization of condenser using microchannelOptimization of condenser using microchannel
Optimization of condenser using microchannel
eSAT Publishing House
 
Treatment of wastewater and electricity generation
Treatment of wastewater and electricity generationTreatment of wastewater and electricity generation
Treatment of wastewater and electricity generation
eSAT Publishing House
 
Ber analysis of wi max in multipath fading channels
Ber analysis of wi max in multipath fading channelsBer analysis of wi max in multipath fading channels
Ber analysis of wi max in multipath fading channels
eSAT Publishing House
 
Design evaluation and optimization of steering yoke of an automobile
Design evaluation and optimization of steering yoke of an automobileDesign evaluation and optimization of steering yoke of an automobile
Design evaluation and optimization of steering yoke of an automobile
eSAT Publishing House
 
Performance of uncorrupted pixel count decision based
Performance of uncorrupted pixel count decision basedPerformance of uncorrupted pixel count decision based
Performance of uncorrupted pixel count decision based
eSAT Publishing House
 
Web application based file transfer in customized cloud
Web application based file transfer in customized cloudWeb application based file transfer in customized cloud
Web application based file transfer in customized cloud
eSAT Publishing House
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
eSAT Publishing House
 
Application of artificial neural network for blast performance evaluation
Application of artificial neural network for blast performance evaluationApplication of artificial neural network for blast performance evaluation
Application of artificial neural network for blast performance evaluation
eSAT Publishing House
 
Smart digital and analogue ambience control and
Smart digital and analogue ambience control andSmart digital and analogue ambience control and
Smart digital and analogue ambience control and
eSAT Publishing House
 
Rfid, an enabler in supply chain management
Rfid, an enabler in supply chain managementRfid, an enabler in supply chain management
Rfid, an enabler in supply chain management
eSAT Publishing House
 
A fuzzy logic controlled dc dc converter for an
A fuzzy logic controlled dc dc converter for anA fuzzy logic controlled dc dc converter for an
A fuzzy logic controlled dc dc converter for an
eSAT Publishing House
 
An innovative way for computerized smith chart generation and transmission li...
An innovative way for computerized smith chart generation and transmission li...An innovative way for computerized smith chart generation and transmission li...
An innovative way for computerized smith chart generation and transmission li...
eSAT Publishing House
 
Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...
Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...
Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...
eSAT Publishing House
 
Static stiffness analysis of high frequency milling spindle
Static stiffness analysis of high frequency milling spindleStatic stiffness analysis of high frequency milling spindle
Static stiffness analysis of high frequency milling spindle
eSAT Publishing House
 
Solar system as a radio telescope by the formation of virtual lenses above an...
Solar system as a radio telescope by the formation of virtual lenses above an...Solar system as a radio telescope by the formation of virtual lenses above an...
Solar system as a radio telescope by the formation of virtual lenses above an...
eSAT Publishing House
 

Viewers also liked (20)

Performance status of common effluent treatment
Performance status of common effluent treatmentPerformance status of common effluent treatment
Performance status of common effluent treatment
 
A survey on mobility models for vehicular ad hoc networks
A survey on mobility models for vehicular ad hoc networksA survey on mobility models for vehicular ad hoc networks
A survey on mobility models for vehicular ad hoc networks
 
A comparative evaluation on the properties of hma with variations in aggregat...
A comparative evaluation on the properties of hma with variations in aggregat...A comparative evaluation on the properties of hma with variations in aggregat...
A comparative evaluation on the properties of hma with variations in aggregat...
 
Zigbee based smart fall detection and notification
Zigbee based smart fall detection and notificationZigbee based smart fall detection and notification
Zigbee based smart fall detection and notification
 
A new cascaded multilevel inverter with less no of switches
A new cascaded multilevel inverter with less no of switchesA new cascaded multilevel inverter with less no of switches
A new cascaded multilevel inverter with less no of switches
 
Optimization of condenser using microchannel
Optimization of condenser using microchannelOptimization of condenser using microchannel
Optimization of condenser using microchannel
 
Treatment of wastewater and electricity generation
Treatment of wastewater and electricity generationTreatment of wastewater and electricity generation
Treatment of wastewater and electricity generation
 
Ber analysis of wi max in multipath fading channels
Ber analysis of wi max in multipath fading channelsBer analysis of wi max in multipath fading channels
Ber analysis of wi max in multipath fading channels
 
Design evaluation and optimization of steering yoke of an automobile
Design evaluation and optimization of steering yoke of an automobileDesign evaluation and optimization of steering yoke of an automobile
Design evaluation and optimization of steering yoke of an automobile
 
Performance of uncorrupted pixel count decision based
Performance of uncorrupted pixel count decision basedPerformance of uncorrupted pixel count decision based
Performance of uncorrupted pixel count decision based
 
Web application based file transfer in customized cloud
Web application based file transfer in customized cloudWeb application based file transfer in customized cloud
Web application based file transfer in customized cloud
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
Application of artificial neural network for blast performance evaluation
Application of artificial neural network for blast performance evaluationApplication of artificial neural network for blast performance evaluation
Application of artificial neural network for blast performance evaluation
 
Smart digital and analogue ambience control and
Smart digital and analogue ambience control andSmart digital and analogue ambience control and
Smart digital and analogue ambience control and
 
Rfid, an enabler in supply chain management
Rfid, an enabler in supply chain managementRfid, an enabler in supply chain management
Rfid, an enabler in supply chain management
 
A fuzzy logic controlled dc dc converter for an
A fuzzy logic controlled dc dc converter for anA fuzzy logic controlled dc dc converter for an
A fuzzy logic controlled dc dc converter for an
 
An innovative way for computerized smith chart generation and transmission li...
An innovative way for computerized smith chart generation and transmission li...An innovative way for computerized smith chart generation and transmission li...
An innovative way for computerized smith chart generation and transmission li...
 
Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...
Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...
Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...
 
Static stiffness analysis of high frequency milling spindle
Static stiffness analysis of high frequency milling spindleStatic stiffness analysis of high frequency milling spindle
Static stiffness analysis of high frequency milling spindle
 
Solar system as a radio telescope by the formation of virtual lenses above an...
Solar system as a radio telescope by the formation of virtual lenses above an...Solar system as a radio telescope by the formation of virtual lenses above an...
Solar system as a radio telescope by the formation of virtual lenses above an...
 

Similar to Brisk and secure ad hoc vehicular communication

Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks Ashok Mishra
 
LSKA-ID: A lightweight security and key agreement protocol based on an identi...
LSKA-ID: A lightweight security and key agreement protocol based on an identi...LSKA-ID: A lightweight security and key agreement protocol based on an identi...
LSKA-ID: A lightweight security and key agreement protocol based on an identi...
TELKOMNIKA JOURNAL
 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network
IRJET Journal
 
A novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud securityA novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud security
TELKOMNIKA JOURNAL
 
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsBlockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
IJCNCJournal
 
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSBLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
IJCNCJournal
 
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road MapSecurity and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Maanak Gupta, Ph.D.
 
Jb3515641568
Jb3515641568Jb3515641568
Jb3515641568
IJERA Editor
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
IRJET Journal
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
eSAT Journals
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
eSAT Publishing House
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
inventionjournals
 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc NetworksCooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
csandit
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
Trusted computing for infrastructure
Trusted computing for infrastructureTrusted computing for infrastructure
Trusted computing for infrastructure
Ericsson
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
CVIN ppt.pptx
CVIN ppt.pptxCVIN ppt.pptx
CVIN ppt.pptx
Abhi71358
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET Journal
 
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In VanetAn Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
ijcisjournal
 

Similar to Brisk and secure ad hoc vehicular communication (20)

Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks
 
LSKA-ID: A lightweight security and key agreement protocol based on an identi...
LSKA-ID: A lightweight security and key agreement protocol based on an identi...LSKA-ID: A lightweight security and key agreement protocol based on an identi...
LSKA-ID: A lightweight security and key agreement protocol based on an identi...
 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network
 
A novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud securityA novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud security
 
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsBlockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
 
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSBLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
 
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road MapSecurity and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
 
Jb3515641568
Jb3515641568Jb3515641568
Jb3515641568
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc NetworksCooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
Trusted computing for infrastructure
Trusted computing for infrastructureTrusted computing for infrastructure
Trusted computing for infrastructure
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
CVIN ppt.pptx
CVIN ppt.pptxCVIN ppt.pptx
CVIN ppt.pptx
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
 
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In VanetAn Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 

Recently uploaded (20)

Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 

Brisk and secure ad hoc vehicular communication

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 95 BRISK AND SECURE AD-HOC VEHICULAR COMMUNICATION Miraj Shah1 , Imaad Ukaye2 , Narendra Shekokar3 1, 2 Student, 3 Head of Department, Computer Engg, Dwarkadas J. Sanghvi COE Abstract The idea of Car-to-Car communication is a revolutionary phenomenon in the automobile industry. This idea will surely change the future of humanity for good. This technology will surely change the perception of how a traditional automotive was initially thought of by adding endless applications as a boon to mankind. The application of cars communicating with each other is enormous and has already been discussed by many researchers by now. But, the important thing here is how to put it in practice with the increasing demand for cars and making it safe to use it, at least improve the current condition by this new technology and not worsen the situation by digital hacking and other flaws. Since the nature of the Communication System is highly dynamic a strict security mechanism is mandatory for its seamless functioning. We propose to encrypt the communication taking place in C2C communication which is not the same as using the Internet security mechanism due to limitation of its speed and residing hardware servers. Symmetric Cryptography thus fails to incorporate the scope of various security disciplines and hence it is ineffective to use such techniques. Asymmetric Cryptography on the other hand provides an ideal trade-off among various security disciplines and hence it is considered as an alternative approach to accomplish a secure system but it fails when applied in an ad-hoc environment. However, the traditional Public Key Infrastructure (PKI) technique fails in several ways so we propose a modified form of communication and authentication technique along with rapid communication and group messages to fasten the speed of communication. Keywords: Protocol, Communication, Security, Privacy ---------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION The concept Car-to-Car(C2C) communication is now an evolving trend as a large portion of research funds has been invested all over the globe. Many major car manufacturers have responded positively and are actively working together in bringing this promising technology to fruition. After the concept of autonomous vehicle, cooperative control of multiple vehicles has receives substantial attention in the industry. The key techniques that are being considered include Vehicle-to-Vehicle (V2V), Car-to- Infrastructure (V2I) and Vehicle-to-C.A (V2CA).With advancements in technology in C2C communication various trending problems can be tackled such as automotive safety, user privacy, authentication and validation of vehicles, report to RSU about malevolent cars, etc. Roadside units (RSUs) can be deployed every few miles along the highway for users to communicate about road-safety and obtain other information. Vehicles can use RSUs to report real-time traffic information and request location- based services such as finding restaurants, gas stations, or available parking space. For the sake of cooperation among multiple vehicles effective communication medium is imperative. Although third-generation (3G) networks or satellite techniques can be used to achieve this goal, RSUs have the advantage of low cost, easy deployment, and high bandwidth. Although the primary purpose of system is to enable communication-based automotive safety applications like collision warning, it also provides for a range of business applications, thereby making this technology more cost effective. A Wireless adhoc network perfectly fulfills all the necessary requirements for such a system but at the same time its adhoc nature makes it highly vulnerable to various networking threats. So, securing communication and minimizing communication boundary must be considered for commercial and military applications. To provide a solution we propose a framework for communication among multiple vehicles. Our elucidation is to put forward a new way to visualize multiple vehicles with secure communication and to provide a distributed method to address the problem cooperatively. Security mechanism will protect all traffic sent over the C2C communication network. While securing communication has its own advantages along with privacy and other security goals this high-rate communication would incur high overhead, both in terms of communication and processing. Consider, for example, a vehicle receiving digitally certificate, signing the message, verifying the receiver’s identity, RSU verifying its identity, safety messages from vehicles; it would need to validate a hundreds of vehicles within range within a short delay in the order of a hundred milliseconds [7]. Even if vehicle is effective under such dense network conditions, the additional security overhead could cause failure in meeting the delay and reliability requirements of safety applications. This is especially so because the vehicle environment lacks appropriate algorithm to reduce the load on processing and transfer the load to high speed internal or backbone communication network. The proposed rapid communication and group signing of messages solves these problems and
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 96 meets the security goals with the help of a set of public keys for securing the communication and maintaining anonymity of users or vehicles. First we outline why we actually need to secure car to car open wireless communication by stating various security threats from using open wireless communication or loosely structured security framework. Then in Section II we establish the security model i.e. security goals around which the security of every C2C communication should lie. The review of related work and its analysis along with its drawback is discussed in Section III. Then extending to our own security architecture for our proposed solution is followed by in Section III. Section IV discusses additional mechanism to hasten the authentication process, tracking intruders and closing any gaps in security framework. 2. SECURITY THREATS AND GOALS: Unlike traditional wired/wireless system a C2C communication system is highly dynamic. Along with handling provisions for normal communication and keeping the system secure, it also has to tackle the system dependent problems such as handovers. Handover from one infrastructure to another can be costly as it requires verification of identity at the same time maintaining user- privacy and cost-effective communication. Such a system can also be used for enhancement of road- safety by using various signaling techniques such as collision warning, intersection collision, emergency vehicle, brake-light warning, motorcycle warning, etc. In this communication, security plays a very important role as we discuss the attacks on vehicular communication. 1. Phony information. One or several legitimate members of the network send out false information to misguide other vehicles about traffic conditions. 2. False location. Transmission of a false position message by a malicious vehicle that pretends to be at a claimed position. 3. Tracking identity: A global entity can monitor trajectories of targeted vehicles and use these data for many purposes. 4. False Messages: Such attacks include aggressive transmission of fake messages like accident or traffic jam or emergency vehicle. 5. Masquerade. The attacker claims to be another vehicle by using false identities. We propose modified public key communication and rapid communication technique for enhancing the speed of communication along with additional security specification and architecture. Also, we propose new C2C communication techniques such as group messaging and foreign-vehicle short- term key. We stress that every communication should ensure these security goals. [5] • Confidentiality: Confidentiality is observed to protect sensitive information from getting manipulated and analyzed by eavesdropping as wireless communication medium is open and broadcasted over the air. By using end-to- end encryption, which requires the presence of mutual authentication and key agreement, the confidentiality objective can be achieved • Authentication: Authentication techniques are observed to verify the identity of the vehicular nodes in communication. In particular, the authentication includes two levels: authentication between vehicles (V2V authentication) to provide link-to-link security, and authentication between the vehicle and RSU as well as the service provider (V2Iauthentication). • Privacy: Privacy issues for service provisioning in VANETs regard primarily preserving the anonymity of a vehicle and/or the privacy of its location. Privacy protection tries to prevent adversaries (e.g., another vehicle or an external observer) from linking the vehicle to the driver’s name, license plate, speed, position, and traveling routes along with their relationships to compromise the sender’s privacy • Message Non-Refutation Every message should be binded to the sender so that the sender cannot deny having sent a message. Anonymizer ensures anonymity of sender to other nodes and ensures privacy but does not compromise in security and its association with each sender. • Anonymity: Privacy of vehicles can be protected by introducing a mapping between permanent key and temporary key as one approach, which is an anonymous key pair that can be changed frequently. Another approach is having a set of short-term public keys ,each being used for a random time called the dwell period. An alternative for providing anonymity in vehicular networks is the use of group signatures 3. SECURING COMMUNICATION Although there were few studies regarding the security to different extents, they have all failed in taking the extension ability issue and resultant communication overhead, the time required in authentication of a vehicle versus the required response time into consideration. Authentication of messages must be implemented to allow vehicle users to differentiate reliable information from phony information and to defend against modification attacks and masquerading attacks. An appealing solution to this problem is to digitally sign messages before sending them; not only does this allow the receiver to identify the sender, but the signature also prevents the message contents from being modified in transit. Digital signatures[6] are the basic tool to secure communications, used for all messages. In terms of authentication and integrity-check, digital signature in conventional public key infrastructure (PKI) [1] is a good accepted choice. However, it
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 97 may cause problem when a vehicle is required to verify the signatures of other vehicles by itself and hence trusted authorities are required. Each Certification Authority (C.A) is responsible for a region (national territory, district, county, etc.) and manages identities and credentials of all nodes registered with it. Each node is registered with only one CA, and has a unique long-term identity which may be an Electronic License Plate (ELP) with a long-term key and a certificate. To satisfy both the security and anonymity requirements, we rely on a short-term key authentication approach. Also, further we discuss how tradition PKI is unsuitable for communication and we will use short-term public key pairs instead. Fig. 1 shows security architecture for vehicular communication in which a large set of relevant security concepts [3] exists, including concepts for • Node identification, • Digital signatures and certificates, • Anonymizer for location privacy protection, • Detection of protocol violation, • Plausibility checks, • Tamper-resistant devices, • Access control policies, • Software certification, • In-vehicle network security, • secure positioning, and more. For enhancing the security, the header is divided into variable and invariable fields. Invariable are those fields thatremain unchanged from sender to destination , e.g., destination and source addresses and source position. Variable fields, such as sender location and time-to-live (TTL), are allowed to be altered by intermediate nodes. For packets being sent via multiple wireless hops, two signatures are added: an end-to- end signature is created by the sender node over the invariable fields of the packet header. Additionally, a hop-by-hop signature is added for the variable fields. On reception of a data packet a node verifies both signatures, and replaces the hop-by-hop signature by a new one for the altered variable fields and keeps the end-to-end signature. Eventually, the combination of end-to-end signatures results in a trusted forwarding chain [2]. In order to identify a particular vehicle taking part in communication there is a unique identifier. The Electronic License Plate (ELP) may serve as a unique identifier and acts as identity check mechanism. However, sending the original identifier may be prone to several risks such as masquerading attacks and hence the ELP needs to be mapped to a temporary identifier to be used for communication. There is a trusted authority namely the Certification Authority (C.A.) which keeps track of these unique identifiers and performs the job of mapping into a temporary unique identifier. This original solution however, had many problems like synchronization of different C.A’s and constant communication between V2I (vehicle to Infrastructure) causing further delay and loss of information. Hence the new proposed solution consists of a set (atleast 2) of permanent identifiers stored in each vehicle. Each vehicle consists of atleast 2 unique identifiers or public key. Each car communicates with only one of these stored keys for a certain period of time. This time during which it communicates with a single key is known as dwell time which is a pseudo-random number generated by its own hardware mechanism. It also acts as an added privacy mechanism for hiding user’s identity and making it difficult to track by an intruder. Fig – 1: Security Architecture
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 98 The Fig. 2 shows that every vehicle utilizes multiple short- term public key pairs instead of the old approach of using the same long-term public key for securing communications. The mapping between the long-term keys and the short-term credentials of each node (car) is maintained by the C.A. The main idea is that (i) every vehicle will be equipped with multiple certified public keys (anonymizers) that do not reveal the car’s identity, and (ii) the node uses every one of them for dwell time The multiple-anonymizer technique is adopted to attain location privacy. Particularly, vehicles are assigned with a set of identifiers, and the public keys that are alternatively used. Cars frequently change their key values or temporary identifiers used for authentication over time, and due to the unlinkability of old and new messages their location confidentiality preservation is attained. Moreover, the anonymizers can be linked to a specific vehicle by the CA so that the CA is able to trace and regulate the vehicle’s behavior. Fig- 2 Road map of vehicle using different keys 4. ADDITIONAL FEATURES 4.1 Group Message Furthermore, the signatures and public key certificates radically increase the packet length to cause intense message overhead. Furthermore, these cryptographic operations can incur very high computation and communication overhead. When V2V communication is performed in an urban area with many vehicles in each other’s communication range, this becomes a particularly serious problem. Each node M is equipped with a group vehicle key GVK , with the group members comprising all vehicles registered with the CA. A group key GVK generated by a group member allows for the validation (by any node) of any group signature with the help of CA. Intuitively, a group signature scheme allows any node V to sign a message on behalf of the group, without V ’s identity being revealed to the signature verifier. Moreover, it is impossible to link any two signatures of a legitimate group member. Note that no public key or other credentials need to be attached to an anonymously authenticated message. 4.2 Foreign Vehicle-short-term key Taking an analogy of a tourist place it is easy to spot a local person from the crowd as they look different from others. Taking the inverse in our case a foreign person is easier to be identified and more prone to threats. In C2C communication we use the identifier to relate a particular message to a particular car. However, the mapping between the permanent and temporary credentials also takes place by home C.A and hence this mapping will be completely different from the credentials assigned by a foreign C.A. Say, a car from United States comes to Canada with its permanent and temporary key pairs protecting the car’s identity. However, from a group of say hundred cars these temporary keys that will be used are still easy to distinguish from the keys used locally by the Canadian cars and hence easy to track its location and failing to protect its identity. These keys are like I.P addresses assigned to computers which itself tell its location like country, region, etc. Hence we propose to use new short term but permanent key pairs assigned to them whenever a foreign location is visited i.e. they register themselves with a foreign C.A first which in turn informs the home
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 99 Fig- 3 Communication in Vehicular Network C.A of the change of keys as long as they are in that region. This makes it difficult for an intruder to attack a specific foreign car. 4.3 Rapid Authentication To enable progress to authentication in C2C communication fast access or connectivity to infrastructure is highly needed. The speed with which the vehicle travels may exceed the speed with which the communication takes place between a car and a RSU (Road-Side Unit).The main cause of this delay is authentication mechanism and user privacy.Currently, there are a few strategies to improve this overhead by reducing the handoff latency in which the initial messages are protected and authenticated thereafter, the communication takes place unencrypted making it more prone to replay attacks, hijacking, masquerading and many more attacks. It may take time once for the RSU to authenticate the car then the communication takes place instantly. However, the range of one particular RSU is pretty limited compared to the distance the car covers and hence repeat authentication takes place. This repeated authentication cannot be avoided simply to speed-up the communication however; it can be facilitated with a shared secret key passed from one RSU to another. This shared secret has its own lifetime and the node (car) can be authenticated rapidly with the help of this key. The key is not known to any other car and changes frequently to avoid replay attacks. Here, the added security layer that has been provided is that the shared key may not be broadcasted to all RSU’s in vicinity but only to one that will be next in the range of the car. Hence, a prediction is made based on the messages broadcasted by the car: the direction, speed, brake light and turnsignal. Say there is a message broadcasted as presented below[4]: <Direction, Speed, Acceleration,Turn-Light, Traffic-Light>, where Direction denotes the direction a vehicle turns, such as east or west, and Speed denotes the velocity of a driving vehicle. Acceleration denotes whether a driving vehicle accelerates or decelerates. If the value of this field is positive, the vehicle is speeding up; otherwise, the vehicle is slowing down. The fourth field, Turn-Light, denotes signals of the turn light of a vehicle, particularly when a vehicle is going to turn at an intersection. If the car is travelling on highway with some speed then it’s easy to predict the next RSU and the next after that, saving time on authentication and improving road safety. If the car is travelling in a neighborhood area and suddenly the cars turns, A message will be broadcasted regarding this turnsignal and the RSU may predict the next RSU based on this turnsignal. This prediction may be added cost to RSU however it also reduces the burden of messages that other RSU services. In an ideal condition the authentication takes place the first time with one RSU using the lengthy authentication mechanism and thereafter all communication takes place using rapid authentication speeding up the communication process to almost double the original speed. 4.4 Revocation The revocation is concerned with excluding nodes from the system. The CA will contain a database of revoked node’s identifier and distributes this data to all nodes in the system if necessary, depending on the scale of the revocation decision and the extent to which the malicious activity has been
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 100 performed. A reaction to detected attacks carried out by a node is to exclude this node from the system. Moreover, verification of this malicious activity is also important as, due to flaws in security an intruder can perform such activity and masquerade itself as another node in which case the victim suffers unnecessarily. Also, depending on various factors the threat of that particular vehicle is detected. Factors like the number of nodes reporting the same malicious activity about the node, traffic density, validation of messages, authentication of nodes and position. For example, messages like emergency vehicle are broadcasted so if Trudy broadcasts this false message repeatedly in an urban area with say traffic density of 125 vehicles and only 1 or very few reports comes in then Trudy may not be included in the revocation list instead could be maintained in a temporary warning list for a certain amount of time by the C.A. till which further complaint comes in then appropriate and fast response could be achieved otherwise the node is simply ignored and deleted from temporary warning list . Other reasons not directly related to operation of system, such as a stolen unit or prevention of criminal activity may also require a revocation service. 5. CONCLUSIONS In this paper we propose the security framework for establishing communication and authentication along with privacy in ad hoc Car to Car communication. The different requirements of each user and car were studied and hence it is not appropriate to design a specific security framework for the System. Hence we established rapid authentication mechanism along with group messages to speed up the communication process and make C2C communication in ad hoc environment feasible. The proposed system establishes and maintains communication in the mentioned ad-hoc environment and also it provides a rigorous security infrastructure as a whole. Since these communication systems are to be used in high-end automobiles, cost of implementation and maintenance of Public key infrastructure is financially feasible. Our work will provide a new way to look at the security issues in C2C consortium. REFERENCES [1]. “Securing vehicular ad hoc networks,” Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Network, vol. 15 [2]. “Cross-Layer Privacy Enhancement and Non-Repudiation in Vehicular Communication,” in Proceedings of 4th Workshop on Mobile Ad-Hoc Networks (WMAN), Bern, Switzerland [3]. ”On the Performance of Secure Vehicular Communication System” - IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 8, NO. 6, [4]. Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication- Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, and Claudio E. Palazzi [5]. “The Car-to-Car Communication Consortium,” http://www.car-to-car.org, 2010. [6]. D. Chaum , “Security without Identification: Transaction Systems to Make Big Brother Obsolete,” Comm. ACM, vol. 28, no. 10, [7]. “DSRC: Dedicated Short Range Communications,” http://grouper.ieee.org/groups/scc32/dsrc/index.html, 2009. [8]. J. Blum, A. Eskandarian, and L. Hoffman, “Challenges of intervehicle adhoc networks,” IEEE Trans. Intell. Transp. Syst., vol. 5, no. 4, pp. 347–351, Dec. 2004. [9]. J. Blum and A. Eskandarian, “The threat of intelligent collision,” IEEE IT Prof., vol. 6, no. 1, pp. 24–29, Jan./Feb. 2004. [10]. A. Aijaz, B. Bochow, F. Dötzer, A. Festag, M. Gerlach, R. Kroh, [11]. “Dedicated Short Range Communication at 5.9 GHz StandardsGroup,” http://www.iteris.com/itsarch/html/standard/dsrc5ghz- b.htm,2009. [12]. “ISO TC204 Working Group 16,” http://www.calm.hu/, 2010. [13]. P. Papadimitratos, G. Mezzour, and J.-P. Hubaux, “Certificate Revocation List Distribution in Vehicular Communication Systems,” Proc. Fifth ACM Int’l Conf. Vehicular Ad Hoc Networks(VANET ’08), Sept. 2008. [14]. Y.-W. Lin, Y.-S. Chen, and S.-L. Lee, “Routing protocols in vehicular adhoc networks: A survey and future perspectives,” J. Inf. Sci. Eng., vol. 26, no. 3, pp. 913–932, May 2010. [15]. A. Broggi, P. Cerri, S. Ghidoni, P. Grisleri, and H. G. Jung, “A new approach to urban pedestrian detection for automatic braking,” IEEE Trans. Intell. Transp. Syst., vol. 10, no. 4, pp. 594–605, Dec. 2009. [16]. M.-T. Sun, W.-C. Feng, K. Fujimura, T.-H. Lai, H. Okada, and K. Fujimura, “GPS-based message broadcasting for inter vehicle communication,” in Proc. ICPP, Aug. 2000, pp. 279–286.