SlideShare a Scribd company logo
EMAP: Expedite Message Authentication Protocol for
Vehicular Ad Hoc Networks
ABSTRACT:
Vehicular ad hoc networks (VANETs) adopt the Public Key Infrastructure (PKI)
and Certificate Revocation Lists (CRLs) for their security. In any PKI system, the
authentication of a received message is performed by checking if the certificate of
the sender is included in the current CRL, and verifying the authenticity of the
certificate and signature of the sender. In this paper, we propose an Expedite
Message Authentication Protocol (EMAP) for VANETs, which replaces the time-
consuming CRL checking process by an efficient revocation checking process. The
revocation check process in EMAP uses a keyed Hash Message Authentication
Code (HMAC), where the key used in calculating the HMAC is shared only
between non revoked On-Board Units (OBUs). In addition, EMAP uses a novel
probabilistic key distribution, which enables non revoked OBUs to securely share
and update a secret key. EMAP can significantly decrease the message loss ratio
due to the message verification delay compared with the conventional
authentication methods employing CRL. By conducting security analysis and
performance evaluation, EMAP is demonstrated to be secure and efficient.
EXISTING SYSTEM:
In this paper, we consider both nonoptimized and optimized search algorithms.
According to the Dedicated Short Range Communication (DSRC) [10], which is
part of the WAVE standard, each OBU has to broadcast a message every 300 msec
about its location, velocity, and other telematic information. In such scenario, each
OBU may receive a large number of messages every 300 msec, and it has to check
the current CRL for all the received certificates, which may incur long
authentication delay depending on the CRL size and the number of received
certificates. The ability to check a CRL for a large number of certificates in a
timely manner leads an inevitable challenge to VANETs. To ensure reliable
operation of VANETs and increase the amount of authentic information gained
from the received messages, each OBU should be able to check the revocation
status of all the received certificates in a timely manner. Most of the existing works
overlooked the authentication delay resulting from checking the CRL for each
received certificate.
DISADVANTAGES OF EXISTING SYSTEM:
Since vehicles communicate through wireless channels, a variety of attacks
such as injecting false information, modifying and replaying the disseminated
messages can be easily launched. A security attack on VANETs can have
severe harmful or fatal consequences to legitimate users.
To abstain the leakage of the real identities and location information of the
drivers from any external eavesdropper.
The scale of VANET is very large.
PROPOSED SYSTEM:
In this paper, we introduce an expedite message authentication protocol (EMAP)
which replaces the CRL checking process by an efficient revocation checking
process using a fast and secure HMAC function. EMAP is suitable not only for
VANETs but also for any network employing a PKI system. To the best of our
knowledge, this is the first solution to reduce the authentication delay resulting
from checking the CRL in VANETs.
ADVANTAGES OF PROPOSED SYSTEM:
 EMAP has the lowest computation complexity compared with the CRL
checking processes employing linear and binary search algorithms.
 The number of messages that can be verified using EMAP within 300 msec is
greater than that using linear and binary CRL checking by 88.7 and 48.38
percent, respectively.
 The proposed EMAP in authentication reduces the end-to-end delay compared
with that using either the linear or the binary CRL checking process.
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Monitor : 15 inch VGA Colour.
Mouse : Logitech Mouse.
Ram : 512 MB
Keyboard : Standard Keyboard
SOFTWARE REQUIREMENTS:
Operating System : Windows XP.
Coding Language : ASP.NET, C#.Net.
Database : SQL Server 2005
REFERENCE:
Albert Wasef and Xuemin (Sherman) Shen, IEEE, Fellow, “EMAP: Expedite
Message Authentication Protocol for Vehicular Ad Hoc Networks”, IEEE
TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 1, JANUARY
2013.

More Related Content

Viewers also liked

Annotating search results from web databases
Annotating search results from web databasesAnnotating search results from web databases
Annotating search results from web databases
JPINFOTECH JAYAPRAKASH
 
Effective risk communication for android apps
Effective risk communication for android appsEffective risk communication for android apps
Effective risk communication for android apps
JPINFOTECH JAYAPRAKASH
 
Reversible data hiding with optimal value transfer
Reversible data hiding with optimal value transferReversible data hiding with optimal value transfer
Reversible data hiding with optimal value transfer
JPINFOTECH JAYAPRAKASH
 
Context based access control systems for mobile devices
Context based access control systems for mobile devicesContext based access control systems for mobile devices
Context based access control systems for mobile devices
JPINFOTECH JAYAPRAKASH
 
2015 2016 ieee vlsi project titles
2015   2016 ieee vlsi project titles2015   2016 ieee vlsi project titles
2015 2016 ieee vlsi project titles
JPINFOTECH JAYAPRAKASH
 
Target tracking and mobile sensor navigation in wireless sensor networks
Target tracking and mobile sensor navigation in wireless sensor networksTarget tracking and mobile sensor navigation in wireless sensor networks
Target tracking and mobile sensor navigation in wireless sensor networks
JPINFOTECH JAYAPRAKASH
 
Bahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsBahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environments
JPINFOTECH JAYAPRAKASH
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
JPINFOTECH JAYAPRAKASH
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
JPINFOTECH JAYAPRAKASH
 
Nice network intrusion detection and countermeasure selection in virtual netw...
Nice network intrusion detection and countermeasure selection in virtual netw...Nice network intrusion detection and countermeasure selection in virtual netw...
Nice network intrusion detection and countermeasure selection in virtual netw...
JPINFOTECH JAYAPRAKASH
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
JPINFOTECH JAYAPRAKASH
 
How long to wait predicting bus arrival time with mobile phone based particip...
How long to wait predicting bus arrival time with mobile phone based particip...How long to wait predicting bus arrival time with mobile phone based particip...
How long to wait predicting bus arrival time with mobile phone based particip...
JPINFOTECH JAYAPRAKASH
 
Anomaly detection via online over sampling principal component analysis
Anomaly detection via online over sampling principal component analysisAnomaly detection via online over sampling principal component analysis
Anomaly detection via online over sampling principal component analysis
JPINFOTECH JAYAPRAKASH
 
2015 2016 ieee dot net project titles
2015 2016 ieee dot net project titles2015 2016 ieee dot net project titles
2015 2016 ieee dot net project titles
JPINFOTECH JAYAPRAKASH
 
A new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessionsA new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessions
JPINFOTECH JAYAPRAKASH
 
Target tracking and mobile sensor navigation in wireless sensor networks
Target tracking and mobile sensor navigation in wireless sensor networksTarget tracking and mobile sensor navigation in wireless sensor networks
Target tracking and mobile sensor navigation in wireless sensor networks
JPINFOTECH JAYAPRAKASH
 
Fan culture in games
Fan culture in gamesFan culture in games
Fan culture in games
pumascomm
 
Matt geri (mobile as publishing platform)
Matt geri (mobile as publishing platform)Matt geri (mobile as publishing platform)
Matt geri (mobile as publishing platform)
WordCamp Cape Town
 
Simon -- Local Super Forum
Simon -- Local Super ForumSimon -- Local Super Forum
Simon -- Local Super Forum
BOLO Conference
 
Are You Vacation Deprived? - Facts And Stats
Are You Vacation Deprived? - Facts And StatsAre You Vacation Deprived? - Facts And Stats
Are You Vacation Deprived? - Facts And Stats
Maps of World
 

Viewers also liked (20)

Annotating search results from web databases
Annotating search results from web databasesAnnotating search results from web databases
Annotating search results from web databases
 
Effective risk communication for android apps
Effective risk communication for android appsEffective risk communication for android apps
Effective risk communication for android apps
 
Reversible data hiding with optimal value transfer
Reversible data hiding with optimal value transferReversible data hiding with optimal value transfer
Reversible data hiding with optimal value transfer
 
Context based access control systems for mobile devices
Context based access control systems for mobile devicesContext based access control systems for mobile devices
Context based access control systems for mobile devices
 
2015 2016 ieee vlsi project titles
2015   2016 ieee vlsi project titles2015   2016 ieee vlsi project titles
2015 2016 ieee vlsi project titles
 
Target tracking and mobile sensor navigation in wireless sensor networks
Target tracking and mobile sensor navigation in wireless sensor networksTarget tracking and mobile sensor navigation in wireless sensor networks
Target tracking and mobile sensor navigation in wireless sensor networks
 
Bahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsBahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environments
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Nice network intrusion detection and countermeasure selection in virtual netw...
Nice network intrusion detection and countermeasure selection in virtual netw...Nice network intrusion detection and countermeasure selection in virtual netw...
Nice network intrusion detection and countermeasure selection in virtual netw...
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
 
How long to wait predicting bus arrival time with mobile phone based particip...
How long to wait predicting bus arrival time with mobile phone based particip...How long to wait predicting bus arrival time with mobile phone based particip...
How long to wait predicting bus arrival time with mobile phone based particip...
 
Anomaly detection via online over sampling principal component analysis
Anomaly detection via online over sampling principal component analysisAnomaly detection via online over sampling principal component analysis
Anomaly detection via online over sampling principal component analysis
 
2015 2016 ieee dot net project titles
2015 2016 ieee dot net project titles2015 2016 ieee dot net project titles
2015 2016 ieee dot net project titles
 
A new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessionsA new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessions
 
Target tracking and mobile sensor navigation in wireless sensor networks
Target tracking and mobile sensor navigation in wireless sensor networksTarget tracking and mobile sensor navigation in wireless sensor networks
Target tracking and mobile sensor navigation in wireless sensor networks
 
Fan culture in games
Fan culture in gamesFan culture in games
Fan culture in games
 
Matt geri (mobile as publishing platform)
Matt geri (mobile as publishing platform)Matt geri (mobile as publishing platform)
Matt geri (mobile as publishing platform)
 
Simon -- Local Super Forum
Simon -- Local Super ForumSimon -- Local Super Forum
Simon -- Local Super Forum
 
Are You Vacation Deprived? - Facts And Stats
Are You Vacation Deprived? - Facts And StatsAre You Vacation Deprived? - Facts And Stats
Are You Vacation Deprived? - Facts And Stats
 

Similar to Emap expedite message authentication protocol for vehicular ad hoc networks

Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
Ecway Technologies
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
Ecway Technologies
 
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Java  emap expedite message authentication protocol for vehicular ad hoc netw...Java  emap expedite message authentication protocol for vehicular ad hoc netw...
Java emap expedite message authentication protocol for vehicular ad hoc netw...
ecwayerode
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
ecway
 
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Java  emap expedite message authentication protocol for vehicular ad hoc netw...Java  emap expedite message authentication protocol for vehicular ad hoc netw...
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Ecway Technologies
 
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksEMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
KaashivInfoTech Company
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol     for vehicular ad hoc networksEmap expedite message authentication protocol     for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
Madan Golla
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Ecwayt
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
Ecwayt
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Ecwaytech
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
ecwayprojects
 
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksEMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
Ponmudiselvan.N Selvan
 
TAM new report
TAM new reportTAM new report
TAM new report
Suzit Punk
 
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETsAn Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
JAYAPRAKASH JPINFOTECH
 
W04404135146
W04404135146W04404135146
W04404135146
IJERA Editor
 
Effective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksEffective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networks
Nagamalleswararao Tadikonda
 
TR-069_Overview.ppt
TR-069_Overview.pptTR-069_Overview.ppt
TR-069_Overview.ppt
AvneeshKumar164042
 
Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Improving Security Features In MANET Authentication Through Scrutiny Of The C...Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Editor IJMTER
 
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...
JAYAPRAKASH JPINFOTECH
 
The process of authentication
The process of authenticationThe process of authentication
The process of authentication
AbdulrahmanAlmehmadi2
 

Similar to Emap expedite message authentication protocol for vehicular ad hoc networks (20)

Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Java  emap expedite message authentication protocol for vehicular ad hoc netw...Java  emap expedite message authentication protocol for vehicular ad hoc netw...
Java emap expedite message authentication protocol for vehicular ad hoc netw...
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Java  emap expedite message authentication protocol for vehicular ad hoc netw...Java  emap expedite message authentication protocol for vehicular ad hoc netw...
Java emap expedite message authentication protocol for vehicular ad hoc netw...
 
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksEMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol     for vehicular ad hoc networksEmap expedite message authentication protocol     for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksEMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
 
TAM new report
TAM new reportTAM new report
TAM new report
 
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETsAn Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
 
W04404135146
W04404135146W04404135146
W04404135146
 
Effective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksEffective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networks
 
TR-069_Overview.ppt
TR-069_Overview.pptTR-069_Overview.ppt
TR-069_Overview.ppt
 
Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Improving Security Features In MANET Authentication Through Scrutiny Of The C...Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Improving Security Features In MANET Authentication Through Scrutiny Of The C...
 
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...
 
The process of authentication
The process of authenticationThe process of authentication
The process of authentication
 

Recently uploaded

Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 

Recently uploaded (20)

Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 

Emap expedite message authentication protocol for vehicular ad hoc networks

  • 1. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks ABSTRACT: Vehicular ad hoc networks (VANETs) adopt the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs) for their security. In any PKI system, the authentication of a received message is performed by checking if the certificate of the sender is included in the current CRL, and verifying the authenticity of the certificate and signature of the sender. In this paper, we propose an Expedite Message Authentication Protocol (EMAP) for VANETs, which replaces the time- consuming CRL checking process by an efficient revocation checking process. The revocation check process in EMAP uses a keyed Hash Message Authentication Code (HMAC), where the key used in calculating the HMAC is shared only between non revoked On-Board Units (OBUs). In addition, EMAP uses a novel probabilistic key distribution, which enables non revoked OBUs to securely share and update a secret key. EMAP can significantly decrease the message loss ratio due to the message verification delay compared with the conventional authentication methods employing CRL. By conducting security analysis and performance evaluation, EMAP is demonstrated to be secure and efficient.
  • 2. EXISTING SYSTEM: In this paper, we consider both nonoptimized and optimized search algorithms. According to the Dedicated Short Range Communication (DSRC) [10], which is part of the WAVE standard, each OBU has to broadcast a message every 300 msec about its location, velocity, and other telematic information. In such scenario, each OBU may receive a large number of messages every 300 msec, and it has to check the current CRL for all the received certificates, which may incur long authentication delay depending on the CRL size and the number of received certificates. The ability to check a CRL for a large number of certificates in a timely manner leads an inevitable challenge to VANETs. To ensure reliable operation of VANETs and increase the amount of authentic information gained from the received messages, each OBU should be able to check the revocation status of all the received certificates in a timely manner. Most of the existing works overlooked the authentication delay resulting from checking the CRL for each received certificate. DISADVANTAGES OF EXISTING SYSTEM: Since vehicles communicate through wireless channels, a variety of attacks such as injecting false information, modifying and replaying the disseminated messages can be easily launched. A security attack on VANETs can have severe harmful or fatal consequences to legitimate users.
  • 3. To abstain the leakage of the real identities and location information of the drivers from any external eavesdropper. The scale of VANET is very large. PROPOSED SYSTEM: In this paper, we introduce an expedite message authentication protocol (EMAP) which replaces the CRL checking process by an efficient revocation checking process using a fast and secure HMAC function. EMAP is suitable not only for VANETs but also for any network employing a PKI system. To the best of our knowledge, this is the first solution to reduce the authentication delay resulting from checking the CRL in VANETs. ADVANTAGES OF PROPOSED SYSTEM:  EMAP has the lowest computation complexity compared with the CRL checking processes employing linear and binary search algorithms.  The number of messages that can be verified using EMAP within 300 msec is greater than that using linear and binary CRL checking by 88.7 and 48.38 percent, respectively.  The proposed EMAP in authentication reduces the end-to-end delay compared with that using either the linear or the binary CRL checking process.
  • 5. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Monitor : 15 inch VGA Colour. Mouse : Logitech Mouse. Ram : 512 MB Keyboard : Standard Keyboard SOFTWARE REQUIREMENTS: Operating System : Windows XP. Coding Language : ASP.NET, C#.Net. Database : SQL Server 2005 REFERENCE: Albert Wasef and Xuemin (Sherman) Shen, IEEE, Fellow, “EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks”, IEEE
  • 6. TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 1, JANUARY 2013.