SlideShare a Scribd company logo
EMAP: Expedite Message Authentication protocol
For Vehicular Ad Hoc Networks
Guided by…

Presented by….

Mis: P. IRIN SAJI M.E.,

N.PONMUDISELVN

AP/CSE

II yr ME/CSE

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
AKSHEYAA COLLEGE OF ENGINEERING5
OBJECTIVE


The main aim of this project is to propose EMAP (Expedite Message Authentication
protocol) for vehicular Ad hoc Networks, which replaces the time-consuming
CRL(Certificate Revocation List) checking process by an efficient revocation
checking process.
ABSTRACT
•

In vehicular networks, moving vehicles are enabled to communicate with each other
via inter vehicle communications as well as with road-side units (RSUs) in vicinity
via roadside-to-vehicle communications.

•

To ensure reliable operation of VANETs and increase the amount of authentic
information gained from the received messages, each OBU should be able to check
the revocation status of all the received certificates in a timely manner.
CONT….
•

Most of the existing works overlooked the authentication delay resulting from
checking the CRL for each received certificate.

•

It introduce an expedite message authentication protocol (EMAP) which replaces
the CRL checking process by an efficient revocation checking process using a fast
and secure HMAC function and novel key sharing scheme employing probabilistic
random key distribution which allows an OBU to update its compromised keys even
if it previously missed some revocation messages.
EXISTING SYSTEM
•

In VANETs, the primary security requirements are identified as entity
authentication, message integrity, non-repudiation, and privacy preservation.

•

A well-recognized solution to secure VANETs is to deploy Public Key
Infrastructure (PKI), and to use Certificate Revocation Lists (CRLs) for managing

the revoked certificates.
•

In PKI, each entity in the network holds an authentic certificate, and every message
should be digitally signed before its transmission
DEMERITS


Variety of attacks such as injecting false information



Modifying and replaying the disseminated messages can be easily launched.



A security attack on legitimate users.



The scale of VANET is very large.
Cont…
•

A CRL, usually issued by a Trusted Authority (TA), is a list containing all the
revoked certificates.

•

In a PKI system, the authentication of any message is performed

by first

checking if the sender’s certificate is included in the current CRL,
•

Since the CRL size is expected to be very large, the delay of checking the
revocation status of a certificate included in a received message is expected to be
long.
LITERATURE SURVEY
Paper1: Eviction of Misbehaving and Faulty Nodes in Vehicular Networks in
the year of 2007 by M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J.-P.
Hubaux.


Misbehaving or faulty network node to be detected and removed



Revocation using Compressed Certificate Revocation Lists (RC2RL) is used



LEAVE protocol is used



Event data recorders (EDRs), embeded in vehicle

Merits

security is a critical factor and a significant challenge to be met.
 eviction is efficiently feasible and achieves a sufficient level of robustness.

Cont…
Demerits


There is a slight decrease in performance at very high densities



The average speed is much higher, and performance decreases slightly for very
high speeds



Only consider for revocation



Delay will be occure
LITERATURE SURVEY
Paper 2:TACKing Together Efficient Authentication, Revocation, and Privacy
in VANETs-2009 By A. Studer, E. Shi, F. Bai, and A. Perrig,


It consisting of a central trusted authority and regional authorities (RAs) distributed
all over the network



the trusted authority acts as the group manager and the vehicles act as the
group members
CONT…


Merits



Efficiently prevents eavesdroppers from linking a vehicle’s different keys



Identify the valid vehicle



Less overhead for vehicle to vehicle communication

Disadvantage


TACK not suitable for the safety applications in VANETs as the WAVE
standard



This certificate is valid only within the coverage range of the RA
LITERATURE SURVEY
Paper 3 K.P. Laberteaux, J.J. Haas, and Y. Hu, “Security CertificateRevocation
List Distribution for VANET,” Proc. Fifth ACM int’lWorkshop VehiculAr InterNETworking, pp. 88-89, 2008.
•
•
•

In a VANET, a certificate authority issues keys and certificates to vehicles.
Each vehicle distributes these certificates to other VANET participants
Every vehicle must sign the certificate for security purpose
Merits

•

epidemic distribution of certificate revocation lists which is quick and
efficientEfficiently distribute the certificate

•

Certificate authority check the certificate status



Car-to-car epidemic distribution of certificate revocation lists
CONT….
Demerits

• Only employ the road side unit Distribution point
• Certificate Revocation List is consisting large certificate
• Their is no Timestamp
LITERATURE SURVEY
Paper 4:An Efficient Pseudonymous Authentication Scheme with
Strong Privacy Preservation for Vehicular Communications in the year
of 2010 by Yipin Sun, Student Member, IEEE, Rongxing Lu, Student
Member, IEEE, Xiaodong Lin, Member, IEEE


PASS supports Roadside Unit aided distributed certificate service



PASS allows the vehicles to update certificates on road,



It provide privacy for certificate
Cont…
Merits
• Optimize revocation overhead
• Reducing certificate overhead
Demerits
• Can not trace legitimate vehicle
• Can’t provide location privacy
LITERATURE SURVEY


Paper5:Pseudonym

Changing

at

Social

Spots:

An

Effective

Strategy for Location Privacy in VANETs in the year of 2012 by Rongxing
Lu, Member, IEEE, Xiaodong Lin, Member, IEEE, Tom H. Luan,Xiaohui
Liang, Student Member, IEEE, and Xue min (Sherman) Shen, Fellow, IEEE



As a prime target of Quality of Privacy (QoP) in ks (VANETs),



If the pseudonyms are changed in an improper time and location, such solution is
invalid
Cont…….
Advantage
•

It present an effective pseudonym changing at social spot

Provable location privacy
Demerits
• It is not possible to track the vehicle exactly
PROPOSED SYSTEM


Expedite Message authentication protocol (EMAP) which replaces the

CRL checking process by an efficient revocation checking process
using a fast and secure HMAC function. EMAP is suitable not only for
VANETs but also for any network employing a PKI system.


To the best of our knowledge, this is the first solution to reduce the
authentication delay resulting from checking the CRL in VANETs.
MERITS


EMAP has the lowest computation complexity compared with the CRL checking
processes employing linear and binary search algorithms.



The number of messages that can be verified using EMAP within 300 msec is
greater than that using linear and binary CRL checking by 88.7 and 48.38
percent, respectively.



The proposed EMAP in authentication reduces the end-to-end delay compared with
that using either the linear or the binary CRL checking process.
MODULES
VANET Design
 Message Authentication
 Revocation Process

Development of VANET architecture


The Vehicular Adhoc Network model consists of Trusted Authority (TA), Roadside
Units (RSUs), On-Board Units (OBUs).



Trusted Authority, which is responsible for providing certificates and distributing
secret keys to all OBUs in the network.



Roadside Units which are fixed Units distributed all over the network.



On-Board Units, which are embedded in vehicles. OBUs can communicate either
with other OBUs through V2V communications or with RSUs through V2I
communications
Message Authentication


If an OBU want to communicate other OBU means it send an encrypted message
with a HMAC code using HMAC algorithm, it generate by using the sender id and
common secret key which knows all the unrevoked OBUs.



The receiver OBU also generates the HMAC code by using common secret key.



Whether the HMAC code is same means the receiver knows the sender OBU is an
authenticated OBU otherwise not process the message
USE CASE DIAGRAM :
SEQUENCE DIAGRAM:
COLLABORATION DIAGRAM
MAIN PAGE
TRUSTED AUTHORITY
CREATION OF ROADSIDE UNIT
ROADSIDE UNIT
ROADSIDE UNIT INPUT
ROADSIDE UNIT
ONBOARD UNIT INPUT
ONBOARD UNIT
ONBOARD UNIT INPUT
ONBOARD UNIT
ONBOARD UNIT
ONBOARD UNIT INPUT
ONBOARD UNIT
ONBOARD UNIT INPUT
ONBOARD UNIT
ONBOARD UNIT INPUT
ONBOARD UNIT
ONBOARD UNIT INPUT
ONBOARD UNIT
THANK YOU

More Related Content

What's hot

Vehicular ad hoc network - VANET
Vehicular ad hoc network - VANETVehicular ad hoc network - VANET
Vehicular ad hoc network - VANET
Sarah Baras
 
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security
Lim Jung
 
Introduction of VANET
Introduction of VANETIntroduction of VANET
Introduction of VANET
Pallavi Agarwal
 
Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPT
Meghaj Mallick
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and Hashing
Pallavi Agarwal
 
VANET overview & technical review
VANET overview &  technical reviewVANET overview &  technical review
Malicious node detection in vanet
Malicious node detection in vanetMalicious node detection in vanet
Malicious node detection in vanet
VYSAKHMANAYATH
 
Presentation pfe
Presentation pfePresentation pfe
Presentation pfe
Malik Riahi
 
VANET
VANETVANET
Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
Mastan Shaik
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography
Pallavi Agarwal
 
Performance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsPerformance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocols
journalBEEI
 
VEHICULAR ADHOC NETKWOK
VEHICULAR ADHOC NETKWOKVEHICULAR ADHOC NETKWOK
VEHICULAR ADHOC NETKWOK
durgeshkumarshukla
 
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
Joarder Kamal
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkS
Sridhar Raghavan
 
Ivwc
IvwcIvwc
VANET in Mobile Computing
VANET in Mobile ComputingVANET in Mobile Computing
VANET in Mobile Computing
KABILESH RAMAR
 
VANET, Security and Trust
VANET, Security and TrustVANET, Security and Trust
VANET, Security and Trust
Dr. Rajesh P Barnwal
 
Security issues and solutions in vehicular adhoc network a review approach
Security issues and solutions in vehicular adhoc network  a review approachSecurity issues and solutions in vehicular adhoc network  a review approach
Security issues and solutions in vehicular adhoc network a review approach
csandit
 
Various Metaheuristic algorithms For Securing VANET
Various Metaheuristic algorithms For Securing VANETVarious Metaheuristic algorithms For Securing VANET
Various Metaheuristic algorithms For Securing VANET
Kishan Patel
 

What's hot (20)

Vehicular ad hoc network - VANET
Vehicular ad hoc network - VANETVehicular ad hoc network - VANET
Vehicular ad hoc network - VANET
 
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security
 
Introduction of VANET
Introduction of VANETIntroduction of VANET
Introduction of VANET
 
Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPT
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and Hashing
 
VANET overview & technical review
VANET overview &  technical reviewVANET overview &  technical review
VANET overview & technical review
 
Malicious node detection in vanet
Malicious node detection in vanetMalicious node detection in vanet
Malicious node detection in vanet
 
Presentation pfe
Presentation pfePresentation pfe
Presentation pfe
 
VANET
VANETVANET
VANET
 
Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography
 
Performance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsPerformance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocols
 
VEHICULAR ADHOC NETKWOK
VEHICULAR ADHOC NETKWOKVEHICULAR ADHOC NETKWOK
VEHICULAR ADHOC NETKWOK
 
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkS
 
Ivwc
IvwcIvwc
Ivwc
 
VANET in Mobile Computing
VANET in Mobile ComputingVANET in Mobile Computing
VANET in Mobile Computing
 
VANET, Security and Trust
VANET, Security and TrustVANET, Security and Trust
VANET, Security and Trust
 
Security issues and solutions in vehicular adhoc network a review approach
Security issues and solutions in vehicular adhoc network  a review approachSecurity issues and solutions in vehicular adhoc network  a review approach
Security issues and solutions in vehicular adhoc network a review approach
 
Various Metaheuristic algorithms For Securing VANET
Various Metaheuristic algorithms For Securing VANETVarious Metaheuristic algorithms For Securing VANET
Various Metaheuristic algorithms For Securing VANET
 

Viewers also liked

My Final Project
My Final ProjectMy Final Project
My Final Project
askkathir
 
Programming esp8266
Programming esp8266Programming esp8266
Programming esp8266
Baoshi Zhu
 
Patent on In-vehicle Detection
Patent on In-vehicle DetectionPatent on In-vehicle Detection
Patent on In-vehicle Detection
Jialing Li
 
iGPS- Vehicle & Personal Tracking Solution
iGPS- Vehicle & Personal Tracking SolutioniGPS- Vehicle & Personal Tracking Solution
iGPS- Vehicle & Personal Tracking Solution
Satya Patri
 
Vehicle Access Management
Vehicle Access ManagementVehicle Access Management
Vehicle Access Management
Matrix COSEC
 
Raspberry Pi Zero
Raspberry Pi ZeroRaspberry Pi Zero
Raspberry Pi Zero
Baoshi Zhu
 
What is Jelly?
What is Jelly? What is Jelly?
What is Jelly?
Different Spin
 
Designing engaging curriculum for global collaboration in the classroom
Designing engaging curriculum for global collaboration in the classroomDesigning engaging curriculum for global collaboration in the classroom
Designing engaging curriculum for global collaboration in the classroom
Julie Lindsay
 
Social media is a hype and advertising sucks.
Social media is a hype and advertising sucks. Social media is a hype and advertising sucks.
Social media is a hype and advertising sucks.
Nicole Sanberg
 
Vrfid Vehicle Tracking
Vrfid Vehicle TrackingVrfid Vehicle Tracking
Vrfid Vehicle Tracking
Vicinity RFID Solutions Pvt. Ltd.
 
Cassiopeia Ltd - ESP8266+Arduino workshop
Cassiopeia Ltd - ESP8266+Arduino workshopCassiopeia Ltd - ESP8266+Arduino workshop
Cassiopeia Ltd - ESP8266+Arduino workshop
tomtobback
 
Intelligent Transportation System Modified
Intelligent Transportation System ModifiedIntelligent Transportation System Modified
Intelligent Transportation System Modified
Durgesh Mishra
 
social networking site
social networking sitesocial networking site
social networking site
Abhishek Ranjan
 
Cubismo
CubismoCubismo
Cubismo
RoShio
 
Vehicle detection through image processing
Vehicle detection through image processingVehicle detection through image processing
Vehicle detection through image processing
Ghazalpreet Kaur
 
Social networking
Social networkingSocial networking
Social networking
vishnukdixit
 
Traffic jam detection using image processing
Traffic jam detection using image processingTraffic jam detection using image processing
Traffic jam detection using image processing
Sai As Sharman
 
NodeMCU ESP8266 workshop 1
NodeMCU ESP8266 workshop 1NodeMCU ESP8266 workshop 1
NodeMCU ESP8266 workshop 1
Andy Gelme
 
Build WiFi gadgets using esp8266
Build WiFi gadgets using esp8266Build WiFi gadgets using esp8266
Build WiFi gadgets using esp8266
Baoshi Zhu
 
vechile to vechile communication
vechile to vechile communicationvechile to vechile communication
vechile to vechile communication
Sangita Das
 

Viewers also liked (20)

My Final Project
My Final ProjectMy Final Project
My Final Project
 
Programming esp8266
Programming esp8266Programming esp8266
Programming esp8266
 
Patent on In-vehicle Detection
Patent on In-vehicle DetectionPatent on In-vehicle Detection
Patent on In-vehicle Detection
 
iGPS- Vehicle & Personal Tracking Solution
iGPS- Vehicle & Personal Tracking SolutioniGPS- Vehicle & Personal Tracking Solution
iGPS- Vehicle & Personal Tracking Solution
 
Vehicle Access Management
Vehicle Access ManagementVehicle Access Management
Vehicle Access Management
 
Raspberry Pi Zero
Raspberry Pi ZeroRaspberry Pi Zero
Raspberry Pi Zero
 
What is Jelly?
What is Jelly? What is Jelly?
What is Jelly?
 
Designing engaging curriculum for global collaboration in the classroom
Designing engaging curriculum for global collaboration in the classroomDesigning engaging curriculum for global collaboration in the classroom
Designing engaging curriculum for global collaboration in the classroom
 
Social media is a hype and advertising sucks.
Social media is a hype and advertising sucks. Social media is a hype and advertising sucks.
Social media is a hype and advertising sucks.
 
Vrfid Vehicle Tracking
Vrfid Vehicle TrackingVrfid Vehicle Tracking
Vrfid Vehicle Tracking
 
Cassiopeia Ltd - ESP8266+Arduino workshop
Cassiopeia Ltd - ESP8266+Arduino workshopCassiopeia Ltd - ESP8266+Arduino workshop
Cassiopeia Ltd - ESP8266+Arduino workshop
 
Intelligent Transportation System Modified
Intelligent Transportation System ModifiedIntelligent Transportation System Modified
Intelligent Transportation System Modified
 
social networking site
social networking sitesocial networking site
social networking site
 
Cubismo
CubismoCubismo
Cubismo
 
Vehicle detection through image processing
Vehicle detection through image processingVehicle detection through image processing
Vehicle detection through image processing
 
Social networking
Social networkingSocial networking
Social networking
 
Traffic jam detection using image processing
Traffic jam detection using image processingTraffic jam detection using image processing
Traffic jam detection using image processing
 
NodeMCU ESP8266 workshop 1
NodeMCU ESP8266 workshop 1NodeMCU ESP8266 workshop 1
NodeMCU ESP8266 workshop 1
 
Build WiFi gadgets using esp8266
Build WiFi gadgets using esp8266Build WiFi gadgets using esp8266
Build WiFi gadgets using esp8266
 
vechile to vechile communication
vechile to vechile communicationvechile to vechile communication
vechile to vechile communication
 

Similar to EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks

Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
IEEEFINALYEARPROJECTS
 
Vehicular ad hoc_networks
Vehicular ad hoc_networksVehicular ad hoc_networks
Vehicular ad hoc_networks
Abdulrub Moshin
 
Overview of Trust and Cryptography in VANET
Overview of Trust and Cryptography in VANET Overview of Trust and Cryptography in VANET
Overview of Trust and Cryptography in VANET
Pallavi Agarwal
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
JPINFOTECH JAYAPRAKASH
 
Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Improving Security Features In MANET Authentication Through Scrutiny Of The C...Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Editor IJMTER
 
LSKA-ID: A lightweight security and key agreement protocol based on an identi...
LSKA-ID: A lightweight security and key agreement protocol based on an identi...LSKA-ID: A lightweight security and key agreement protocol based on an identi...
LSKA-ID: A lightweight security and key agreement protocol based on an identi...
TELKOMNIKA JOURNAL
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsBlockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
IJCNCJournal
 
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSBLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
IJCNCJournal
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Ecwayt
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
Ecwayt
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Ecwaytech
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
Ecwaytech
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
ecwayprojects
 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Ijcem Journal
 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Ijcem Journal
 
Java cluster-based certificate revocation with vindication capability for mo...
Java  cluster-based certificate revocation with vindication capability for mo...Java  cluster-based certificate revocation with vindication capability for mo...
Java cluster-based certificate revocation with vindication capability for mo...
ecwayerode
 
Cluster based certificate revocation with vindication capability for mobile a...
Cluster based certificate revocation with vindication capability for mobile a...Cluster based certificate revocation with vindication capability for mobile a...
Cluster based certificate revocation with vindication capability for mobile a...
Ecway Technologies
 
Cluster based certificate revocation with vindication capability for mobile a...
Cluster based certificate revocation with vindication capability for mobile a...Cluster based certificate revocation with vindication capability for mobile a...
Cluster based certificate revocation with vindication capability for mobile a...
ecway
 
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET  A Computational Analysis of ECC Based Novel Authentication Scheme in VANET
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET
IJECEIAES
 

Similar to EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks (20)

Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Vehicular ad hoc_networks
Vehicular ad hoc_networksVehicular ad hoc_networks
Vehicular ad hoc_networks
 
Overview of Trust and Cryptography in VANET
Overview of Trust and Cryptography in VANET Overview of Trust and Cryptography in VANET
Overview of Trust and Cryptography in VANET
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Improving Security Features In MANET Authentication Through Scrutiny Of The C...Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Improving Security Features In MANET Authentication Through Scrutiny Of The C...
 
LSKA-ID: A lightweight security and key agreement protocol based on an identi...
LSKA-ID: A lightweight security and key agreement protocol based on an identi...LSKA-ID: A lightweight security and key agreement protocol based on an identi...
LSKA-ID: A lightweight security and key agreement protocol based on an identi...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsBlockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
 
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSBLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
 
Java cluster-based certificate revocation with vindication capability for mo...
Java  cluster-based certificate revocation with vindication capability for mo...Java  cluster-based certificate revocation with vindication capability for mo...
Java cluster-based certificate revocation with vindication capability for mo...
 
Cluster based certificate revocation with vindication capability for mobile a...
Cluster based certificate revocation with vindication capability for mobile a...Cluster based certificate revocation with vindication capability for mobile a...
Cluster based certificate revocation with vindication capability for mobile a...
 
Cluster based certificate revocation with vindication capability for mobile a...
Cluster based certificate revocation with vindication capability for mobile a...Cluster based certificate revocation with vindication capability for mobile a...
Cluster based certificate revocation with vindication capability for mobile a...
 
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET  A Computational Analysis of ECC Based Novel Authentication Scheme in VANET
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 

EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks

  • 1. EMAP: Expedite Message Authentication protocol For Vehicular Ad Hoc Networks Guided by… Presented by…. Mis: P. IRIN SAJI M.E., N.PONMUDISELVN AP/CSE II yr ME/CSE DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING AKSHEYAA COLLEGE OF ENGINEERING5
  • 2. OBJECTIVE  The main aim of this project is to propose EMAP (Expedite Message Authentication protocol) for vehicular Ad hoc Networks, which replaces the time-consuming CRL(Certificate Revocation List) checking process by an efficient revocation checking process.
  • 3. ABSTRACT • In vehicular networks, moving vehicles are enabled to communicate with each other via inter vehicle communications as well as with road-side units (RSUs) in vicinity via roadside-to-vehicle communications. • To ensure reliable operation of VANETs and increase the amount of authentic information gained from the received messages, each OBU should be able to check the revocation status of all the received certificates in a timely manner.
  • 4. CONT…. • Most of the existing works overlooked the authentication delay resulting from checking the CRL for each received certificate. • It introduce an expedite message authentication protocol (EMAP) which replaces the CRL checking process by an efficient revocation checking process using a fast and secure HMAC function and novel key sharing scheme employing probabilistic random key distribution which allows an OBU to update its compromised keys even if it previously missed some revocation messages.
  • 5. EXISTING SYSTEM • In VANETs, the primary security requirements are identified as entity authentication, message integrity, non-repudiation, and privacy preservation. • A well-recognized solution to secure VANETs is to deploy Public Key Infrastructure (PKI), and to use Certificate Revocation Lists (CRLs) for managing the revoked certificates. • In PKI, each entity in the network holds an authentic certificate, and every message should be digitally signed before its transmission
  • 6. DEMERITS  Variety of attacks such as injecting false information  Modifying and replaying the disseminated messages can be easily launched.  A security attack on legitimate users.  The scale of VANET is very large.
  • 7. Cont… • A CRL, usually issued by a Trusted Authority (TA), is a list containing all the revoked certificates. • In a PKI system, the authentication of any message is performed by first checking if the sender’s certificate is included in the current CRL, • Since the CRL size is expected to be very large, the delay of checking the revocation status of a certificate included in a received message is expected to be long.
  • 8. LITERATURE SURVEY Paper1: Eviction of Misbehaving and Faulty Nodes in Vehicular Networks in the year of 2007 by M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux.  Misbehaving or faulty network node to be detected and removed  Revocation using Compressed Certificate Revocation Lists (RC2RL) is used  LEAVE protocol is used  Event data recorders (EDRs), embeded in vehicle Merits security is a critical factor and a significant challenge to be met.  eviction is efficiently feasible and achieves a sufficient level of robustness. 
  • 9. Cont… Demerits  There is a slight decrease in performance at very high densities  The average speed is much higher, and performance decreases slightly for very high speeds  Only consider for revocation  Delay will be occure
  • 10. LITERATURE SURVEY Paper 2:TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs-2009 By A. Studer, E. Shi, F. Bai, and A. Perrig,  It consisting of a central trusted authority and regional authorities (RAs) distributed all over the network  the trusted authority acts as the group manager and the vehicles act as the group members
  • 11. CONT…  Merits  Efficiently prevents eavesdroppers from linking a vehicle’s different keys  Identify the valid vehicle  Less overhead for vehicle to vehicle communication Disadvantage  TACK not suitable for the safety applications in VANETs as the WAVE standard  This certificate is valid only within the coverage range of the RA
  • 12. LITERATURE SURVEY Paper 3 K.P. Laberteaux, J.J. Haas, and Y. Hu, “Security CertificateRevocation List Distribution for VANET,” Proc. Fifth ACM int’lWorkshop VehiculAr InterNETworking, pp. 88-89, 2008. • • • In a VANET, a certificate authority issues keys and certificates to vehicles. Each vehicle distributes these certificates to other VANET participants Every vehicle must sign the certificate for security purpose Merits • epidemic distribution of certificate revocation lists which is quick and efficientEfficiently distribute the certificate • Certificate authority check the certificate status  Car-to-car epidemic distribution of certificate revocation lists
  • 13. CONT…. Demerits • Only employ the road side unit Distribution point • Certificate Revocation List is consisting large certificate • Their is no Timestamp
  • 14. LITERATURE SURVEY Paper 4:An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Communications in the year of 2010 by Yipin Sun, Student Member, IEEE, Rongxing Lu, Student Member, IEEE, Xiaodong Lin, Member, IEEE  PASS supports Roadside Unit aided distributed certificate service  PASS allows the vehicles to update certificates on road,  It provide privacy for certificate
  • 15. Cont… Merits • Optimize revocation overhead • Reducing certificate overhead Demerits • Can not trace legitimate vehicle • Can’t provide location privacy
  • 16. LITERATURE SURVEY  Paper5:Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs in the year of 2012 by Rongxing Lu, Member, IEEE, Xiaodong Lin, Member, IEEE, Tom H. Luan,Xiaohui Liang, Student Member, IEEE, and Xue min (Sherman) Shen, Fellow, IEEE  As a prime target of Quality of Privacy (QoP) in ks (VANETs),  If the pseudonyms are changed in an improper time and location, such solution is invalid
  • 17. Cont……. Advantage • It present an effective pseudonym changing at social spot Provable location privacy Demerits • It is not possible to track the vehicle exactly
  • 18. PROPOSED SYSTEM  Expedite Message authentication protocol (EMAP) which replaces the CRL checking process by an efficient revocation checking process using a fast and secure HMAC function. EMAP is suitable not only for VANETs but also for any network employing a PKI system.  To the best of our knowledge, this is the first solution to reduce the authentication delay resulting from checking the CRL in VANETs.
  • 19. MERITS  EMAP has the lowest computation complexity compared with the CRL checking processes employing linear and binary search algorithms.  The number of messages that can be verified using EMAP within 300 msec is greater than that using linear and binary CRL checking by 88.7 and 48.38 percent, respectively.  The proposed EMAP in authentication reduces the end-to-end delay compared with that using either the linear or the binary CRL checking process.
  • 20. MODULES VANET Design  Message Authentication  Revocation Process 
  • 21. Development of VANET architecture  The Vehicular Adhoc Network model consists of Trusted Authority (TA), Roadside Units (RSUs), On-Board Units (OBUs).  Trusted Authority, which is responsible for providing certificates and distributing secret keys to all OBUs in the network.  Roadside Units which are fixed Units distributed all over the network.  On-Board Units, which are embedded in vehicles. OBUs can communicate either with other OBUs through V2V communications or with RSUs through V2I communications
  • 22.
  • 23. Message Authentication  If an OBU want to communicate other OBU means it send an encrypted message with a HMAC code using HMAC algorithm, it generate by using the sender id and common secret key which knows all the unrevoked OBUs.  The receiver OBU also generates the HMAC code by using common secret key.  Whether the HMAC code is same means the receiver knows the sender OBU is an authenticated OBU otherwise not process the message