SlideShare a Scribd company logo
1 of 19
Download to read offline
AN EFFICIENT PRIVACY PRESERVING
AUTHENTICATION WITH INSIDER ATTACK
RESISTANCE FOR VANET
Presented by
1.SANJAY K (722820106116)
2.SARAN S (722820106121)
3.SOMANSANKARA P R (722820106134)
4.VISHNUPRASANTH B (722820106159)
Guided by
Mrs. A.Mohanapriya
ASSISTANT PROFESSOR (M.E.,)
DEPARTMENT OF ECE
SRI ESHWAR COLLEGE OF ENGINEERING.
10-08-2023 1
Batch no : 13
10-08-2023 Batch no : 13 2
Presentation Outline
ā€¢ Introduction
ā€¢ Abstract
ā€¢ Literature Survey
ā€¢ Objective
ā€¢ Block Diagram
ā€¢ Expected Outcome
ā€¢ Execution Plan
ā€¢ References
10-08-2023 Batch no : 13 3
Introduction
ā€¢ Vehicular Ad-Hoc Networks (VANETs) play a crucial role in enhancing road
safety and traffic efficiency by enabling real-time vehicle communication.
ā€¢ However, the nature of VANETs exposes them to various security risks,
including privacy breaches and insider attacks.
ā€¢ To address these challenges, we propose an efficient privacy-preserving
authentication system tailored for VANETs.
ā€¢ Our solution incorporates advanced techniques to safeguard user identities,
ensuring confidentiality and thwarting insider threats for a secure VANET
environment.
10-08-2023 Batch no : 13 4
Abstract
ā€¢ Vehicular Ad-Hoc Networks (VANETs) are essential for improving traffic
management and road safety by enabling vehicles to connect with each other
and with roadside infrastructure.
ā€¢ VANETs face security risks, including insider attacks, due to their openness
and dynamic nature.
ā€¢ The proposed research presents an efficient privacy-preserving authentication
scheme with insider attack resistance for VANETs, utilizing clustering
protocols and the BRFD algorithm.
ā€¢ The research aims to build a more secure and efficient VANET ecosystem to
encourage the widespread adoption of VANET technology for safer and more
effective transportation networks.
10-08-2023 Batch no : 13 5
Literature Survey
Paper Title Journal details Methodology
Advantages/
Disadvantages
1.PairingFree Signatures
with Insider Attack
Resistance for Vehicular
AdHoc Networks
(VANETs)
IEEE Access, vol. 9,
pp. 159587-159597.
Cryptographic operations
measured using C MIRACL
Core Cryptographic Library
Advantages:
It ensures message integrity, authentication,
privacy, tracing, non-repudiation, and resistance to
insider attacks
Disadvantages:
Limited Scalability,
Increased Latency,
Complexity of Revocation.
2. Comparative study
on security and privacy
issues in VANETs
Cloud and
IoTā€Based Vehicular
Ad Hoc Networks
(2021): 145-162.
Geolocalization Abilities,
Dedicated Short-Range
Communication (DSRC),
Low Motionlessness
Necessities
Advantages:
It achieves security and privacy in VANETs.
It enhances vehicle authentication time, collision
rate, data transmission rate, and privacy
preservation levels
Disadvantages:
Rapidly Evolving Technology,
Availability of Data,
Scope and Complexity
10-08-2023 Batch no : 13 6
Literature Survey
Paper Title Journal details Methodology
Advantages/
Disadvantages
3.Proven Secure Tree-
Based Authenticated
Key Agreement for
Securing V2V and V2I
Communications in
VANETs
IEEE Transactions
on Mobile
Computing, vol. 21,
no. 9, pp. 3280-3297,
1 Sept. 2022, doi:
10.1109/TMC.2021.3
056712.
V2V and V2I
Communications, Full
authentication mechanism,
Light weight Cryptography
mechanism
Advantages:
The outcome is proven secure, it has low
computational and communication overhead
Disadvantages:
Scalability,
Complexity,
Infrastructure Dependence,
Single Point of Failure.
4.Batch-Assisted
Verification Scheme
for Reducing Message
Verification Delay of
the Vehicular Ad Hoc
Networks
IEEE Internet of
Things Journal, vol.
7, no. 9, pp. 8144-
8156, Sept. 2020,
doi:
10.1109/JIOT.2020.3
004811
Dedicated Short Range
Communication (DSRC)
protocol, Collaborative
authentication method.
Advantages:
It reduces verification delay and achieves fast
message verification
Disadvantages:
Publication Bias,
Rapidly Evolving Technology,
Availability of Data,
Scope and Complexity
10-08-2023 Batch no : 13 7
Literature Survey
Paper Title Journal details Methodology
Advantages/
Disadvantages
5.The Delay-
Constrained and
Network-Situation-
Aware V2V2I VANET
Data Offloading Based
on the Multi-Access
Edge Computing (MEC)
Architecture,
IEEE Open Journal
of Vehicular
Technology, vol. 1,
pp. 331-347, 2020,
doi:
10.1109/OJVT.2020.
3028684.
MEC protocol Advantages:
Ensures lifetime and quality of the V2V2I path to
derive suitable offloading paths
Disadvantages:
Limited scope,
Simplified assumptions,
Lack of real-world validation
6.A novel cyberā€attack
modelling and detection
in overcurrent
protection relays based
on wavelet signature
analysis.
IET Generation,
Transmission &
Distribution (2023).
Wavelet analysis,BRFD
algorithm,NDN-VANET
interconnection techniques
Advantages:
Detecting cyber attacks, reducing redundancy and
improving packet satisfaction rate and delay
Disadvantages:
It does not provide a comprehensive analysis of all
possible cyber threats and vulnerabilities in the
smart grid
10-08-2023 Batch no : 13 8
Literature Survey
Paper Title Journal details Methodology
Advantages/
Disadvantages
7.A Survey of
VANET/V2X Routing
from the Perspective of
Non-Learning- and
Learning-Based
Approaches
IEEE Access, vol.
10, pp. 23022-
23050, 2022, Doi:
10.1109/ACCESS.2
022.3152767.
V2X routing protocols Advantages:
It delivers optimized packet delivery, handling
congestion and shadowing effects, reducing
network overhead
Disadvantages:
Potential limitation, Does not capture future
protocols, a lack of coverage of innovative
approaches
8.A receiver-forwarding
decision scheme based on
Bayesian for NDN-
VANET,
China
Communications,
vol. 17, no. 8, pp.
106-120, Aug. 2020,
doi:
10.23919/JCC.2020.
08.009.
Bayesian decision theory and
the BRFD (Bayesian-based
Receiver Forwarding
Decision) scheme
Advantages:
Reducing redundancy and improving packet
satisfaction rate and delay
Disadvantages:
It does not provide a comprehensive evaluation
of the proposed BRFD scheme.
10-08-2023 Batch no : 13 9
Literature Survey
Paper Title Journal details Methodology
Advantages/
Disadvantages
9.Comment on Secure
and Lightweight
Conditional Privacy-
Preserving
Authentication for
Securing Traffic
Emergency Messages
in VANETs
IEEE Transactions
on Information
Forensics and
Security, vol. 18, pp.
1037-1038, 2023,
doi:
10.1109/TIFS.2021.3
066277
PPA (privacy-preserving
authentication) protocol
Advantages:
The scheme does not satisfy conditional privacy and
allows for the forging of valid signatures on
arbitrary messages
Disadvantages:
Reliability and Availability,
Privacy Concerns,
Scalability,
Security Vulnerabilities
10.R.S. State-of-the-art
approach to clustering
protocols in VANET: a
survey
Wireless Netw 26,
5307ā€“5336 (2020).
https://doi.org/10.10
07/s11276-020-
02392-2.
Clustering protocol,MAC
protocol
Advantages:
Improved scalability and reliability
Disadvantages:
Communication overhead,limited clustered node
percentage
10-08-2023 Batch no : 13 10
Objective
ā€¢ Develop an efficient privacy-preserving authentication mechanism for
VANETs.
ā€¢ Implement insider attack resistance to safeguard the network from
malicious insiders.
ā€¢ Ensure secure communication and protect users' identities during VANET
interactions.
ā€¢ Employ advanced cryptographic techniques to enhance data confidentiality
and integrity.
ā€¢ Improve overall network security to mitigate potential threats and
vulnerabilities.
10-08-2023 Batch no : 13 11
Flow Chart
10-08-2023 Batch no : 13 12
Explanation
ā€¢ OBU Generates Signature Key and Requests TA to join.
ā€¢ TA verifies the ID sent in the Signature Key by the OBUs.
ā€¢ TA applies DSRC protocol and Clustering protocol for reducing delay and
for increasing scalability.
ā€¢ Further, TA Certifies the Signature Key and transmits to the OBU.
ā€¢ OBU generates Signature message and transmits to the Destination Vehicle
Vd.
ā€¢ Vd verifies and access the message sent from the OBU.
10-08-2023 Batch no : 13 13
Software Details
Software used:
Ns-2(Network Simulator version 2)
Language used:
C++,Otcl script
Software description:
ā€¢ It is a discrete event simulator for networking research.
ā€¢ It provides substantial support to simulate bunch of protocols like TCP, FTP,
UDP, https and DSR
ā€¢ It simulates wired and wireless network.
ā€¢ It is primarily Unix based.5. Uses TCL as its scripting language.
10-08-2023 Batch no : 13 14
Methodology for the Proposed work
Clustering protocol
ā€¢ A clustering protocol can greatly enhance the scalability of vehicular ad hoc
networks (VANETs).
ā€¢ By organizing vehicles into clusters, reducing overhead, and improving overall
network efficiency.
Dedicated Short Range Communication (DSRC) protocol
ā€¢ Dedicated Short Range Communication (DSRC) plays a significant role in
decreasing communication delay in vehicular networks.
10-08-2023 Batch no : 13 15
Expected outcome or Results and Discussion
ā€¢ The proposed efficient privacy-preserving authentication scheme with insider
attack resistance for VANETs, leveraging a clustering protocol for better
scalability.
ā€¢ The DSRC algorithm for reduced delay, represents a significant step towards
establishing secure and efficient vehicular communication systems.
ā€¢ The future work based on the clustering protocol for scalability.
ā€¢ The DSRC protocol for reduced delay in VANET authentication should aim to
refine and expand these approaches to meet the evolving challenges and
demands of real-world vehicular communication.
10-08-2023 Batch no : 13 16
Execution Plan
ā€¢ First review - Algorithm to sort out our problem statement was
discussed and finalized.
ā€¢ Second review - Algorithm that is choosen will be implemented
in the software to get the expected outcome.
ā€¢ Final review - Expected outcome will be attained and results
need to be verified.
10-08-2023 Batch no : 13 17
References
1. L. E. Funderburg, H. Ren and I. -Y. Lee, "Pairing-Free Signatures with Insider-Attack Resistance for Vehicular
Ad-Hoc Networks (VANETs)," in IEEE Access, vol. 9, pp. 159587-159597, 2021, Doi:
10.1109/ACCESS.2021.3131189.
2. B T Rao, B. Tarakeswara, RSM Lakshmi Patibandla, and V. Lakshman Narayana. "Comparative study on security
and privacy issues in VANETs." Cloud and IoTā€Based Vehicular Ad Hoc Networks (2021): 145-162.
3. L. Wei, J. Cui, H. Zhong, Y. Xu and L. Liu, "Proven Secure Tree-Based Authenticated Key Agreement for
Securing V2V and V2I Communications in VANETs," in IEEE Transactions on Mobile Computing, vol. 21, no. 9,
pp. 3280-3297, 1 Sept. 2022, Doi: 10.1109/TMC.2021.3056712.
4. F. Wu, X. Zhang, C. Zhang, X. Chen, W. Fan and Y. Liu, "Batch-Assisted Verification Scheme for Reducing
Message Verification Delay of the Vehicular Ad Hoc Networks," in IEEE Internet of Things Journal, vol. 7, no. 9,
pp. 8144-8156, Sept. 2020, Doi: 10.1109/JIOT.2020.3004811.
5. C. M. Huang and C. -F. Lai, "The Delay-Constrained and Network-Situation-Aware V2V2I VANET Data
Offloading Based on the Multi-Access Edge Computing (MEC) Architecture," in IEEE Open Journal of Vehicular
Technology, vol. 1, pp. 331-347, 2020, Doi: 10.1109/OJVT.2020.3028684
6. Yousefi kia, Mohammad, Mohsen Saniei, and Seyyed Ghodratollah Seifossadat. "A novel cyberā€attack modelling
and detection in overcurrent protection relays based on wavelet signature analysis." IET Generation, Transmission
& Distribution (2023).
10-08-2023 Batch no : 13 18
References
7. T. Chatterjee, R. Karmakar, G. Kaddoum, S. Chattopadhyay and S. Chakraborty, "A Survey of VANET/V2X
Routing from the Perspective of Non-Learning- and Learning-Based Approaches," in IEEE Access, vol. 10, pp.
23022-23050, 2022, Doi: 10.1109/ACCESS.2022.3152767.
8. X. Guo, Y. Chen, L. Cao, D. Zhang and Y. Jiang, "A receiver-forwarding decision scheme based on Bayesian for
NDN-VANET," in China Communications, vol. 17, no. 8, pp. 106-120, Aug. 2020, Doi:
10.23919/JCC.2020.08.009.
9. J. Zhang and Q. Zhang, "Comment on ā€œSecure and Lightweight Conditional Privacy-Preserving Authentication for
Securing Traffic Emergency Messages in VANETsā€,in IEEE Transactions on Information Forensics and Security,
vol. 18, pp. 1037-1038, 2023, Doi: 10.1109/TIFS.2021.3066277.
10. J. Zhang and Q. Zhang, "Comment on ā€œSecure and Lightweight Conditional Privacy-Preserving Authentication for
Securing Traffic Emergency Messages in VANETsā€,in IEEE Transactions on Information Forensics and Security,
vol. 18, pp. 1037-1038, 2023, Doi: 10.1109/TIFS.2021.3066277.
10-08-2023 Batch no : 13 19

More Related Content

Similar to First Review Final PPT.pdf for final years

Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
Ā 
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc NetworksReal-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc NetworksIJCNCJournal
Ā 
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc NetworksReal-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc NetworksIJCNCJournal
Ā 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd Iaetsd
Ā 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Ijcem Journal
Ā 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Ijcem Journal
Ā 
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...IJECEIAES
Ā 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
Ā 
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksCross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksIJCNCJournal
Ā 
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSCROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSIJCNCJournal
Ā 
LSKA-ID: A lightweight security and key agreement protocol based on an identi...
LSKA-ID: A lightweight security and key agreement protocol based on an identi...LSKA-ID: A lightweight security and key agreement protocol based on an identi...
LSKA-ID: A lightweight security and key agreement protocol based on an identi...TELKOMNIKA JOURNAL
Ā 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddvEditor Jacotech
Ā 
Augastiny_VANET advantages and disadvantages.pptx
Augastiny_VANET advantages and disadvantages.pptxAugastiny_VANET advantages and disadvantages.pptx
Augastiny_VANET advantages and disadvantages.pptxKNaveenKumarECE
Ā 
Multicast routing protocol for advanced vehicular ad hoc networks
Multicast routing protocol for advanced vehicular ad hoc networksMulticast routing protocol for advanced vehicular ad hoc networks
Multicast routing protocol for advanced vehicular ad hoc networksTELKOMNIKA JOURNAL
Ā 
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSDESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
Ā 
Reliable and efficient data dissemination scheme in VANET: a review
Reliable and efficient data dissemination scheme in VANET:  a review Reliable and efficient data dissemination scheme in VANET:  a review
Reliable and efficient data dissemination scheme in VANET: a review IJECEIAES
Ā 
Flexible handover solution for vehicular ad-hoc networks based on software de...
Flexible handover solution for vehicular ad-hoc networks based on software de...Flexible handover solution for vehicular ad-hoc networks based on software de...
Flexible handover solution for vehicular ad-hoc networks based on software de...IJECEIAES
Ā 
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...theijes
Ā 
Jb3515641568
Jb3515641568Jb3515641568
Jb3515641568IJERA Editor
Ā 

Similar to First Review Final PPT.pdf for final years (20)

Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Ā 
24 83-1-pb
24 83-1-pb24 83-1-pb
24 83-1-pb
Ā 
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc NetworksReal-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks
Ā 
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc NetworksReal-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks
Ā 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
Ā 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Ā 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Ā 
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...
Ā 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Ā 
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksCross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Ā 
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSCROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
Ā 
LSKA-ID: A lightweight security and key agreement protocol based on an identi...
LSKA-ID: A lightweight security and key agreement protocol based on an identi...LSKA-ID: A lightweight security and key agreement protocol based on an identi...
LSKA-ID: A lightweight security and key agreement protocol based on an identi...
Ā 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddv
Ā 
Augastiny_VANET advantages and disadvantages.pptx
Augastiny_VANET advantages and disadvantages.pptxAugastiny_VANET advantages and disadvantages.pptx
Augastiny_VANET advantages and disadvantages.pptx
Ā 
Multicast routing protocol for advanced vehicular ad hoc networks
Multicast routing protocol for advanced vehicular ad hoc networksMulticast routing protocol for advanced vehicular ad hoc networks
Multicast routing protocol for advanced vehicular ad hoc networks
Ā 
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSDESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
Ā 
Reliable and efficient data dissemination scheme in VANET: a review
Reliable and efficient data dissemination scheme in VANET:  a review Reliable and efficient data dissemination scheme in VANET:  a review
Reliable and efficient data dissemination scheme in VANET: a review
Ā 
Flexible handover solution for vehicular ad-hoc networks based on software de...
Flexible handover solution for vehicular ad-hoc networks based on software de...Flexible handover solution for vehicular ad-hoc networks based on software de...
Flexible handover solution for vehicular ad-hoc networks based on software de...
Ā 
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Ā 
Jb3515641568
Jb3515641568Jb3515641568
Jb3515641568
Ā 

Recently uploaded

Gross Anatomy and Histology of Tongue by Dr. Rabia Inam Gandapore.pptx
Gross Anatomy and Histology of Tongue by Dr. Rabia Inam Gandapore.pptxGross Anatomy and Histology of Tongue by Dr. Rabia Inam Gandapore.pptx
Gross Anatomy and Histology of Tongue by Dr. Rabia Inam Gandapore.pptxDr. Rabia Inam Gandapore
Ā 
Unveiling Alcohol Withdrawal Syndrome: exploring it's hidden depths
Unveiling Alcohol Withdrawal Syndrome: exploring it's hidden depthsUnveiling Alcohol Withdrawal Syndrome: exploring it's hidden depths
Unveiling Alcohol Withdrawal Syndrome: exploring it's hidden depthsYash Garg
Ā 
Connective Tissue II - Dr Muhammad Ali Rabbani - Medicose Academics
Connective Tissue II - Dr Muhammad Ali Rabbani - Medicose AcademicsConnective Tissue II - Dr Muhammad Ali Rabbani - Medicose Academics
Connective Tissue II - Dr Muhammad Ali Rabbani - Medicose AcademicsMedicoseAcademics
Ā 
VVIP Hadapsar ā„‚all Girls 6350482085 Scorching { Pune } Excellent Girl Serviā„‚e...
VVIP Hadapsar ā„‚all Girls 6350482085 Scorching { Pune } Excellent Girl Serviā„‚e...VVIP Hadapsar ā„‚all Girls 6350482085 Scorching { Pune } Excellent Girl Serviā„‚e...
VVIP Hadapsar ā„‚all Girls 6350482085 Scorching { Pune } Excellent Girl Serviā„‚e...dhyaansingh0898#S07
Ā 
Hemodialysis: Chapter 1, Physiological Principles of Hemodialysis - Dr.Gawad
Hemodialysis: Chapter 1, Physiological Principles of Hemodialysis - Dr.GawadHemodialysis: Chapter 1, Physiological Principles of Hemodialysis - Dr.Gawad
Hemodialysis: Chapter 1, Physiological Principles of Hemodialysis - Dr.GawadNephroTube - Dr.Gawad
Ā 
Sell pmk powder cas 28578-16-7 from pmk supplier Telegram +85297504341
Sell pmk powder cas 28578-16-7 from pmk supplier Telegram +85297504341Sell pmk powder cas 28578-16-7 from pmk supplier Telegram +85297504341
Sell pmk powder cas 28578-16-7 from pmk supplier Telegram +85297504341Sherrylee83
Ā 
TEST BANK for The Nursing Assistant Acute, Subacute, and Long-Term Care, 6th ...
TEST BANK for The Nursing Assistant Acute, Subacute, and Long-Term Care, 6th ...TEST BANK for The Nursing Assistant Acute, Subacute, and Long-Term Care, 6th ...
TEST BANK for The Nursing Assistant Acute, Subacute, and Long-Term Care, 6th ...marcuskenyatta275
Ā 
Unlocking Holistic Wellness: Addressing Depression, Mental Well-Being, and St...
Unlocking Holistic Wellness: Addressing Depression, Mental Well-Being, and St...Unlocking Holistic Wellness: Addressing Depression, Mental Well-Being, and St...
Unlocking Holistic Wellness: Addressing Depression, Mental Well-Being, and St...Health Kinesiology Natural Bioenergetics
Ā 
Renal Replacement Therapy in Acute Kidney Injury -time modality -Dr Ayman Se...
Renal Replacement Therapy in Acute Kidney Injury -time  modality -Dr Ayman Se...Renal Replacement Therapy in Acute Kidney Injury -time  modality -Dr Ayman Se...
Renal Replacement Therapy in Acute Kidney Injury -time modality -Dr Ayman Se...Ayman Seddik
Ā 
Sell 5cladba adbb JWH-018 5FADB in stock
Sell 5cladba adbb JWH-018 5FADB in stockSell 5cladba adbb JWH-018 5FADB in stock
Sell 5cladba adbb JWH-018 5FADB in stocktammysayles9
Ā 
DR. Neha Mehta Best Psychologist.in India
DR. Neha Mehta Best Psychologist.in IndiaDR. Neha Mehta Best Psychologist.in India
DR. Neha Mehta Best Psychologist.in IndiaNehamehta128467
Ā 
SEMESTER-V CHILD HEALTH NURSING-UNIT-1-INTRODUCTION.pdf
SEMESTER-V CHILD HEALTH NURSING-UNIT-1-INTRODUCTION.pdfSEMESTER-V CHILD HEALTH NURSING-UNIT-1-INTRODUCTION.pdf
SEMESTER-V CHILD HEALTH NURSING-UNIT-1-INTRODUCTION.pdfSachin Sharma
Ā 
Gallbladder Double-Diverticular: A Case Report Ų§Ł„Ł…Ų±Ų§Ų±Ų© Ł…Ų²ŲÆŁˆŲ¬Ų© Ų§Ł„ŲŖŲ¬: ŲŖŁ‚Ų±ŁŠŲ± Ų­Ų§Ł„Ų©
Gallbladder Double-Diverticular: A Case Report  Ų§Ł„Ł…Ų±Ų§Ų±Ų© Ł…Ų²ŲÆŁˆŲ¬Ų© Ų§Ł„ŲŖŲ¬: ŲŖŁ‚Ų±ŁŠŲ± Ų­Ų§Ł„Ų©Gallbladder Double-Diverticular: A Case Report  Ų§Ł„Ł…Ų±Ų§Ų±Ų© Ł…Ų²ŲÆŁˆŲ¬Ų© Ų§Ł„ŲŖŲ¬: ŲŖŁ‚Ų±ŁŠŲ± Ų­Ų§Ł„Ų©
Gallbladder Double-Diverticular: A Case Report Ų§Ł„Ł…Ų±Ų§Ų±Ų© Ł…Ų²ŲÆŁˆŲ¬Ų© Ų§Ł„ŲŖŲ¬: ŲŖŁ‚Ų±ŁŠŲ± Ų­Ų§Ł„Ų©Mohamad Ł…Ų­Ł…ŲÆ Al-Gailani Ų§Ł„ŁƒŁŠŁ„Ų§Ł†ŁŠ
Ā 
Get the best psychology treatment in Indore at Gokuldas Hospital
Get the best psychology treatment in Indore at Gokuldas HospitalGet the best psychology treatment in Indore at Gokuldas Hospital
Get the best psychology treatment in Indore at Gokuldas HospitalGokuldas Hospital
Ā 
ESC HF 2024 Spotlights Day-2.pptx heart failure
ESC HF 2024 Spotlights Day-2.pptx heart failureESC HF 2024 Spotlights Day-2.pptx heart failure
ESC HF 2024 Spotlights Day-2.pptx heart failuremahiavy26
Ā 
VIP Pune 7877925207 WhatsApp: Me All Time Serviā„‚e Available Day and Night
VIP Pune 7877925207 WhatsApp: Me All Time Serviā„‚e Available Day and NightVIP Pune 7877925207 WhatsApp: Me All Time Serviā„‚e Available Day and Night
VIP Pune 7877925207 WhatsApp: Me All Time Serviā„‚e Available Day and Nightpatanjali9823#S07
Ā 
Gait deviations in Transtibial prosthesis users
Gait deviations in Transtibial prosthesis usersGait deviations in Transtibial prosthesis users
Gait deviations in Transtibial prosthesis usersJoe Antony
Ā 
Report Back from SGO: Whatā€™s the Latest in Ovarian Cancer?
Report Back from SGO: Whatā€™s the Latest in Ovarian Cancer?Report Back from SGO: Whatā€™s the Latest in Ovarian Cancer?
Report Back from SGO: Whatā€™s the Latest in Ovarian Cancer?bkling
Ā 
Sonia Journal club presentation (2).pptx
Sonia Journal club presentation (2).pptxSonia Journal club presentation (2).pptx
Sonia Journal club presentation (2).pptxpalsonia139
Ā 
ROSE CASE SPINAL SBRT BY DR KANHU CHARAN PATRO
ROSE  CASE SPINAL SBRT BY DR KANHU CHARAN PATROROSE  CASE SPINAL SBRT BY DR KANHU CHARAN PATRO
ROSE CASE SPINAL SBRT BY DR KANHU CHARAN PATROKanhu Charan
Ā 

Recently uploaded (20)

Gross Anatomy and Histology of Tongue by Dr. Rabia Inam Gandapore.pptx
Gross Anatomy and Histology of Tongue by Dr. Rabia Inam Gandapore.pptxGross Anatomy and Histology of Tongue by Dr. Rabia Inam Gandapore.pptx
Gross Anatomy and Histology of Tongue by Dr. Rabia Inam Gandapore.pptx
Ā 
Unveiling Alcohol Withdrawal Syndrome: exploring it's hidden depths
Unveiling Alcohol Withdrawal Syndrome: exploring it's hidden depthsUnveiling Alcohol Withdrawal Syndrome: exploring it's hidden depths
Unveiling Alcohol Withdrawal Syndrome: exploring it's hidden depths
Ā 
Connective Tissue II - Dr Muhammad Ali Rabbani - Medicose Academics
Connective Tissue II - Dr Muhammad Ali Rabbani - Medicose AcademicsConnective Tissue II - Dr Muhammad Ali Rabbani - Medicose Academics
Connective Tissue II - Dr Muhammad Ali Rabbani - Medicose Academics
Ā 
VVIP Hadapsar ā„‚all Girls 6350482085 Scorching { Pune } Excellent Girl Serviā„‚e...
VVIP Hadapsar ā„‚all Girls 6350482085 Scorching { Pune } Excellent Girl Serviā„‚e...VVIP Hadapsar ā„‚all Girls 6350482085 Scorching { Pune } Excellent Girl Serviā„‚e...
VVIP Hadapsar ā„‚all Girls 6350482085 Scorching { Pune } Excellent Girl Serviā„‚e...
Ā 
Hemodialysis: Chapter 1, Physiological Principles of Hemodialysis - Dr.Gawad
Hemodialysis: Chapter 1, Physiological Principles of Hemodialysis - Dr.GawadHemodialysis: Chapter 1, Physiological Principles of Hemodialysis - Dr.Gawad
Hemodialysis: Chapter 1, Physiological Principles of Hemodialysis - Dr.Gawad
Ā 
Sell pmk powder cas 28578-16-7 from pmk supplier Telegram +85297504341
Sell pmk powder cas 28578-16-7 from pmk supplier Telegram +85297504341Sell pmk powder cas 28578-16-7 from pmk supplier Telegram +85297504341
Sell pmk powder cas 28578-16-7 from pmk supplier Telegram +85297504341
Ā 
TEST BANK for The Nursing Assistant Acute, Subacute, and Long-Term Care, 6th ...
TEST BANK for The Nursing Assistant Acute, Subacute, and Long-Term Care, 6th ...TEST BANK for The Nursing Assistant Acute, Subacute, and Long-Term Care, 6th ...
TEST BANK for The Nursing Assistant Acute, Subacute, and Long-Term Care, 6th ...
Ā 
Unlocking Holistic Wellness: Addressing Depression, Mental Well-Being, and St...
Unlocking Holistic Wellness: Addressing Depression, Mental Well-Being, and St...Unlocking Holistic Wellness: Addressing Depression, Mental Well-Being, and St...
Unlocking Holistic Wellness: Addressing Depression, Mental Well-Being, and St...
Ā 
Renal Replacement Therapy in Acute Kidney Injury -time modality -Dr Ayman Se...
Renal Replacement Therapy in Acute Kidney Injury -time  modality -Dr Ayman Se...Renal Replacement Therapy in Acute Kidney Injury -time  modality -Dr Ayman Se...
Renal Replacement Therapy in Acute Kidney Injury -time modality -Dr Ayman Se...
Ā 
Sell 5cladba adbb JWH-018 5FADB in stock
Sell 5cladba adbb JWH-018 5FADB in stockSell 5cladba adbb JWH-018 5FADB in stock
Sell 5cladba adbb JWH-018 5FADB in stock
Ā 
DR. Neha Mehta Best Psychologist.in India
DR. Neha Mehta Best Psychologist.in IndiaDR. Neha Mehta Best Psychologist.in India
DR. Neha Mehta Best Psychologist.in India
Ā 
SEMESTER-V CHILD HEALTH NURSING-UNIT-1-INTRODUCTION.pdf
SEMESTER-V CHILD HEALTH NURSING-UNIT-1-INTRODUCTION.pdfSEMESTER-V CHILD HEALTH NURSING-UNIT-1-INTRODUCTION.pdf
SEMESTER-V CHILD HEALTH NURSING-UNIT-1-INTRODUCTION.pdf
Ā 
Gallbladder Double-Diverticular: A Case Report Ų§Ł„Ł…Ų±Ų§Ų±Ų© Ł…Ų²ŲÆŁˆŲ¬Ų© Ų§Ł„ŲŖŲ¬: ŲŖŁ‚Ų±ŁŠŲ± Ų­Ų§Ł„Ų©
Gallbladder Double-Diverticular: A Case Report  Ų§Ł„Ł…Ų±Ų§Ų±Ų© Ł…Ų²ŲÆŁˆŲ¬Ų© Ų§Ł„ŲŖŲ¬: ŲŖŁ‚Ų±ŁŠŲ± Ų­Ų§Ł„Ų©Gallbladder Double-Diverticular: A Case Report  Ų§Ł„Ł…Ų±Ų§Ų±Ų© Ł…Ų²ŲÆŁˆŲ¬Ų© Ų§Ł„ŲŖŲ¬: ŲŖŁ‚Ų±ŁŠŲ± Ų­Ų§Ł„Ų©
Gallbladder Double-Diverticular: A Case Report Ų§Ł„Ł…Ų±Ų§Ų±Ų© Ł…Ų²ŲÆŁˆŲ¬Ų© Ų§Ł„ŲŖŲ¬: ŲŖŁ‚Ų±ŁŠŲ± Ų­Ų§Ł„Ų©
Ā 
Get the best psychology treatment in Indore at Gokuldas Hospital
Get the best psychology treatment in Indore at Gokuldas HospitalGet the best psychology treatment in Indore at Gokuldas Hospital
Get the best psychology treatment in Indore at Gokuldas Hospital
Ā 
ESC HF 2024 Spotlights Day-2.pptx heart failure
ESC HF 2024 Spotlights Day-2.pptx heart failureESC HF 2024 Spotlights Day-2.pptx heart failure
ESC HF 2024 Spotlights Day-2.pptx heart failure
Ā 
VIP Pune 7877925207 WhatsApp: Me All Time Serviā„‚e Available Day and Night
VIP Pune 7877925207 WhatsApp: Me All Time Serviā„‚e Available Day and NightVIP Pune 7877925207 WhatsApp: Me All Time Serviā„‚e Available Day and Night
VIP Pune 7877925207 WhatsApp: Me All Time Serviā„‚e Available Day and Night
Ā 
Gait deviations in Transtibial prosthesis users
Gait deviations in Transtibial prosthesis usersGait deviations in Transtibial prosthesis users
Gait deviations in Transtibial prosthesis users
Ā 
Report Back from SGO: Whatā€™s the Latest in Ovarian Cancer?
Report Back from SGO: Whatā€™s the Latest in Ovarian Cancer?Report Back from SGO: Whatā€™s the Latest in Ovarian Cancer?
Report Back from SGO: Whatā€™s the Latest in Ovarian Cancer?
Ā 
Sonia Journal club presentation (2).pptx
Sonia Journal club presentation (2).pptxSonia Journal club presentation (2).pptx
Sonia Journal club presentation (2).pptx
Ā 
ROSE CASE SPINAL SBRT BY DR KANHU CHARAN PATRO
ROSE  CASE SPINAL SBRT BY DR KANHU CHARAN PATROROSE  CASE SPINAL SBRT BY DR KANHU CHARAN PATRO
ROSE CASE SPINAL SBRT BY DR KANHU CHARAN PATRO
Ā 

First Review Final PPT.pdf for final years

  • 1. AN EFFICIENT PRIVACY PRESERVING AUTHENTICATION WITH INSIDER ATTACK RESISTANCE FOR VANET Presented by 1.SANJAY K (722820106116) 2.SARAN S (722820106121) 3.SOMANSANKARA P R (722820106134) 4.VISHNUPRASANTH B (722820106159) Guided by Mrs. A.Mohanapriya ASSISTANT PROFESSOR (M.E.,) DEPARTMENT OF ECE SRI ESHWAR COLLEGE OF ENGINEERING. 10-08-2023 1 Batch no : 13
  • 2. 10-08-2023 Batch no : 13 2 Presentation Outline ā€¢ Introduction ā€¢ Abstract ā€¢ Literature Survey ā€¢ Objective ā€¢ Block Diagram ā€¢ Expected Outcome ā€¢ Execution Plan ā€¢ References
  • 3. 10-08-2023 Batch no : 13 3 Introduction ā€¢ Vehicular Ad-Hoc Networks (VANETs) play a crucial role in enhancing road safety and traffic efficiency by enabling real-time vehicle communication. ā€¢ However, the nature of VANETs exposes them to various security risks, including privacy breaches and insider attacks. ā€¢ To address these challenges, we propose an efficient privacy-preserving authentication system tailored for VANETs. ā€¢ Our solution incorporates advanced techniques to safeguard user identities, ensuring confidentiality and thwarting insider threats for a secure VANET environment.
  • 4. 10-08-2023 Batch no : 13 4 Abstract ā€¢ Vehicular Ad-Hoc Networks (VANETs) are essential for improving traffic management and road safety by enabling vehicles to connect with each other and with roadside infrastructure. ā€¢ VANETs face security risks, including insider attacks, due to their openness and dynamic nature. ā€¢ The proposed research presents an efficient privacy-preserving authentication scheme with insider attack resistance for VANETs, utilizing clustering protocols and the BRFD algorithm. ā€¢ The research aims to build a more secure and efficient VANET ecosystem to encourage the widespread adoption of VANET technology for safer and more effective transportation networks.
  • 5. 10-08-2023 Batch no : 13 5 Literature Survey Paper Title Journal details Methodology Advantages/ Disadvantages 1.PairingFree Signatures with Insider Attack Resistance for Vehicular AdHoc Networks (VANETs) IEEE Access, vol. 9, pp. 159587-159597. Cryptographic operations measured using C MIRACL Core Cryptographic Library Advantages: It ensures message integrity, authentication, privacy, tracing, non-repudiation, and resistance to insider attacks Disadvantages: Limited Scalability, Increased Latency, Complexity of Revocation. 2. Comparative study on security and privacy issues in VANETs Cloud and IoTā€Based Vehicular Ad Hoc Networks (2021): 145-162. Geolocalization Abilities, Dedicated Short-Range Communication (DSRC), Low Motionlessness Necessities Advantages: It achieves security and privacy in VANETs. It enhances vehicle authentication time, collision rate, data transmission rate, and privacy preservation levels Disadvantages: Rapidly Evolving Technology, Availability of Data, Scope and Complexity
  • 6. 10-08-2023 Batch no : 13 6 Literature Survey Paper Title Journal details Methodology Advantages/ Disadvantages 3.Proven Secure Tree- Based Authenticated Key Agreement for Securing V2V and V2I Communications in VANETs IEEE Transactions on Mobile Computing, vol. 21, no. 9, pp. 3280-3297, 1 Sept. 2022, doi: 10.1109/TMC.2021.3 056712. V2V and V2I Communications, Full authentication mechanism, Light weight Cryptography mechanism Advantages: The outcome is proven secure, it has low computational and communication overhead Disadvantages: Scalability, Complexity, Infrastructure Dependence, Single Point of Failure. 4.Batch-Assisted Verification Scheme for Reducing Message Verification Delay of the Vehicular Ad Hoc Networks IEEE Internet of Things Journal, vol. 7, no. 9, pp. 8144- 8156, Sept. 2020, doi: 10.1109/JIOT.2020.3 004811 Dedicated Short Range Communication (DSRC) protocol, Collaborative authentication method. Advantages: It reduces verification delay and achieves fast message verification Disadvantages: Publication Bias, Rapidly Evolving Technology, Availability of Data, Scope and Complexity
  • 7. 10-08-2023 Batch no : 13 7 Literature Survey Paper Title Journal details Methodology Advantages/ Disadvantages 5.The Delay- Constrained and Network-Situation- Aware V2V2I VANET Data Offloading Based on the Multi-Access Edge Computing (MEC) Architecture, IEEE Open Journal of Vehicular Technology, vol. 1, pp. 331-347, 2020, doi: 10.1109/OJVT.2020. 3028684. MEC protocol Advantages: Ensures lifetime and quality of the V2V2I path to derive suitable offloading paths Disadvantages: Limited scope, Simplified assumptions, Lack of real-world validation 6.A novel cyberā€attack modelling and detection in overcurrent protection relays based on wavelet signature analysis. IET Generation, Transmission & Distribution (2023). Wavelet analysis,BRFD algorithm,NDN-VANET interconnection techniques Advantages: Detecting cyber attacks, reducing redundancy and improving packet satisfaction rate and delay Disadvantages: It does not provide a comprehensive analysis of all possible cyber threats and vulnerabilities in the smart grid
  • 8. 10-08-2023 Batch no : 13 8 Literature Survey Paper Title Journal details Methodology Advantages/ Disadvantages 7.A Survey of VANET/V2X Routing from the Perspective of Non-Learning- and Learning-Based Approaches IEEE Access, vol. 10, pp. 23022- 23050, 2022, Doi: 10.1109/ACCESS.2 022.3152767. V2X routing protocols Advantages: It delivers optimized packet delivery, handling congestion and shadowing effects, reducing network overhead Disadvantages: Potential limitation, Does not capture future protocols, a lack of coverage of innovative approaches 8.A receiver-forwarding decision scheme based on Bayesian for NDN- VANET, China Communications, vol. 17, no. 8, pp. 106-120, Aug. 2020, doi: 10.23919/JCC.2020. 08.009. Bayesian decision theory and the BRFD (Bayesian-based Receiver Forwarding Decision) scheme Advantages: Reducing redundancy and improving packet satisfaction rate and delay Disadvantages: It does not provide a comprehensive evaluation of the proposed BRFD scheme.
  • 9. 10-08-2023 Batch no : 13 9 Literature Survey Paper Title Journal details Methodology Advantages/ Disadvantages 9.Comment on Secure and Lightweight Conditional Privacy- Preserving Authentication for Securing Traffic Emergency Messages in VANETs IEEE Transactions on Information Forensics and Security, vol. 18, pp. 1037-1038, 2023, doi: 10.1109/TIFS.2021.3 066277 PPA (privacy-preserving authentication) protocol Advantages: The scheme does not satisfy conditional privacy and allows for the forging of valid signatures on arbitrary messages Disadvantages: Reliability and Availability, Privacy Concerns, Scalability, Security Vulnerabilities 10.R.S. State-of-the-art approach to clustering protocols in VANET: a survey Wireless Netw 26, 5307ā€“5336 (2020). https://doi.org/10.10 07/s11276-020- 02392-2. Clustering protocol,MAC protocol Advantages: Improved scalability and reliability Disadvantages: Communication overhead,limited clustered node percentage
  • 10. 10-08-2023 Batch no : 13 10 Objective ā€¢ Develop an efficient privacy-preserving authentication mechanism for VANETs. ā€¢ Implement insider attack resistance to safeguard the network from malicious insiders. ā€¢ Ensure secure communication and protect users' identities during VANET interactions. ā€¢ Employ advanced cryptographic techniques to enhance data confidentiality and integrity. ā€¢ Improve overall network security to mitigate potential threats and vulnerabilities.
  • 11. 10-08-2023 Batch no : 13 11 Flow Chart
  • 12. 10-08-2023 Batch no : 13 12 Explanation ā€¢ OBU Generates Signature Key and Requests TA to join. ā€¢ TA verifies the ID sent in the Signature Key by the OBUs. ā€¢ TA applies DSRC protocol and Clustering protocol for reducing delay and for increasing scalability. ā€¢ Further, TA Certifies the Signature Key and transmits to the OBU. ā€¢ OBU generates Signature message and transmits to the Destination Vehicle Vd. ā€¢ Vd verifies and access the message sent from the OBU.
  • 13. 10-08-2023 Batch no : 13 13 Software Details Software used: Ns-2(Network Simulator version 2) Language used: C++,Otcl script Software description: ā€¢ It is a discrete event simulator for networking research. ā€¢ It provides substantial support to simulate bunch of protocols like TCP, FTP, UDP, https and DSR ā€¢ It simulates wired and wireless network. ā€¢ It is primarily Unix based.5. Uses TCL as its scripting language.
  • 14. 10-08-2023 Batch no : 13 14 Methodology for the Proposed work Clustering protocol ā€¢ A clustering protocol can greatly enhance the scalability of vehicular ad hoc networks (VANETs). ā€¢ By organizing vehicles into clusters, reducing overhead, and improving overall network efficiency. Dedicated Short Range Communication (DSRC) protocol ā€¢ Dedicated Short Range Communication (DSRC) plays a significant role in decreasing communication delay in vehicular networks.
  • 15. 10-08-2023 Batch no : 13 15 Expected outcome or Results and Discussion ā€¢ The proposed efficient privacy-preserving authentication scheme with insider attack resistance for VANETs, leveraging a clustering protocol for better scalability. ā€¢ The DSRC algorithm for reduced delay, represents a significant step towards establishing secure and efficient vehicular communication systems. ā€¢ The future work based on the clustering protocol for scalability. ā€¢ The DSRC protocol for reduced delay in VANET authentication should aim to refine and expand these approaches to meet the evolving challenges and demands of real-world vehicular communication.
  • 16. 10-08-2023 Batch no : 13 16 Execution Plan ā€¢ First review - Algorithm to sort out our problem statement was discussed and finalized. ā€¢ Second review - Algorithm that is choosen will be implemented in the software to get the expected outcome. ā€¢ Final review - Expected outcome will be attained and results need to be verified.
  • 17. 10-08-2023 Batch no : 13 17 References 1. L. E. Funderburg, H. Ren and I. -Y. Lee, "Pairing-Free Signatures with Insider-Attack Resistance for Vehicular Ad-Hoc Networks (VANETs)," in IEEE Access, vol. 9, pp. 159587-159597, 2021, Doi: 10.1109/ACCESS.2021.3131189. 2. B T Rao, B. Tarakeswara, RSM Lakshmi Patibandla, and V. Lakshman Narayana. "Comparative study on security and privacy issues in VANETs." Cloud and IoTā€Based Vehicular Ad Hoc Networks (2021): 145-162. 3. L. Wei, J. Cui, H. Zhong, Y. Xu and L. Liu, "Proven Secure Tree-Based Authenticated Key Agreement for Securing V2V and V2I Communications in VANETs," in IEEE Transactions on Mobile Computing, vol. 21, no. 9, pp. 3280-3297, 1 Sept. 2022, Doi: 10.1109/TMC.2021.3056712. 4. F. Wu, X. Zhang, C. Zhang, X. Chen, W. Fan and Y. Liu, "Batch-Assisted Verification Scheme for Reducing Message Verification Delay of the Vehicular Ad Hoc Networks," in IEEE Internet of Things Journal, vol. 7, no. 9, pp. 8144-8156, Sept. 2020, Doi: 10.1109/JIOT.2020.3004811. 5. C. M. Huang and C. -F. Lai, "The Delay-Constrained and Network-Situation-Aware V2V2I VANET Data Offloading Based on the Multi-Access Edge Computing (MEC) Architecture," in IEEE Open Journal of Vehicular Technology, vol. 1, pp. 331-347, 2020, Doi: 10.1109/OJVT.2020.3028684 6. Yousefi kia, Mohammad, Mohsen Saniei, and Seyyed Ghodratollah Seifossadat. "A novel cyberā€attack modelling and detection in overcurrent protection relays based on wavelet signature analysis." IET Generation, Transmission & Distribution (2023).
  • 18. 10-08-2023 Batch no : 13 18 References 7. T. Chatterjee, R. Karmakar, G. Kaddoum, S. Chattopadhyay and S. Chakraborty, "A Survey of VANET/V2X Routing from the Perspective of Non-Learning- and Learning-Based Approaches," in IEEE Access, vol. 10, pp. 23022-23050, 2022, Doi: 10.1109/ACCESS.2022.3152767. 8. X. Guo, Y. Chen, L. Cao, D. Zhang and Y. Jiang, "A receiver-forwarding decision scheme based on Bayesian for NDN-VANET," in China Communications, vol. 17, no. 8, pp. 106-120, Aug. 2020, Doi: 10.23919/JCC.2020.08.009. 9. J. Zhang and Q. Zhang, "Comment on ā€œSecure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETsā€,in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 1037-1038, 2023, Doi: 10.1109/TIFS.2021.3066277. 10. J. Zhang and Q. Zhang, "Comment on ā€œSecure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETsā€,in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 1037-1038, 2023, Doi: 10.1109/TIFS.2021.3066277.