Redirigiendo al acceso original de articulo en 18 segundos...
ARTÍCULO
TITULO

CLUSTER BASED AUTHENTICATION FOR VANET FOR IMPROVING THE SECURITY

Neelambike S    
Parashuram Baraki    

Resumen

In Vehicular Ad Hoc Networks (VANET), vehicles communicate with another vehicle and also communicate with infrastructure (RSU) points by broadcasting safety and non-safety messages in the network by using the DSRC. In wireless communication, security and privacy are very important issues to avoid threat in the network. Cluster based vehicle to vehicle (V2V) communication scheme is proposed here which prevents vehicle from threat. To achieve security and privacy goals, we propose one time authentication for group and then V2V communication is done using group symmetric key within group. Our scheme satisfies all security and privacy requirements such as authentication, non-repudiation and con- ditional traceability. In case of malicious activity, this scheme can trace malicious vehicle which generates a false message. Computation and communication cost is improved as compared and analyzed with other previous schemes.

 Artículos similares

       
 
Kexiang Qian, Hongyu Yang, Ruyu Li, Weizhe Chen, Xi Luo and Lihua Yin    
With the rapid growth of IoT devices, the threat of botnets is becoming increasingly worrying. There are more and more intelligent detection solutions for botnets that have been proposed with the development of artificial intelligence. However, due to th... ver más
Revista: Applied Sciences

 
Marat Satayev, Abdugani Azimov, Gani Iztleuov and Lazzat Satayeva    
The aim of this work is to develop an adsorber with a fixed bed of adsorbent and a mathematical model of the adsorption bed. On the basis of the theory of fractal clusters, an equation for calculating the layer porosity that takes into account the averag... ver más
Revista: Water

 
Bahaa Yamany, Mahmoud Said Elsayed, Anca D. Jurcut, Nashwa Abdelbaki and Marianne A. Azer    
Ransomware is a type of malicious software that encrypts a victim?s files and demands payment in exchange for the decryption key. It is a rapidly growing and evolving threat that has caused significant damage and disruption to individuals and organizatio... ver más
Revista: Information

 
Luca M. Ofiera, Purnendu Bose and Christian Kazner    
Constructed wetlands are a versatile technology for various treatment approaches, especially in emerging countries. The research aims to study and optimize the hybridizing process of a vertical subsurface flow constructed wetland with adsorption technolo... ver más
Revista: Water

 
Jose Luis Vieira Sobrinho, Flavio Henrique Teles Vieira and Alisson Assis Cardoso    
The high dimensionality of real-life datasets is one of the biggest challenges in the machine learning field. Due to the increased need for computational resources, the higher the dimension of the input data is, the more difficult the learning task will ... ver más
Revista: Applied Sciences