Preview

Group Key Technique And Co-Operative Message Authentication In VANET Analysis

Good Essays
Open Document
Open Document
1582 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Group Key Technique And Co-Operative Message Authentication In VANET Analysis
A Group Key Technique and Co-operative Message Authentication in VANET

#1.Jayanth S, #2.Saravanan I S and #3.Kapilavani R K

Abstract- Amongst many different communication paradigms, Vehicular ad hoc networks (VANET’s) are an area of developing techniques. It has become an upcoming technology of this modern world in vehicular communications. The main reason of using VANET is to exchange live messages regarding traffic congestions. A Trusted authority (TA) is designed to provide authentication services for users and managing keys of several users. Like in any other networks in VANET also there is a necessity to maintain authentication and confidentiality among the users. To authenticate the users the authority classifies users into primary,
…show more content…
The first is V2V (vehicle to vehicle) type in which a vehicle user communicates with another directly which is the purest form of infrastructure-less characteristic of ad hoc networks. The other is V2R (vehicle to RSU) type where a vehicle communicates with RSU which is a fixed infrastructure. These vehicles communicate using the Dedicated Short Range Communication (DSRC) protocol [3]. The RSU, OBU and TA communicate using this protocol which is based on the IEEE 802.11p radio technology. The vehicles can access the wireless channel either using a directional antenna or a unidirectional antenna. Because of this wireless access VANETs are vulnerable to many attacks due to collision, eavesdropping, interference, jamming and other problems. To avoid these attacks only we introduce a concept of security in VANET. The intention of providing security is to maintain confidentiality among users by grouping them together and to efficiently provide authentication services. In many literature systems all the authentication services, key storage and updating services are performed by the authority. This imposes a huge overhead on the authority. Also this situation results in a scenario where it becomes easier to an attacker to attack only the authority end and collapse the whole system. It is inefficient if the authority is attacked that results to handing over the control to an attacker. This issue must be …show more content…
TA possesses computational, communicational and storage capabilities compared to other RSUs and OBUs in the network.

III. SYSTEM MODEL
The System model that depicts the proposed system is demonstrated in Fig.1. Fig.1. System Model Trusted Authority (TA): TA takes the responsibility of providing authentication of the users, manage and store the keys for encrypt and decrypt the message shared amongst the VANET users. It is also responsible for registering the users and storing their information that is used later to authenticate them by verifying the stored credentials.
Road Side Units (RSUs): RSU’s are the fixed infrastructures that can capable of routing message from TA and OBUs and vice versa. RSUs are connected with the TA in a secure wired connection and are managed, monitored by the TA.
On Board Unit: Each user in the VANET contains an OBU that is embedded inside their vehicle. The OBU consists of Tamper Proof Device (TPD), vehicle sensors like GPS, DSRC medium, Event Data Recorder (EDR),decision making agent, fuzzy rule base and inference engine.
IV. ATTACKS Since all the communication between vehicles and RSUs happen through an open wireless channel, there are many kinds of attacks possible. Listed below are some of the possible

You May Also Find These Documents Helpful

  • Best Essays

    Falk, M. (2004). “Fast and Secure Roaming in WLAN”, Department of Computer and Information Science.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    A protocol data unit (PDU) is an open-system interconnection (OSI) term used in telecommunications that refers to a group of information added or removed by a layer of the OSI model. Each layer in the model uses the PDU to communicate and exchange information, which can only be read by the peer layer on the receiving device and is then handed over to next upper layer after stripping.…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    ISSC361 FinalProject

    • 1124 Words
    • 4 Pages

    Manufacturers are incorporating more and more computers into automobiles. This causes a new type of threat to today’s society. Challenges come to protecting these systems and the people that are driving the vehicles.…

    • 1124 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Each stakeholder that is accessing the network in addition to their user id and password will be assigned a RSA secure id token. This token changes its six digit login pin every 15 to 30 seconds. In an event that someone’s user id and password is compromised they would also need the secure id in order to access the network. Next Riordan administrative team will force users to use a static IP address. This static IP address will have one IP address for each user. Ultimately this will allow the administrative team to trust that IP address through the firewall ports. In addition to our multi-layers of defense that we have established with the use of user ids and passwords, RSA secure id’s, and static IP addresses we will have certain information accessed only through special request. The stakeholder will have to obtain a special digital certificate to access a certain level of databases. An example may be seen in finance, in order to access the finance database the stakeholder accessing information through the use of mobile access will have to gain special digital certificates in order to be granted pass the…

    • 1434 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Various authentication methods are used and range from the simple to complex. The security level provided will vary depending on the utilized technique and deployment method. The most dominant method involves authentication with a password and username. However, this is also one of the most insecure methods. We can describe these devices and systems depending on the three factors:…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Assess and design proper authentication methods for RADIUS and TACACs+ authentication servers deployments as well as IEEE 802.11 WLAN infrastructures…

    • 858 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Bs311 Unit 3 Essay

    • 3508 Words
    • 15 Pages

    Designing secure key distribution in an ad-hoc network might be an extremely hard task. Any reliance on a certificate of authority is not trivial at all, for the same reasons that reliance in any centralized authority is problematic. Additional problems include the increased packet sizes required by authentication extensions, unicast/multicast routing, Quality of Service support and power aware routing. Furthermore, due to the limited transmission range of wireless network interfaces, multiple hops may be needed to exchange data between nodes in the network (c.f.…

    • 3508 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    Self-Driving Cars

    • 3778 Words
    • 16 Pages

    CNN report, “Could Hackers Seize Control Of Our Nation’s Cars?” Driverless Car HQ, 2012, Web.…

    • 3778 Words
    • 16 Pages
    Better Essays
  • Satisfactory Essays

    Wlan Security Threats

    • 373 Words
    • 2 Pages

    To prevent these threats from happening, you should follow the 802.11 core security standards, which provides protection between the wireless access point and the wireless host. This protection includes confidentiality, authentication, and message integrity. A drive-by hacker cannot intercept traffic to read it or send its own messages to the access points. But since this protection isn’t provided from end-to-end, you should also use 802.11i security protection, which uses extremely strong AES-CCMP encryption. It has a 128-bit key encryption and a key management method for automatically changing keys. It uses the strongest security algorithms, so it…

    • 373 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Driverless cars are autonomous vehicles that can control and navigating the vehicle. Environmental scientists prefer them as they use the precise amount of fuel for a trip. Driverless cars reduce traffic congestions tremendously, each car can communicate with other nearby vehicles creating an undisturbed flow of traffic. However, hacking is a significant drawback for driverless cars, a passenger’s privacy and safety is at risk if the vehicle is…

    • 238 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security measure would cover the detection of intrusions, unauthorized usage, authentication, hashing, digital certification, updated security software, network security, hacking prevention, phishing prevention and encryption K.W. Ross, J. K. (2012). There are many risks, threats, and vulnerabilities with online access and usage of the internet, regardless if wired or wireless and all should be secured. Wireless devices communicate through radio without a connection to anything physical Radack, S. (n.d.). The wireless device may be a cell phone, laptop, local area network, remote controls, stereos, personal network, microphones, a headphone, IPad, IPod, etc. It is important to secure the access points because the system may be compromised by unauthorized persons for theft, or other risk factors. The internet could be used by someone unknown, without the user’s permission or knowledge and simply to commit crimes using the user’s credentials. This report will show the importance of securing a wireless system and why it is important.…

    • 1936 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Cell Phone

    • 1832 Words
    • 8 Pages

    Levi 7 United States of Transportation. Natl. Highway Traffic Safety Administration. “An Investigation of the Safety Implications of Wireless Communications in Vehicles.” Natl. Highway Traffic Safety Administration, Nov. 1999. Web. 12 Mar. 2001.…

    • 1832 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    The project “GSM BASED VEHICLE THEFT CONTROL SYSTEM” deals with the design & development of a theft control system for automobiles which is being used to prevent / control the theft of a vehicle. The developed system makes use of an embedded system based on GSM technology. An interfacing mobile is also connected to the microcontroller, which is in turn, connected to the engine.…

    • 2659 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    These units have various sensors such as GPS and odometers which ensure that the information is precise, including in tunnels and built-up urban areas.…

    • 954 Words
    • 4 Pages
    Satisfactory Essays