TARI: Meeting Delay Requirements in VANETs with Efficient Authentication and Revocation
نویسندگان
چکیده
VANET based information systems have considerable promise for improving traffic safety, reducing congestion and increasing environmental efficiency of transportation systems. However, the potential of these systems will not be realized until the issue of network security is fully resolved. In this paper, we introduce a security scheme called Temporary Authentication and Revocation Indicator for VANETs. Using analytical and simulation based analyses, we examine the timing delay incurred by TARI and other security metrics. We demonstrate that TARI is efficient enough to be deployed in safety critical VANET applications and can scale to dense networks with many vehicles competing for broadcast air-time.
منابع مشابه
ECPB: Efficient Conditional Privacy-Preserving Authentication Scheme Supporting Batch Verification for VANETs
In this paper, we introduce an efficient Conditional Privacy-Preserving authentication scheme(ECPB) based on group signature for vehicular ad hoc networks (VANETs). Although group signature is widely used in VANETs for security requirements, the existing schemes based on group signatures suffer longer computational delays in the certificate revocation list (CRL) checking and in the signature ve...
متن کاملQuick Message Authentication Protocol for Vehicular AD HOC Networks
Public Key Infrastructure (PKI) plays very important role in Vehicular Ad hoc Networks (VANETs). In this system; confirmation of received message can be done by checking the sender’s certificate is included in the Certificate Revocation Lists (CRLs), which means checking its revocation status, then, substantiating the sender’s certificate, and finally validating the sender’s signature. Since th...
متن کاملNon line of Sight Location Verification in EMAP for Vehicular Ad Hoc Networks
The security in VANETs is improvised with the involvement of Public Key Infrastructure (PKI) and Certificate Revocation List (CRL) through message authentication and the data transmissions are improved through NLOS. The direct communications between vehicles are blocked with interference of obstacles like trucks, buildings. These problems are overcome through NLOS conditions such as location ve...
متن کاملBroadcasting Message Authentication Protocol for Vehicular Ad Hoc Networks Using Cluster Technique
It is well recognized that security plays a vital for the trustworthy operation of vehicular ad hoc networks (VANETs). One of the critical sanctuary issues is the revocation of misbehaving vehicles, which is essential for the prevention of malicious vehicles from other vehicles. Vehicular ad hoc networks (VANETs) adopt the Public Key infrastructure (PKI) and Certificate Revocation Lists (CRLs) ...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009