Providing Authentication and Access Control in Vehicular Network Environment
نویسندگان
چکیده
In this paper we make use of the recent advances in 802.11 technologies and the new perspectives for ad hoc networks to provide a novel architecture for Inter-Vehicular communication on highways. This architecture provides authentication and access control for mobile clients on highways and ensures network transparency to mobile clients in their vehicles. We propose an integrated solution considering the service provider as the core entity for all authentication and access control operations. We develop an AAA (Authentication, Authorization, and Accounting) mechanism to authenticate mobile clients with respect to service providers authorizing them to services' access, and ensuring a confidential data transfer between each communicating parties. Our mechanism adapts 802.11i standard to the vehicular environment setting up secure links, in layer 2, that guarantee confidential data transfer. To achieve a reliable transfer, we propose a routing approach based on the Optimized Link State Routing (OLSR) protocol that is expected to provide a reliable routing infrastructure in such a hybrid scalable wireless environment. Also, we present a simple and appropriate scheme for assigning IP addresses to mobile clients. Finally, we give a brief analysis and discuss the advantages and limitations of the proposed architecture.
منابع مشابه
A Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملCooperation in Autonomous Vehicular Networks
$EVWUDFW2 Vehicular networks are promising in providing Vehicle-to-Infrastructure (V2I) and Vehicle-to-Vehicle (V2V) communication, thus allowing for several useful services on roads related to safety applications as well as entertainment applications. However, a number of constraints can impact the reliability of vehicular networks applications. The general constraints concern the high mobilit...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006