Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/333339
Title: | Secure authentication mechanisms for vehicular AdHoc networks |
Researcher: | Jenefa J |
Guide(s): | Mary Anita EA |
Keywords: | Engineering and Technology Computer Science Telecommunications Vehicular AdHoc Network Authentication Mechanisms Road Side Units On Board Units |
University: | Anna University |
Completed Date: | 2020 |
Abstract: | Vehicular Ad hoc Network VANET is a kind of Mobile Ad hoc Network MANET which allows the vehicles to communicate with one another as well as with nearby Road Side Units RSU and Trusted Authorities TA Vehicles communicate through On Board Units OBU in which privacy has to be assured to avoid the misuse of private data Due to the dynamic topology vehicular networks are prone to various attacks and hence security plays a vital role Authentication is the first step to achieve secure communication in vehicular networks Most of the existing authentication schemes have high overheads Hence secure identity based authentication schemes are proposed with less overhead Authentication scheme with pairing operations scheme without pairing operations and scheme using proxy vehicles are proposed with other security features These schemes establish secure Vehicle to RSU V2R RSU to Vehicle R2V and Vehicle to Vehicle V2V communications in vehicular networks In the authentication scheme using pairing operations ID Based Signature IBS and ID Based Online/Offline Signature IBOOS schemes are used for authentication purpose with bilinear pairings IBS is used to authenticate between vehicles and RSUs whereas IBOOS provides authentication among vehicles Cross RSU V2V communication provides authentication among vehicles under different RSUs Self generated Public Key Cryptography PKC based pseudo IDs are used instead of original IDs of vehicles for privacy preservation V2V authentication without RSUs is also established by using RSA algorithm which is used during temporary RSU failures and emergency situations It also provides privacy preservation non repudiation in addition to authentication and ensures security against attacks based on authentication by isolating attacking nodes from the network newline |
Pagination: | xx,157p. |
URI: | http://hdl.handle.net/10603/333339 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 25.68 kB | Adobe PDF | View/Open |
02_certificates.pdf | 431.78 kB | Adobe PDF | View/Open | |
03_abstracts.pdf | 9.3 kB | Adobe PDF | View/Open | |
04_acknowledgements.pdf | 254.53 kB | Adobe PDF | View/Open | |
05_contents.pdf | 197.14 kB | Adobe PDF | View/Open | |
06_listoftables.pdf | 26.69 kB | Adobe PDF | View/Open | |
07_listoffigures.pdf | 15.24 kB | Adobe PDF | View/Open | |
08_listofabbreviations.pdf | 6.07 kB | Adobe PDF | View/Open | |
09_chapter1.pdf | 451.1 kB | Adobe PDF | View/Open | |
10_chapter2.pdf | 497.44 kB | Adobe PDF | View/Open | |
11_chapter3.pdf | 607.09 kB | Adobe PDF | View/Open | |
12_chapter4.pdf | 753.17 kB | Adobe PDF | View/Open | |
13_chapter5.pdf | 1.12 MB | Adobe PDF | View/Open | |
14_chapter6.pdf | 443.78 kB | Adobe PDF | View/Open | |
15_conclusion.pdf | 26.22 kB | Adobe PDF | View/Open | |
16_references.pdf | 321.74 kB | Adobe PDF | View/Open | |
17_listofpublications.pdf | 107.03 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 148.68 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: