Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/333339
Title: Secure authentication mechanisms for vehicular AdHoc networks
Researcher: Jenefa J
Guide(s): Mary Anita EA
Keywords: Engineering and Technology
Computer Science
Telecommunications
Vehicular AdHoc Network
Authentication Mechanisms
Road Side Units
On Board Units
University: Anna University
Completed Date: 2020
Abstract: Vehicular Ad hoc Network VANET is a kind of Mobile Ad hoc Network MANET which allows the vehicles to communicate with one another as well as with nearby Road Side Units RSU and Trusted Authorities TA Vehicles communicate through On Board Units OBU in which privacy has to be assured to avoid the misuse of private data Due to the dynamic topology vehicular networks are prone to various attacks and hence security plays a vital role Authentication is the first step to achieve secure communication in vehicular networks Most of the existing authentication schemes have high overheads Hence secure identity based authentication schemes are proposed with less overhead Authentication scheme with pairing operations scheme without pairing operations and scheme using proxy vehicles are proposed with other security features These schemes establish secure Vehicle to RSU V2R RSU to Vehicle R2V and Vehicle to Vehicle V2V communications in vehicular networks In the authentication scheme using pairing operations ID Based Signature IBS and ID Based Online/Offline Signature IBOOS schemes are used for authentication purpose with bilinear pairings IBS is used to authenticate between vehicles and RSUs whereas IBOOS provides authentication among vehicles Cross RSU V2V communication provides authentication among vehicles under different RSUs Self generated Public Key Cryptography PKC based pseudo IDs are used instead of original IDs of vehicles for privacy preservation V2V authentication without RSUs is also established by using RSA algorithm which is used during temporary RSU failures and emergency situations It also provides privacy preservation non repudiation in addition to authentication and ensures security against attacks based on authentication by isolating attacking nodes from the network newline
Pagination: xx,157p.
URI: http://hdl.handle.net/10603/333339
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File25.68 kBAdobe PDFView/Open
02_certificates.pdf431.78 kBAdobe PDFView/Open
03_abstracts.pdf9.3 kBAdobe PDFView/Open
04_acknowledgements.pdf254.53 kBAdobe PDFView/Open
05_contents.pdf197.14 kBAdobe PDFView/Open
06_listoftables.pdf26.69 kBAdobe PDFView/Open
07_listoffigures.pdf15.24 kBAdobe PDFView/Open
08_listofabbreviations.pdf6.07 kBAdobe PDFView/Open
09_chapter1.pdf451.1 kBAdobe PDFView/Open
10_chapter2.pdf497.44 kBAdobe PDFView/Open
11_chapter3.pdf607.09 kBAdobe PDFView/Open
12_chapter4.pdf753.17 kBAdobe PDFView/Open
13_chapter5.pdf1.12 MBAdobe PDFView/Open
14_chapter6.pdf443.78 kBAdobe PDFView/Open
15_conclusion.pdf26.22 kBAdobe PDFView/Open
16_references.pdf321.74 kBAdobe PDFView/Open
17_listofpublications.pdf107.03 kBAdobe PDFView/Open
80_recommendation.pdf148.68 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: