Impact Factor:6.549
 Scopus Suggested Journal: UNDER REVIEW for TITLE INCLUSSION

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary


Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

A Novel Security Protocol for VANET

B. Divya, Dr. Ch. Mallikarjuna Rao, , ,
Affiliations
Department of Computer Science and Engineering Gokaraju Rangaraju Institute of Engineering and Technology, Hyderabad, India
:10.22362/ijcert/2017/v4/i8/xxxx [UNDER PROCESS]


Abstract
Vehicular ad-hoc network (VANET) has recently received signi?cant considerations to enhance traf?c security and ef?ciency. Notwithstanding, correspondence trust, and client protection still present useful worries to the sending of VANET, either suffer from the substantial workload of downloading the latest denial list from a remote authority or can't enable drivers made a beeline to choose the dependability of a message when the verification on messages is unknown. In this paper, to cope with these challenging concerns, we propose a new verification convention for VANET in a decentralized group model by using a new group signature scheme. In the assistance of the new group signature scheme, the proposed verification convention is featured with threshold authentication, ef?cient revocation, unforgeability, anonymity, and traceability. Also, the assisting group signature scheme may also be of independent interest, as it is characterized by ef?cient traceability and message-linkability at the same time. Broad investigations show that our proposed edge mysterious validation convention is secure, and the veri?cation of messages among vehicles can be quickened by utilizing batch message preparing methods.


Citation
B. Divya, & Dr. Ch. Mallikarjuna Rao. (2017). A Novel Security Protocol for VANET. International Journal of Computer Engineering In Research Trends, 4(8), 330-335. Retrieved from http://ijcert.org/ems/ijcert_papers/V4I8003.pdf


Keywords : Vehicular ad-hoc networks (VANETs), conditional privacy, threshold authentication, group signature

References
[1] Jun Shao, Xiaodong Lin, “A threshold anonymous authentication protocol for valet”
[2] S. Dietzel, E. Schoch, B. K¨onings, M. Weber, and F. Kargl, “Resilient, secure aggregation for vehicular networks,” IEEE Network, vol. 24, no. 1, pp. 26–31, 2010. [Online]. Available: http://dx.doi.org/10.1109/ MNET.2010.5395780
 [3] “The car two car communication consortium,” http://www.car-to-car.org/.
[4] P. Papadimitratos, L. Butty´an, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J. Hubaux, “Secure vehicular communication systems: Design and architecture,” CoRR, vol. abs/0912.5391, 2009. [Online]. Available: http://arxiv.org/abs/0912.5391
 [5] G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik, “A practical and provably secure coalition-resistant group signature scheme,” in Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, 2000, pp. 255–270. [Online]. Available: http://dx.doi.org/10.1007/3-540-44598-6 16
 [6] J. Hubaux, S. Capkun, and J. Luo, “The security and privacy of smart vehicles,” IEEE Security & Privacy, vol. 2, no. 3, pp. 49–55, 2004. [Online]. Available: http://doi.ieeecomputersociety.org/10.1109/ MSP.2004.26
 [7] M. Raya and J. Hubaux, “Securing vehicular ad hoc networks,” Journal of Computer Security, vol. 15, no. 1, pp. 39–68, 2007. [Online]. Available: http://iospress.metapress.com/openurl.asp?genre= article&issn=0926-227X&volume=15&issue=1&spage=39
 [8] Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, “An ef?cient pseudonymous authentication scheme with strong privacy preservation for vehicular communications,” IEEE T. Vehicular Technology, vol. 59, no. 7, pp. 3589–3603, 2010. [Online]. Available: http: //dx.doi.org/10.1109/TVT.2010.2051468
 [9] X. Lin and X. Li, “Achieving ef?cient cooperative message authentication in vehicular ad hoc networks,” IEEE T. Vehicular Technology, vol. 62, no. 7, pp. 3339–3348, 2013. [Online]. Available: http://dx.doi.org/10.1109/TVT.2013.2257188 
[10] L. Wischhof, A. Ebner, and H. Rohling, “Information dissemination in self-organizing intervehicle networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 6, no. 1, pp. 90–101, 2005. [Online]. Available: http://dx.doi.org/10.1109/TITS.2004.842407
 [11] P. Golle, D. H. Greene, and J. Staddon, “Detecting and correcting malicious data in vanets,” in Proceedings of the First International Workshop on Vehicular Ad Hoc Networks, 2004, Philadelphia, PA, USA, October 1, 2004, 2004, pp. 29–37. [Online]. Available: http://doi.acm.org/10.1145/1023875.1023881
 [12] L. Zhang, Q. Wu, A. Solanas, and J. Domingo-Ferrer, “A scalable robust authentication protocol for secure vehicular communications,” IEEE T. Vehicular Technology, vol. 59, no. 4, pp. 1606–1617, 2010. [Online]. Available: http://dx.doi.org/10.1109/TVT.2009.2038222
[13] L. Chen, S. Ng, and G. Wang, “Threshold anonymous announcement in vanets,” IEEE Journal on Selected Areas in Communications, vol. 29, no. 3, pp. 605–615, 2011. [Online]. Available: http: //dx.doi.org/10.1109/JSAC.2011.110310
[14] U. S. D. of Transportation, “Dedicated short range communications,” http://www.its.dot.gov/DSRC/.
[15] D. Chaum and E. van Heyst, “Group signatures,” in Advances in Cryptology - EUROCRYPT ’91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings, 1991, pp. 257–265. [Online]. Available: http://dx.doi.org/10.1007/3-540-46416-6 22
[16] D. Boneh, X. Boyen, and H. Shacham, “Short group signatures,” in Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 1519, 2004, Proceedings, 2004, pp. 41–55. [Online]. Available: http://dx.doi.org/10.1007/978-3-540-28628-8 3
[17] Anusha.V,K.Sumalatha,” Mobile Social Networks for Flattering Unsigned Profile Matching ,” International Journal of Computer Engineering In Research Trends.,vol.1,no.6,pp. 384-390,2014.
[18] D.Ramanjaneyulu ,U.Usha Rani,” In Service-Oriented MSN Providing Trustworthy Service Evaluation,” International Journal of Computer Engineering In Research Trends.,vol.2,no.12,pp. 1192-1197,2015.
[19] Komal Patil, Geeta Mahajan, Disha Patil and Chitra Mahajan,” Implementation of Motion Model Using Vanet,” International Journal of Computer Engineering In Research Trends.,vol.3,no.4,pp. 179-182,2016.
[20] Pocha Nageswara Reddy, I.S.Raghuram, Dr.S.Prem Kumar,” Advance EMAP for Vehicular Ad Hoc Networks.” International Journal of Computer Engineering In Research Trends.,vol.1,no.4,pp. 253-258,2016. 


DOI Link : Not Yet Assigned

Download :
  V4I8003.pdf


Refbacks : There are currently no refbacks

Announcements


Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors. 

News & Events


Latest issue :Volume 10 Issue 1 Articles In press

A plagiarism check will be implemented for all the articles using world-renowned software. Turnitin.


Digital Object Identifier will be assigned for all the articles being published in the Journal from September 2016 issue, i.e. Volume 3, Issue 9, 2016.


IJCERT is a member of the prestigious.Each of the IJCERT articles has its unique DOI reference.
DOI Prefix : 10.22362/ijcert


IJCERT is member of The Publishers International Linking Association, Inc. (“PILA”)


Emerging Sources Citation Index (in process)


IJCERT title is under evaluation by Scopus.


Key Dates


☞   INVITING SUBMISSIONS FOR THE NEXT ISSUE :
☞   LAST DATE OF SUBMISSION : 31st March 2023
☞  SUBMISSION TO FIRST DECISION :
In 7 Days
☞  FINAL DECISION :
IN 3 WEEKS FROM THE DAY OF SUBMISSION

Important Announcements


All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.

Citation Index


Citations Indices All
Citations 1026
h-index 14
i10-index 20
Source: Google Scholar

Acceptance Rate (By Year)


Acceptance Rate (By Year)
Year Rate
2021 10.8%
2020 13.6%
2019 15.9%
2018 14.5%
2017 16.6%
2016 15.8%
2015 18.2%
2014 20.6%

Important Links



Conference Proposal




DOI:10.22362/ijcert