CFP last date
22 April 2024
Reseach Article

Security and Privacy in VANET to reduce Authentication Overhead for Rapid Roaming Networks

by Surabhi Mahajan, Alka Jindal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 20
Year of Publication: 2010
Authors: Surabhi Mahajan, Alka Jindal
10.5120/428-631

Surabhi Mahajan, Alka Jindal . Security and Privacy in VANET to reduce Authentication Overhead for Rapid Roaming Networks. International Journal of Computer Applications. 1, 20 ( February 2010), 17-21. DOI=10.5120/428-631

@article{ 10.5120/428-631,
author = { Surabhi Mahajan, Alka Jindal },
title = { Security and Privacy in VANET to reduce Authentication Overhead for Rapid Roaming Networks },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 20 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 17-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number20/428-631/ },
doi = { 10.5120/428-631 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:47:05.858051+05:30
%A Surabhi Mahajan
%A Alka Jindal
%T Security and Privacy in VANET to reduce Authentication Overhead for Rapid Roaming Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 20
%P 17-21
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Since the last few years VANET have received increased attention as the potential technology to enhance active and preventive safety on the road, as well as travel comfort. Security and privacy are indispensable in vehicular communications for successful acceptance and deployment of such a technology. Generally, attacks cause anomalies to the network functionality. A secure VANET system, while exchanging information should protect the system against unauthorized message injection, message alteration, eavesdropping. In this paper, various security and privacy issues and challenges are discussed. The various authentication schemes in wireless LAN, VANETS are discussed. Out of various authentication schemes that are used to reduce the overhead in authentication, when roaming - proxy re- encryption scheme and new proxy re encryption scheme is reviewed in detail. A comparison between the two schemes is done, which shows that the privacy can be maintained better by using new proxy re encryption.

References
  1. T. Leinmu ¨ ller, C. Maiho ¨ fer, E. Schoch, F. Kargl, “Improved security in geographic ad hoc routing through autonomous position veri?cation”, in: Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks, Los Angeles, USA, 2006, pp. 57–66.
  2. T. Leinmu ¨ ller, E. Schoch, F. Karql, “Position veri?cation approaches for vehicular ad hoc networks”, IEEE Wireless Communications 13 (5) (2006) 16–21.
  3. Review Article- “Routing in Vehicular Networks: Feasibility,Modeling, and Security” Ioannis Broustis andMichalis Faloutsos Department of Computer Science and Engineering, University of California -Riverside, Riverside, CA 92521, USA Correspondence should be addressed to Broustis Ioannis, <script language="JavaScript" type="text/javascript"> <!-- var prefix = 'm&#97;&#105;lt&#111;:'; var suffix = ''; var attribs = ''; var path = 'hr' + 'ef' + '='; var addy66077 = 'br&#111;&#117;st&#105;
  4. M. Raya, J.-P. Hubaux, “Securing vehicular ad hoc networks”, Journal of Computer Security 15 (1) (2007) 39–68. Special issue on Security of Ad Hoc and Sensor Networks
  5. J.-S. Leu, R.-H. Lai, H.-I. Lin, and W.-K. Shih. “Running cellular/PWLAN services: practical considerations for cellular/PWLAN architecture supporting interoperator roaming”. IEEE Communications Magazine, 44(2):73–84, 2006
  6. K. Plossl, T. Nowey, C. Mletzko, “Towards a security architecture for vehicular ad hoc networks”, in: The First International Conference on Availability, Reliability and Security, 2006.
  7. M. Raya, J.P. Hubaux, “Security aspects of inter-vehicle communications”, in: Proceedings of the 5th Swiss Transport Research Conference (STRC 2005), Ascona, Switzerland, 2005
  8. Ran Cantee , Susan Honenberger “Chosen Ciphertext secure Proxy “reencryption in CCS’07, October 29–November 2, 2007, Alexandria, Virginia, USA. Copyright 2007 ACM 978-1-59593-703-2/07/0010
  9. O. Dousse, P. Thiran, and M. Hasler, “Connectivity in ad hoc and hybrid networks,” in Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM ’02), vol. 2, pp. 1079–1088, New York, NY, USA, June 2002.
  10. W. Wang and I. Akyildiz.” A New Signaling Protocol for Intersystem Roaming in Next-Generation Wireless Systems”. IEEE Journal on Selected Areas in Communications (JSAC), 19(10):2040–2052, October 2001.
  11. F. Bari and J.-L. Bouthemy. “An aaa based service customization framework for public wlans”. In WCNC, 2005.
  12. G. Association. ”WLAN Roaming Guidelines”. Of?cial DocumentIR.61,http://www.gsmworld.com/documents/wlan/ir61.pd Aug. 2004.
  13. S. Eichler, F. Dotzer, C. Schwingenschlogl, F.J.F. Caro, J. Eberspacher, “Secure routing in a vehicular ad hoc network”, in: IEEE 60th Vehicular Technology Conference, 2004, pp. 3339–3343.
  14. C. Rigney, S. Willens, A. Rubens, and W. Simpson. “Remote authentication dial in user service (radius)”, 2000.
  15. Matt Blaze, G. Bleumer, and M. Strauss, “Divertible protocols and atomic proxy cryptography” . In Eurocrypt 1998, LNCS 1403, pp 127- 144, 1998.
  16. Xiaonan Liu, Zhiyi Fang, Lijun Shi. “Securing Vehicular Ad Hoc Networks”, School of Computer Science and Technology, Jilin University Changchun, 130012, P.R China Lxn6O2@sina. com, zyfang@public. ccjl. Cn
  17. Jun Liu, Xiaoyan Hong, Qunwei Zheng, Lei Tang “Privacy-Preserving Quick Authentication in Fast Roaming Networks” Department of Computer Science, University of Alabama, Tuscaloosa, AL 35487 {jliu,hxy,qzheng,ltang}@cs.ua.edu
Index Terms

Computer Science
Information Sciences

Keywords

Non- frame ability Identity privacy Location Privacy delegators