Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Augmenting Security for Identity-based Batch Verification Scheme using TDMA based MAC Protocol in VANET

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Sakshi Sharma, Naveen Bilandi

Sakshi Sharma and Naveen Bilandi. Augmenting Security for Identity-based Batch Verification Scheme using TDMA based MAC Protocol in VANET. International Journal of Computer Applications 162(9):1-9, March 2017. BibTeX

	author = {Sakshi Sharma and Naveen Bilandi},
	title = {Augmenting Security for Identity-based Batch Verification Scheme using TDMA based MAC Protocol in VANET},
	journal = {International Journal of Computer Applications},
	issue_date = {March 2017},
	volume = {162},
	number = {9},
	month = {Mar},
	year = {2017},
	issn = {0975-8887},
	pages = {1-9},
	numpages = {9},
	url = {},
	doi = {10.5120/ijca2017913355},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Vehicular Ad hoc Networks (VANETs) have been developed as a stage to maneuver down perceptive between vehicle correspondences and to enhance visitor's wellbeing and fulfillment. Despite the fact that VANETs have picked up the consideration of today's examination endeavors, yet the present answers for a complete secure VANET and to shield the system from enemy and assaults are still insufficient attractive. The current paper contains the different existing procedures of security issues through which it has been observed that the existing IBV scheme has not focused much upon network performance. The proposed scheme provides a proficient arrangement by combining Identity based batch Verification scheme with VeMAC Protocol, with aim to decrease the transmission collision that occurs because of the node mobility on channel. The results of proposed scheme prove that it is outperforming the other existing related schemes.


  1. Zhu, X., Jiang, S., Wang, L., and Li, H. (2014) “Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks,” IEEE Transactions On Vehicular Technology, Vol. 63, No.2, pp. 907 – 919.
  2. Hafeez, K.A., Zhao, L., Ma, B. and Mark, J.W. (2013) „Performance Analysis and Enhancement of the DSRC for VANET‟s Safety Applications,” IEEE Transactions on Vehicular Technology, Vol. 62, No. 7, pp. 3069-3083.
  3. Varshney, N., Roy, T. and Chaudhary, N. (2014) “Security Protocol for VANET by Using Digital Certification to Provide Security with Low Bandwidth,” International Conference on Communication and Signal Processing, IEEE, pp. 768-772.
  4. Chim, T.W., Yiu, S.M., Hui, L.C.K. and Li, V.O.K. (2011) “SPECS: Secure and privacy enhancing communications schemes for VANETs,” Attribution 3.0 Hong Kong License, Vol. 9, No. 2, pp.189-203.
  5. Zhu , H., Lin, X., Lu, R. and Ho, P.H. and Shen, X(Sherman). (2008) “AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks,” IEEE Communications Society subject matter experts for publication in the ICC 2008 proceedings, pp.1436-1440.
  6. Zhang, C., Lin, X., Lu, R., Ho, P.H. and Shen, X(Sherman). (2008) “An Efficient Message Authentication Scheme for Vehicular Communications,” IEEE Transactions on Vehicular Technology, Vol. 57, No. 6, pp. 3357-3368.
  7. Lee, C.C. and Lai, Y. M. (2013) “Toward a secure batch verification with group testing for VANET,” Wireless Networks, Vol. 19, No. 6, pp.1441-1449.
  8. Zhou, A., Li, J., Sun, Q., Fan, C., Lei, T. and Yang, F. (2015) “A security authentication method based on trust evaluation in VANETs,” EURASIP Journal on Wireless Communications and Networking, Vol. 1, pp. 1-8.
  9. Tzeng, S.F., Horng, S.J. , Li, T., Wang, X., Huang, P. H. and Khan, M. K. (2015) “Enhancing Security and Privacy for Identity-based Batch Verification Scheme in VANET,” IEEE Transaction on Vehicular Technology, Vol. 99.
  10. Omar, H.A., Zhuang, W. and Li, L. (2013) “VeMAC: A TDMA-Based MAC Protocol for Reliable Broadcast in VANETs,” IEEE Transactions On Mobile Computing, Vol. 12, No. 9, pp. 1724-1736.
  11. Hadded, M., Zagrouba. R., Laouiti, A., Muhlethaler, P. and Saïdane, L. A. (2014) “An Adaptive TDMA Slot Assignment Strategy in Vehicular Ad Hoc Networks,” Journal of Machine to Machine Communications, Vol. 1, No. 2, pp. 175–194.
  12. Omar, H.A., Zhuang, W. and Li, L. (2011) “VeMAC: A Novel Multichannel MAC Protocol for Vehicular Ad Hoc Networks,” Computer Communications Workshops (INFOCOM WKSHPS), IEEE, pp. 413 – 418.
  13. Rehman, S., Khan, M. A., Zia, T. A. and Zheng, L. (2013) “Vehicular Ad-Hoc Networks (VANETs) - An Overview and Challenges,” Journal of Wireless Networking and Communications, Vol. 3, No. 3, pp. 29-38. [14] Liu, B. and Zhang, L. (2013) “An Improved Identity-based Batch Verification Scheme for VANETs,”5th International Conferenceon Intelligent Networking and Collaborative Systems, IEEE pp. 809-814.
  14. Huang, J.L., Yeh, L.Y. and Chien, H.Y. (2011) “ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks,” IEEE Transactions On Vehicular Technology, Vol. 60, No. 1, pp. 248-262.
  15. Zhang, C., Lu, R., Lin, X., Ho, P. H. and Shen, X. (2008) “An efficient identity- based batch verification scheme for vehicular sensor networks,” in Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM’08), pp. 816-824.
  16. Zang, C., Ho, P. H. and Tapolcai, J. (2011) “On batch verification with group testing for vehicular communication,” Wireless Networks, Vol. 17, No. 8, pp. 1851-1865.
  17. Networking Lab Kyung Hee University, “VANET Architecture,” (Accessed: March 2016).
  18. Raghul, G., Dhayabarani, R., Vivek, R. (2014) “ppt on Dedicated Short Range Communication,” (Accessed: March 2016).
  19. Guo, J. and Balon N. (2006) “Vehicular AdHocNetworks and Dedicated Short-Range Communication,” University of Michigan – Dearborn.
  20. Chief Editor: Cheng, H.X. (1993) Market Occupancy (Markov) Forecasting Methods, 80 Practical Market Forecasting Methods‟, Peking Economic Institute Press.
  21. Zhaopeng, M., Li, L. and Peng, L. “Study on Computer Sales Market Model Based on Markov Analysts,” Decision and Decision Support Synem, Vol. 1, pp. 88-93.
  22. Zude, C. (1994) “A study on Shifting Traffic Volume of the Vehicular Ferry and Yangpu Bridge by Grey Theory and Operations Research Method,” Journal of Maritime University, Vol. 03.
  23. Tang, H., Wu, H. and Meng, J. (2012) “The Model Analysis of VANET at Intersections Based on Markov Process,” State Key Laboratory of Rail Traffic Control And Safety, Beijing Jiaotong University, Beijing, China.
  24. Fan, C.I. , Sun, W.Z., Huang, S.W., Juang, W.S. and Huang, J.J. (2014) “Strongly Privacy-Preserving Communication Protocol for VANETs,” Ninth Asia Joint Conference on Information Security IEEE, 119 – 126. Parno, B., Perrig, A. and Gligor, V. (2005) „Distributed detection of node replication attacks in sensor networks‟, Proceedings of 2005 IEEE Symposium on Security and Privacy (S&P’05), pp.49–63.


Vehicular Ad hoc Network (VANET); Identity Based Batch Verification Scheme (IBVS) ; Road Side Units (RSUs) ; On- Board Units (OBUs) ; HMAC ; Trust Authority (TA) ; TDMA.