Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

HAP: Hybrid Authentication Protocol for Vehicular Ad Hoc Network

Published on April 2014 by Manish Kumar Soni, Ashish Vashistha
National Seminar on Recent Advances in Wireless Networks and Communications
Foundation of Computer Science USA
NWNC - Number 3
April 2014
Authors: Manish Kumar Soni, Ashish Vashistha
925c208d-b01c-437e-ae99-b6d780ad5348

Manish Kumar Soni, Ashish Vashistha . HAP: Hybrid Authentication Protocol for Vehicular Ad Hoc Network. National Seminar on Recent Advances in Wireless Networks and Communications. NWNC, 3 (April 2014), 10-14.

@article{
author = { Manish Kumar Soni, Ashish Vashistha },
title = { HAP: Hybrid Authentication Protocol for Vehicular Ad Hoc Network },
journal = { National Seminar on Recent Advances in Wireless Networks and Communications },
issue_date = { April 2014 },
volume = { NWNC },
number = { 3 },
month = { April },
year = { 2014 },
issn = 0975-8887,
pages = { 10-14 },
numpages = 5,
url = { /proceedings/nwnc/number3/16124-1432/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Seminar on Recent Advances in Wireless Networks and Communications
%A Manish Kumar Soni
%A Ashish Vashistha
%T HAP: Hybrid Authentication Protocol for Vehicular Ad Hoc Network
%J National Seminar on Recent Advances in Wireless Networks and Communications
%@ 0975-8887
%V NWNC
%N 3
%P 10-14
%D 2014
%I International Journal of Computer Applications
Abstract

In vehicular ad hoc networks clever traffic services are efficient if they are connected with method that supervise and create trust among service providers and vehicles. Consequently, the authentication of the providers of traffic condition information and the authorization of entity's to admittance this information is crucial. Consequently it's essential to extend a innovative security scheme for VANETs protocol.

References
  1. Subir Biswas, Jelena Mi?si´c, Location-based Anonymous Authentication for Vehicular CommunicationsISPIMRC-2o11.
  2. Yu-Chih Wei, Yi-Ming Chen, Hwai-Ling Shan Beacon-based Trust Management for Location Privacy Enhancement VANETs. IEEE-2011.
  3. Debasis Giri and Durbadal Chattaraj. A Secure and Efficient Communication in VANET 978-1-4244-7585-8/10-IEEE 2010.
  4. M. Raya, P. Papadimitratos, and J. -P. Hubaux,Securing vehicular communications, Wireless Communications, IEEE, vol. 13, no. 5, pp. 8–15, October 2006.
  5. Y. Sun, R. Lu, X. Lin, X. S. Shen, and J. Su, An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications,Vehicular Technology, IEEE Transactions on, vol. 59, no. 7, pp. 3589 –3603, 2010.
  6. Li He and Wen Tao Zhu, Mitigating DoS Attacks against Signature-Based Authentication in VANETs 978-1-4673-0089-6/12/IEEE-2012.
  7. X. Lin, X. Sun, P. -H. Ho, and X. Shen,?Gsis: A secure and privacypreserving protocol for vehicular communications, Vehicular Technology, IEEE Transactions on, vol. 56, no. 6, pp. 3442–3456, Nov. 2007.
  8. Q. Wu, J. Domingo-Ferrer, and U. Gonzalez-Nicolas, Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications, Vehicular Technology, IEEE Transactions on, vol. 59, no. 2, pp. 559 –573, 2010.
  9. G. Calandriello, P. Papadimitratos, J. P. Hubaux, and A. Lioy, ?Efficient and robust pseudonymous authentication in VANET, in VANET '07: Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks. ACM, 2007, pp. 19–28. [Online]. Available:http://dx. doi. org/10. 1145 /1287748. 1287752.
  10. R. Lu, X. Lin, H. Zhu, P. -H. Ho, and X. Shen, ?Ecpp: Efficient conditional privacy preservation protocol for secure vehicular communications,? in INFOCOM. IEEE, 2008, pp. 1229–1237.
  11. S. D. Galbraith, K. G. Paterson, and N. P. Smart,?Pairings for cryptographers, Discrete Appl. Math. , vol. 156, pp. 3113– 3121, September 2008. [Online]. Available:http://portal. acm. org/citation. cfm?id=14503 45. 1450543
  12. S. Biswas and J. V. Misic, ?Deploying proxy signature in vanets, in GLOBECOM. IEEE, 2010, pp. 1–6
  13. Nizar Alsharif, Albert Wasef, and Xuemin (Sherman) Shen, ESPR: Efficient Security Scheme for Position-Based Routing in Vehicular Ad Hoc Networks, GLOBECOM-IEEE Global Telecommunications Conference, Miami, December, 2010, pp. 1-5.
  14. Brad Karp, H. T. Kung, GPSR:Greedy Perimeter Stateless Routing for Wireless Networks
Index Terms

Computer Science
Information Sciences

Keywords

Vanets Authentication Certificate Status Information Br Protocols.