CFP last date
22 April 2024
Reseach Article

Key Management Techniques for VANETs

Published on November 2012 by G. Sasikala, K. S. Dhanalakshmi
International Conference on Electronics, Communication and Information systems
Foundation of Computer Science USA
ICECI - Number 2
November 2012
Authors: G. Sasikala, K. S. Dhanalakshmi
c433d398-2a0c-4615-8ddd-858acf6677c1

G. Sasikala, K. S. Dhanalakshmi . Key Management Techniques for VANETs. International Conference on Electronics, Communication and Information systems. ICECI, 2 (November 2012), 13-16.

@article{
author = { G. Sasikala, K. S. Dhanalakshmi },
title = { Key Management Techniques for VANETs },
journal = { International Conference on Electronics, Communication and Information systems },
issue_date = { November 2012 },
volume = { ICECI },
number = { 2 },
month = { November },
year = { 2012 },
issn = 0975-8887,
pages = { 13-16 },
numpages = 4,
url = { /specialissues/iceci/number2/9467-1015/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 International Conference on Electronics, Communication and Information systems
%A G. Sasikala
%A K. S. Dhanalakshmi
%T Key Management Techniques for VANETs
%J International Conference on Electronics, Communication and Information systems
%@ 0975-8887
%V ICECI
%N 2
%P 13-16
%D 2012
%I International Journal of Computer Applications
Abstract

Vehicular adhoc network is commonly used network among the vehicles in a centralized way. This network is built in order to send and receive messages from the vehicles which are present in the network. Since it is a centralized network, hence many problems have be occurs in the network. The main issues of vanet are maintaintenance of the system and revocation of malicious vehicles. The new efficient management frameworks that have been framed to overcome the above said problems. It is known as the shared key management technique. The road side unit (RSU) which is present distributes the keys to the various key. The framework is assisting the above said three major problems. This framework can be simulated using NS2. The major architecture of this framework is built in order to get the desired output like avoiding road traffic blockage, safe and secure travel and a volume of high security is imposed in sending and receiving the messages. The message is send and receives without any blockages by the means of cooperative message authentication.

References
  1. Youg Hao ,Yu Cheng ,Chi Zhou and Wei Song, "A Distributed key management framework with cooperative message authentication in VANETs" IEEE Journal on selected areas in communications, vol. 29, no. 3, march 2011
  2. Bo Yu, Cheng-Zhong Xu,and Minyi Guo, "Adaptive forwarding delay control for VANET data aggregation"IEEE Transaction vol . 23,no. 1,january2012
  3. Irshad Ahmed Sumra, halabi hasbullah, Jamalul-Iail Ab Manan "VANET Security Research and Development Ecosystem "International conference 2011
  4. Vighnesh N V,N Kavita, Dr. Shalini R. Urs "A Novel Sender authentication Scheme Based On Hash chain For Vehicular Ad-hoc Networks " IEEE Transaction 2011
  5. Vineetha Paruchuri , "Inter-vehicular communications: Security and reliability issues" International conference2011
  6. J. Molina-Gil, C. Caballero-Gil, and p. Caballero-Gil "Cooperative Approach to Self-managed VANETS" International conference2010
  7. Ali Osman Bayrak, Tankut Acarman "S3P: A Secure and Privacy Protecting Protocol for VANET" International conference2010
  8. Marshall Riley, Kemal Akkaya and kenny Fong "Delay- efficient geodynamic group-based authentication in VANETs"International conference2010
  9. Cristina Gil,Leticia Gonzalez,Neftis Atallah,Juan Antonio Abanades,Nicolas Jean Leconte, " Self-Recusation Protocol for Blockage of Misbehaving Applications in Vehicular Networks" International conference2010
  10. Chenxi Zhange ,Xiaodong Lin,Rongxing Lu, "An efficient message Authentication scheme for vehicular communications" IEEE Transaction on vehicular technology", vol. 57, no. 6, nov2008
  11. Y. Hao, Y. Cheng and K. Ren, "Distributed key management with protection against RSU compromise in group signature base VANETs," In Proc. IEEE Globecom, New Orleans, Nov. , 2008.
  12. S. Park and C. C. Zou, "Reliable traffic information propagation in vehicular ad-hoc networks," IEEE Sarnoff Symposium, Apr. 2008
  13. Sampigethava, L. Huang, M. Li, R. Poovendran, K. Matsuura and K. Sezaki,"AMOEBA: Robust location privacy scheme for VANET,"in IEEE J. Sel. Areas Commun. , vol. 25,no. 8, pp. 1569-1589, 2007.
  14. M. Raya and J. -P. Hubaux, "Securing vehicular ad hoc networks," Journal of Computer Security, vol. 15, no. 1, pp. 39-68, 2007
  15. B. Xiao, B. Yu and C. Gao, "Detection and localization of sybil nodes in VANETs," in Proc. ACM/SIGMOBILE Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Vehicular Adhoc Networks Security Shared Key Management Rsu Co-operative Message Authentication