Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
…
19 pages
1 file
Today’s VANET applications are vastly focused towards fulfilling users’ requirements on road and making their journey safe and comfortable. In particular, safety applications will provide secure information to users and introduce mechanisms to help reduce the death rate due to road accidents. The most important aspect in such environment is the integrity of this safety information; it must be at all times prevented from being altered by attackers. Attackers try to get benefits from the nature of open wireless medium to launch different kind of attacks in the network to achieve their specific goals. Current DSRC is used as a communication medium for sending the safety and non safety messages from vehicle to vehicle (V2V) and vehicle to infrastructure (V2I). With the introduction of trusted computing several years ago, Trusted Platform Module (TPM) is a security hardware module that can potentially handle the software attacks on VANET and maintain the integrity of the data within vehicular network. The main idea behind trusted computing is the hardware based TPM which contains active security modules that supports web of trust to be built within components of the network. We propose a new model for web of trust within vehicular to handle all types of attacks and maintain the integrity of messages. Direct Anonymous Attestation (DAA) digital group signature scheme play a key role for developing web of trust and provides security and privacy for vehicle.
Last few years, vehicular networks are gaining more and more attraction from the researchers and the automobile industries. The life saving factor is the key issue in this regard. Trust is key part of security and it is undoubtedly a necessity to develop trust in vehicular network. The main aim of this paper is to propose a trust model for vehicular environment. The proposed model contains two different modules. First module is based on attackers and the attacks. An attacker is one of the most significant entity who can intentionally change the behavior of the other entities (Vehicle or Infrastructure) in the network. It is important to study and analyze the attackers and attacks before designing the life saving networks. Second module is based on trust and trusting computing technology. Trusted platform module (TPM) is a hardware security module and plays a major role to develop trust in vehicles. Purpose of this study is to develop trust in vehicular network. This trusted vehicular network model enforces all the entities of the network to behave in a specified manner. We believe that this trusted model would be more helpful in serving the users of the vehicular environment.
Trust is the key part of the security and challenges task in future life safety vehicular communication. Vehicular communication is based on peer to peer communication and each peer has embedded sensor s inside and performs all computational tasks as well as security functions. The trusted Platform module (TPM) is used inside the vehicle and plays a key role to establish trust within the vehicle and also with other vehicles and network infrastructure. In this paper, a protocol is proposed which is based on a property based attestation (PBA) also known as Vehicular Property based attestation Protocol (VPP). In this proposed protocol, it is not based on the properties of the hardware and software of the vehicle; rather it depends on the static or dynamic properties of the system which has been pre configured. We would expect that the protocol will fulfil the need for a more secure and trusted mechanism for users using the safety and non-safety applications and services in the vehicular network.
International Journal of Future Generation Communication and Networking, 2016
Vehicular Ad Hoc Network (VANET) is a more influential network in which vehicles depend on each other to communicate and for the secure exchange of the messages. With the improvement in the technology, mainly the vehicles are equipped with Wi-Fi and GPS devices to improve the traffic handling and road safety. But many vehicles may broadcast the bogus messages for their own purpose, so it needs a trustful environment and an effective trust management schemes to prevent the network from the various malicious attacks. Trust establishment is very challenging as the network is highly mobile and vehicles may come in or depart at any time. In this paper, we first discuss the VANET model to describe the environment, and then the trust management schemes to secure the network and lastly the various cryptography fundamentals for the fast and safe message transfer.
Advanced Analysis & Modeling (ADAM) MIMOS Berhad, Malaysia. [email protected] Abstract -Safety and non-safety applications of VANET provides solutions for road accidents in current traffic system. Security is one of the key research area for successful implementation of safety and non-safety applications of VANET in real environment. Trust and Privacy are two major components of security and dynamic topology and high mobility of vehicles make it more challenging task for end users in network. We propose a new and practical card-based scheme to ensure the Security, Trust and Privacy (STP) in vehicular network. Proposed scheme is based on security hardware module i-e trusted platform module (TPM). The basic objective of proposed scheme is to create trusted security environment for end users in network and user take benefits of potential application of VANET. Keywords -Vehicular Ad hoc Network (VANET), Safety Applications, Security, Trust and Privacy (STP), Card based scheme. trusted platform module (TPM).
Safety of human life during journey is one of most important objective of intelligent transportation system (ITS). Potential safety and non -safety applications of vehicular ad hoc network (VANET) also provides safety of human lives and also comfort passengers during their journey. Comfort applications are also provided entertainment services to users and make journey more enjoyable. Comfort applications provide opportunities for business parties to setup their business near the highway. So in this paper, we are presenting the secure business communication (SBC) model and explain the components of proposed model. TPM is a security hardware module and it is used inside the smart vehicle. TPM is a core component of proposed SBC model and it will ensure secure communication between user and business parties in VANET. The core objective of secure business communication (SBC) in VANET is to serve the end users through potential applications of VANET.
International Journal of Computer Applications, 2014
Day by day the total number of vehicles around the world is increasing enormously. It needs to control the vehicles for road safety. The vast development of technologies, especially the wireless technologies provide a new type of networks, such as Vehicular Ad Hoc Networks (VANETs) which provides communication between vehicle to vehicle, vehicles to server. A numerous number of new approaches are proposed such as smart cities, Intelligent Traffic System (ITS), Intelligent Light System (ILS) etc. It is difficult to control the urban traffic system by manual method. In this paper proposes an inter vehicular routing protocol using digital signature and hash chain. The inter vehicular communication using digital signature and hash function reduces this delay. Through its extensive simulation the traffic of a city environment may be controlled. The result shows that the data passing rate of inter vehicular communication decreases. As a result, each vehicle can communicate to others more quickly, which improve the road safety as well.
2012
A Vehicular Ad-Hoc Network (VANET) facilitates communication between vehicles and infrastructure. The aim of VANETs is to enable moving vehicles by providing safety and non safety messages. Due to the characteristics of VANET, the existing relative positioning techniques developed initially for Ad hoc or sensors networks are not directly applicable to vehicular networks. Vehicle-to-vehicle communications is used to collect data from neighborhood vehicle with the help of sub-VANET. In this paper we assess how can data providers earn their person's trust and provide the security, when a third party is processing sensitive data in a remote machine located in various location in the cities? A concept of utility of vehicle's data has been represented to provide the various services to the peers. Emerging technologies can help address the challenges of Security and Trust in data computing.
2018
VANETs (Vehicular Ad-hoc Networks) consist of vehicles capable of exchanging information by radio to improve road safety (alerts in case of accidents or in case of abnormal slowdowns, collaborative driving…) or allow internet access for passengers (collaborative networks, infotainment, etc.). Road safety messages exchanged between vehicles may be falsified or eliminated by malicious entities in order to cause accidents and endanger people life. In this thesis, we focus on defining, designing and evaluating a security solution for V2V communications in VANET, to ensure a secure communication and a good level of confidence between the different participating vehicles. Adopting a group-based model, we consider the Trustworthiness evaluation of vehicles participating in VANET and we develop a Trust Model to analyze the behavior of the vehicles in the group while preserving the privacy of the participants and maintaining low network overhead. We then propose a hierarchical and modular fr...
2009
In this paper, we propose a novel scheme to achieve secure, and efficient vehicular communication. In particular, SegCom provides two mechanisms to perform successive authentication of the vehicle with the road-side infrastructure units to expedite authentication for Vehicle-to-Infrastructure (V2I) communication. Furthermore, to enhance the efficiency of Vehicle-to-Vehicle (V2V) communication, SeGCom permits the vehicles to form group, which are also used for performing multi-hop V2V communication without any assistance from a trusted authority. Comparison with other existing schemes in the literature has been performed to show the efficiency and applicability of our scheme.
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2010
We introduce a new scheme for safety message authentication in VANETs. For a practical implementation of VANET, we anticipate that road side units (RSUs) are not physically protected and are prone to several different attacks including node compromise attacks. Thus, an RSU should not be automatically trusted by on road vehicles. In our proposed scheme, a road side controller (RSC) is responsible for controlling all the RSUs, and delivering messages through RSUs to vehicles in a given area, where each RSU uses a proxy signature mechanism based on Elliptic Curve Cryptography (ECC), which is a variation of known ECDS-based proxy signature schemes and modified according to the VANET's criteria and security requirements. The underlying network constraints and properties from VANET standards have been taken into consideration along with the security, reliability and other related issues. We also discuss the potential forgery and attack scenarios on our proposed scheme. The security analysis and simulation results prove the strength and adaptability of our proposed scheme in future VANETs.
JOURNAL OF ADVANCES IN MATHEMATICS
Gondwana Research, 2023
Acta Botanica Hungarica
HAL (Le Centre pour la Communication Scientifique Directe), 2018
The Dancing Circle vol. 3, ed. Judy King, 2001
International journal of social science research and review, 2023
O desenvolvimento de agência na formação docente em línguas: desafios e possibilidades, 2022
Misr journal of agricultural engineering, 2015
VII Simpósio Brasileiro de …, 2001
The Journal of Physical Chemistry, 1994
Results in Physics, 2017
Anesthesiology, 2017