3.2 RELATED WORK
A review over the various techniques which used for key management in VANET is presented in this section.
Hao, Y., Cheng, et Al“A distributed key management framework with cooperative message authentication in VANET In [10] The OKD scheme is a centralized group key management protocol and uses periodic rekeying to decrease the communication cost. The OKD scheme constructs the key tree with one-way key approach and derives the new key from the old one to improve the rekeying efficiency. There are internal k-nodes, external k-nodes, and members in each group (u-nodes). In the tree, the internal k-node stores the auxiliary key and the external k-node stores the secret key for each u-node. The secret key is only known by the
…show more content…
In the group signature, public key of one group is connected with private keys of multiple groups. A message that is signed by any private keys of group can be verified with unique group public key. Therefore attacker cannot identify who is sender of the message. Author also proposed an efficient cooperative message authentication protocol, to reduce verification load where validity of safety message is examined by only those verifiers, who are selected on the basis of their position related to sender vehicles. This scheme helps to revoke malicious vehicles, maintaining system and various different security principles. If a verifier discovers an invalid regular broadcast message that is not verified as group signature, it broadcasts a warning message also called as cooperative authentication message to other vehicles.
Guo, M. H., Liaw et Al“Centralized group key management mechanism for VANET,” [13] In this paper the author has been proposed technique of binary search is used in RSU message verification phase. Bloom filter is used to replace hash value in notification message for reducing message overhead and enhancing effectiveness of verification phase. To enhance efficiency pairing operations are reduced from three to two so in the verification phase Vehicles can use its different
A routing protocol is required to find routes between nodes within the network. We are presenting two different routing protocols and their evaluation and then provide a comparison and discussion of their respective advantages and drawbacks. ABR (Associativity Based Routing) and RSR (Robust Source Routing) protocol. In ABR protocol, a route is selected based on nodes having associativity states that imply periods of stability. The ABR protocol is suitable for mobility in ad hoc wireless networks. Whereas the RSR is secure, on-demand, multi –path, source routing protocol.
With the ever increasing surge of digital communications and transactions, a tougher level of security is essential in order to safeguard the user and their data transactions. Systems, personal computers, mobile phones, servers, and even smart cards are all being used everywhere and there is a need to secure communications. With the influx of data management, there is a clear race between the two challengers in the game known as Information Security between developers and the hackers. PKI was designed to influence the Internet infrastructure for means of communication (Samuelle, 2011). While decreasing antagonistic misuse of data, reducing data theft, and providing an extra layer of trust through key pairs and
Initially, an exchange protocol, such as a password- authenticated key exchange protocol, is used to create a shared secret. From the shared secret, two keys are created: a utilized key and a stored key. The utilized key is used to encrypt messages between nodes. When it is time to replace the utilized key to maintain security, the stored key is utilized to encrypt messages for generating/distributing a new shared secret. The new shared secret is then used to generate a new utilized key and a new stored key. This process may be repeated any number of times to maintain
1. Abstract: Wireless sensor networks is growing rapidly over the few decades. Due to its flexibility, wireless sensor networks has been in practice in many areas. Among various wireless networks, Mobile Ad hoc networks has been one of the unique network. Unlike other network architectures, MANETs have no central architecture; every node is free to work both as a transmitter and receiver. Every single node can communicate freely with every other node which is in their communication range. Otherwise, it depends on neighboring nodes to relay messages. Due to this nature, MANETs are used in many missionary applications like health care, military use and emergency recovery. However the wide distribution of MANETs makes it vulnerable to malicious attacks. Hence it is necessary to design a secure system for MANETs. In this paper we implement a secure system named Enhanced Adaptive Acknowledgement especially for MANETs. To ensure higher security and reduce the network overhead, we use a different approach called hybrid cryptography in our proposed scheme. Enhanced Adaptive Acknowledgment detects higher malicious attackers without greatly disturbing the network performances. We compare the differences within the Enhanced Adaptive Acknowledgment before and after introducing the Hybrid cryptography approach
The Public Key Infrastructure (PKI) can be as strong as we want to design the system. Public Key Infrastructure (PKI) adoption is necessary in order to stay competitive and secure in today’s world. After implementation, data will more secure, customer will have more trust in operations, and this company will be compliant for years to
Keys should not be used as a primary access control as they can be easily copied, door locks are susceptible to “bump” attacks, and there is often no record of who utilized a key to gain access. Key security can be enhanced by serialize the key, keeping strict key logs, and policies should inform key users of their responsibilities (Gregory, 2010).
Public key infrastructures (PKIs) are necessary to help ascertain the identity of different people, devices, and services. In a nutshell, PKIs go way beyond the use of user IDs and passwords, employing cryptographic technologies such as digital signatures and digital certificates to create unique credentials that can be validated beyond reasonable doubt and on a mass scale ("What is pki?" n.d., p. 1).
The idea is to reduce theft by matching the key held by the driver to the automobile. The transponder chip inside the key must match the code contained in the memory module of the lock cylinder for the engine to start.
The proposed technique is based on mutual authentication using technique of traffic monitoring algorithm in networks
In military environment the data has to be transmitted in secured and faster way, even the network is suffer from frequent partitions and intermittent network connectivity. To transmit the data faster and in secure way Disruption-tolerant network is useful, which allow nodes to communicate each other even in this network environment. Rou and Chua h introduce external storage node in disruption tolerant network which stores data for allowing only authorized users to access the data. This Military Network requires sender to entrust their valuable data to users, there have been increasing security and privacy concerns on data. Several schemes employing attribute-based encryption (ABE) for access control over data. However, most of
A brief history of remote authentication is provided in a paper entitled, An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography (Huang, 2015). The history is described as beginning in 1981 which introduced a password-based scheme in regards to remote authentication. This was further improved upon by the introduction of the hash function for passwords as opposed to openly sending the password over the network. In 2003, a protocol was introduced which involved a password including an authentication phase and a password change phase. In recent years, there have been many propositions for 2-factor and even 3-factor password schemes. Two-factor schemes offer greater protection by offering more than just a password for authentication. The
The key distribution center comprises of two components, integrated into one server. These components are the authentication server and the ticket-granting server. Considering three entities, that is, the resource center, client and user Z, the request and authentication process works in the following way. The user Z feeds in a username and password into the client machine, which is encrypted to form a secret key. The user Z through the client then contacts the authentication server, which in turn sends the
Given that the Electronic Control System is the brain in automated and connected vehicles, security of the system is a necessity. But an additional concern is securely locating where the car is in relation to the roadway and other vehicles. While GPS is widely used, there is work to utilize a more accurate technology. Some consider RFID to be the answer. Accuracy is critical in connected vehicles and critical V2V technologies like Crash avoidance, which is already being used by manufacturers like Mercedes Benz. These include advanced radar sensors that can detect other vehicles or variations in driver behavior that could be related to drowsiness (Safety). The origins of RFID come from the British during WW2 who developed a system to identify whether approaching planes were the enemy or allies. The frequency is sent to a transponder through which the frequency is identified with the location of the car (RFID Journal). The data being sent must use the latest encryption technologies and remain updated in order
Two parties each create a public-key, private-key pair and communicate the public key to the other party. The keys are designed in such a way that both sides can calculate the same unique secret key based on each side's private key and the other side's public key.
Abstract: In this paper, we study Group key agreement means multiple parties want to create a common secret key to be used to exchange information securely. The group key agreement with an arbitrary connectivity graph, where each user is only aware of his neighbor and has no information about the existence of other users. Further, he has no information about the network topology. We implement the existing system with more time efficient manner and provide a multicast key generation server which is expected in future scope by current authors. We replace the Diffie Hellman key exchange protocol by a new multicast key exchange protocol that can work with one to one and one to many functionality. We also tend to implement a strong symmetric encryption for improving file security in the system.