1 / 9

EMAP: Expedite Message Authentication Protocol for Vehicular

Vehicular ad hoc networks (VANETs) adopt the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs) for their security. In any PKI system, the authentication of a received message is performed by checking if the certificate of the sender is included in the current CRL, and verifying the authenticity of the certificate and signature of the sender. In this paper, we propose an Expedite Message Authentication Protocol (EMAP) for VANETs, which replaces the time-consuming CRL checking process by an efficient revocation checking process. The revocation check process in EMAP uses a keyed Hash Message Authentication Code ðHMACÞ, where the key used in calculating theHMAC is shared only between nonrevoked . http://kaashivinfotech.com/ http://inplanttrainingchennai.com/ http://inplanttraining-in-chennai.com/ http://internshipinchennai.in/ http://inplant-training.org/ http://kernelmind.com/ http://inplanttraining-in-chennai.com/ http://inplanttrainingchennai.com/ Contact Us 91 98406 78906, 91 90037 18877 kaashiv.info@gmail.com www.kaashivinfotech.com Shivanantha Building (Second building to Ayyappan Temple), X41, 5th Floor, 2nd avenue, Anna Nagar,Chennai-40

kaashivit
Download Presentation

EMAP: Expedite Message Authentication Protocol for Vehicular

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. AndroidBasedWireless Sensor Activated Business Web Service Rules IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 1, JANUARY 2014 EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks

  2. A Software /Manufacturing Research Company Run By Microsoft Most Valuable Professional VenkatesanPrabu .J MANAGING DIRECTOR Microsoft Web Developer Advisory Council team member and a well known Microsoft Most Valuable Professional (MVP) for the year 2008, 2009, 2010,2011,2012,2013 ,2014. LakshmiNarayanan.J GENERAL MANAGER BlackBerry Server Admin. Oracle 10g SQL Expert. Arunachalam.J Electronic Architect Human Resourse Manager

  3. Abstract • Vehicular ad hoc networks (VANETs) adopt the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs) for their security. In any PKI system, the authentication of a received message is performed by checking if the certificate of the sender is included in the current CRL, and verifying the authenticity of the certificate and signature of the sender. • In this paper, we propose an Expedite Message Authentication Protocol (EMAP) for VANETs, which replaces the time-consuming CRL checking process by an efficient revocation checking process. The revocation check process in EMAP uses a keyed Hash Message Authentication Code ðHMACÞ, where the key used in calculating theHMAC is shared only between nonrevoked . • On-Board Units (OBUs). In addition, EMAP uses a novel probabilistic key distribution, which enables nonrevoked OBUs to securely share and update a secret key.

  4. Existing System • Existing system focused on the problem of collusion in distance bounding, in which two dishonest verifiers pool information to make one of the verifiers look closer by sending similar kind of signals. • A verifier could then request to have a key distributed to it and the prover, which the prover could then use to authenticate its authenticated response. • Existing methodology involves the • Validation of the request by key exchanges and remedial measures in checking the genuinity of the message. – if the data is not proper reject the message which indicates genuinity is a notable problem. • Validating the users data origin in turn checking out the MAC data of the user requests raised. – arising from other machine indicates the genuinity of request origin.

  5. Proposed System • Proposed system holds the existing processing model with an enhanced ciphering algorithm to make the system more robust. • Although, the researchers are interested in authentication enhanced system. We are utilizing some of the concepts introduced in the secrecy logic for authenticating the users. This involves the logic to show what a verifier can conclude from interacting with an honest prover.A timing based input information followed by consecutive timing measurement provides more optimistic approach in authenticating the user. • Our proposed system provides a proof breaks down concept if the prover is dishonest.

  6. System Requirements • Hardware Requirements: Processor : Core 2 duo Speed : 2.2GHZ RAM : 2GB Hard Disk : 160GB • Software Requirements: Platform : DOTNET (VS2010) , ASP.NET Dotnet framework 4.0 Database : SQL Server 2008 R2

  7. Architecture Diagram

  8. Records Breaks Asia Book Of Records Tamil Nadu Of Records India Of Records MVP Awards World Record

  9. Services: A Software /Manufacturing Research Company Run By Microsoft Most Valuable Professional Inplant Training. Internship. Workshop’s. Final Year Project’s. Industrial Visit. Contact Us: +91 98406 78906,+91 90037 18877 kaashiv.info@gmail.com www.kaashivinfotech.com Shivanantha Building (Second building to Ayyappan Temple),X41, 5th Floor, 2nd avenue,Anna Nagar,Chennai-40.

More Related