VANET Based Privacy-Preserving Navigation scheme with replica server

被引:3
|
作者
Shaikh, Rukaiya [1 ]
Bharadwaj, Deeksha [2 ]
机构
[1] Savitribai Phule Univ, GHRIET, Comp Engn, Pune, Maharashtra, India
[2] Savitribai Phule Univ, GHRIET, Dept Comp Engn, Pune, Maharashtra, India
来源
2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN) | 2015年
关键词
Anonymous Credential; Elliptic Curve Cryptography; Pseudo Identity; Proxy re-encryption; Replica server; Secure Vehicular Sensor Network; Signature Verification; VANET;
D O I
10.1109/CICN.2015.231
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In VANET each vehicle is assumed to have an onboard unit (OBU) and Road-side units (RSU) which is installed along the roads. A traffic authority (TA) and possibly some other application servers are introduced in the back end. The OBUs and RSUs convey utilizing the Dedicated Short Range communications (DSRC) convention over the remote channel while the RSUs, TA, and the application servers impart utilizing a safe system, for example, Internet. In this proposed approach, we have developed a navigation System that collects the real time road information from Vehicular ad hoc network (VANET) which provide helps to the driver in order to give the information about desired destinations in a real-time and distributed manner. In this work we have used the Elliptic curve algorithm to authenticate source and also reduce the delay and network overhead. Authentication and privacy preserving are basic requirements of any VANET security system; along with these basic requirements this proposed scheme satisfy all other necessary security requirements. In this Work we have also introduced the Replica server. The entire authentication is done through main server and if main server fails due to the some reason then Replica server will take over the task.
引用
收藏
页码:1194 / 1198
页数:5
相关论文
共 50 条
  • [32] A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks
    Wang, Changji
    Yuan, Yuan
    Wu, Jiayuan
    SENSORS, 2017, 17 (06):
  • [33] Privacy-Preserving Route Reporting Scheme for Traffic Management in VANETs
    Rabieh, Khaled
    Mahmoud, Mohamed M. E. A.
    Younis, Mohamed
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 7286 - 7291
  • [34] Credential-based Privacy-preserving Power Request Scheme for Smart Grid Network
    Cheung, Jeanno C. L.
    Chim, T. W.
    Yiu, S. M.
    Hui, Lucas C. K.
    Li, Victor O. K.
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [35] Enabling privacy-preserving multi-server collaborative search in smart healthcare
    Zhang, Chuan
    Luo, Xingqi
    Fan, Qing
    Wu, Tong
    Zhu, Liehuang
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 143 : 265 - 276
  • [36] A Novel Identity-Based Privacy-Preserving Anonymous Authentication Scheme for Vehicle- to-Vehicle Communication
    Genc, Yasin
    Korkuc, Cagatay
    Aytas, Nilay
    Afacan, Erkan
    Sazli, Murat H.
    Yazgan, Erdem
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2023, 29 (02) : 69 - 77
  • [37] Efficient ECC-Based Conditional Privacy-Preserving Aggregation Signature Scheme in V2V
    Yu, Sixian
    Cao, Qiang
    Wang, Chenyu
    Xu, Guoai
    Ma, Huanhuan
    Zhu, Yucheng
    Peng, Yihang
    Jia, Yan
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (11) : 15028 - 15039
  • [38] A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential
    Diao, Feng
    Zhang, Fangguo
    Cheng, Xiangguo
    IEEE TRANSACTIONS ON SMART GRID, 2015, 6 (01) : 461 - 467
  • [39] Vspp: Verifiable, shareable, and privacy-preserving access control scheme for IoV
    Sun, Youwang
    Jin, Chunhua
    Liu, Xinying
    Kong, Lingwen
    Yu, Changhui
    Chen, Guanhua
    Chen, Liqing
    PERVASIVE AND MOBILE COMPUTING, 2025, 107
  • [40] Efficient and privacy-preserving authentication scheme for wireless body area networks
    Shuai, Mengxia
    Liu, Bin
    Yu, Nenghai
    Xiong, Ling
    Wang, Changhui
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52