Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

HAP: Hybrid Authentication Protocol for Vehicular Ad Hoc Network

Print
PDF
IJCA Proceedings on National Seminar on Recent Advances in Wireless Networks and Communications
© 2014 by IJCA Journal
NWNC - Number 3
Year of Publication: 2014
Authors:
Manish Kumar Soni
Ashish Vashistha

Manish Kumar Soni and Ashish Vashistha. Article: HAP: Hybrid Authentication Protocol for Vehicular Ad Hoc Network. IJCA Proceedings on National Seminar on Recent Advances in Wireless Networks and Communications NWNC(3):10-14, April 2014. Full text available. BibTeX

@article{key:article,
	author = {Manish Kumar Soni and Ashish Vashistha},
	title = {Article: HAP: Hybrid Authentication Protocol for Vehicular Ad Hoc Network},
	journal = {IJCA Proceedings on National Seminar on Recent Advances in Wireless Networks and Communications},
	year = {2014},
	volume = {NWNC},
	number = {3},
	pages = {10-14},
	month = {April},
	note = {Full text available}
}

Abstract

In vehicular ad hoc networks clever traffic services are efficient if they are connected with method that supervise and create trust among service providers and vehicles. Consequently, the authentication of the providers of traffic condition information and the authorization of entity's to admittance this information is crucial. Consequently it's essential to extend a innovative security scheme for VANETs protocol.

References

  • Subir Biswas, Jelena Mi?si´c, Location-based Anonymous Authentication for Vehicular CommunicationsISPIMRC-2o11.
  • Yu-Chih Wei, Yi-Ming Chen, Hwai-Ling Shan Beacon-based Trust Management for Location Privacy Enhancement VANETs. IEEE-2011.
  • Debasis Giri and Durbadal Chattaraj. A Secure and Efficient Communication in VANET 978-1-4244-7585-8/10-IEEE 2010.
  • M. Raya, P. Papadimitratos, and J. -P. Hubaux,Securing vehicular communications, Wireless Communications, IEEE, vol. 13, no. 5, pp. 8–15, October 2006.
  • Y. Sun, R. Lu, X. Lin, X. S. Shen, and J. Su, An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications,Vehicular Technology, IEEE Transactions on, vol. 59, no. 7, pp. 3589 –3603, 2010.
  • Li He and Wen Tao Zhu, Mitigating DoS Attacks against Signature-Based Authentication in VANETs 978-1-4673-0089-6/12/IEEE-2012.
  • X. Lin, X. Sun, P. -H. Ho, and X. Shen,?Gsis: A secure and privacypreserving protocol for vehicular communications, Vehicular Technology, IEEE Transactions on, vol. 56, no. 6, pp. 3442–3456, Nov. 2007.
  • Q. Wu, J. Domingo-Ferrer, and U. Gonzalez-Nicolas, Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications, Vehicular Technology, IEEE Transactions on, vol. 59, no. 2, pp. 559 –573, 2010.
  • G. Calandriello, P. Papadimitratos, J. P. Hubaux, and A. Lioy, ?Efficient and robust pseudonymous authentication in VANET, in VANET '07: Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks. ACM, 2007, pp. 19–28. [Online]. Available:http://dx. doi. org/10. 1145 /1287748. 1287752.
  • R. Lu, X. Lin, H. Zhu, P. -H. Ho, and X. Shen, ?Ecpp: Efficient conditional privacy preservation protocol for secure vehicular communications,? in INFOCOM. IEEE, 2008, pp. 1229–1237.
  • S. D. Galbraith, K. G. Paterson, and N. P. Smart,?Pairings for cryptographers, Discrete Appl. Math. , vol. 156, pp. 3113– 3121, September 2008. [Online]. Available:http://portal. acm. org/citation. cfm?id=14503 45. 1450543
  • S. Biswas and J. V. Misic, ?Deploying proxy signature in vanets, in GLOBECOM. IEEE, 2010, pp. 1–6
  • Nizar Alsharif, Albert Wasef, and Xuemin (Sherman) Shen, ESPR: Efficient Security Scheme for Position-Based Routing in Vehicular Ad Hoc Networks, GLOBECOM-IEEE Global Telecommunications Conference, Miami, December, 2010, pp. 1-5.
  • Brad Karp, H. T. Kung, GPSR:Greedy Perimeter Stateless Routing for Wireless Networks