CFP last date
20 January 2025
Reseach Article

Article:Key-Management Systems in Vehicular Ad-Hoc Networks

by Sasikumar P, Vivek C, Jayakrishnan P
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 10 - Number 1
Year of Publication: 2010
Authors: Sasikumar P, Vivek C, Jayakrishnan P
10.5120/1445-1955

Sasikumar P, Vivek C, Jayakrishnan P . Article:Key-Management Systems in Vehicular Ad-Hoc Networks. International Journal of Computer Applications. 10, 1 ( November 2010), 23-28. DOI=10.5120/1445-1955

@article{ 10.5120/1445-1955,
author = { Sasikumar P, Vivek C, Jayakrishnan P },
title = { Article:Key-Management Systems in Vehicular Ad-Hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { November 2010 },
volume = { 10 },
number = { 1 },
month = { November },
year = { 2010 },
issn = { 0975-8887 },
pages = { 23-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume10/number1/1445-1955/ },
doi = { 10.5120/1445-1955 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:58:39.857328+05:30
%A Sasikumar P
%A Vivek C
%A Jayakrishnan P
%T Article:Key-Management Systems in Vehicular Ad-Hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 10
%N 1
%P 23-28
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Networking in vehicles is a promising approach to facilitate road safety, traffic management, and infotainment dissemination for drivers and travelers. Hence it becomes essential to provide security services such as authentication, non-repudiation, confidentiality, access control, integrity, and availability. The possible types of attacks include eavesdropping, denial of service and replay attacks. The security feature being implemented has to be tailor-made to suit the resource constraints imposed by the mobile nodes. In this paper I propose an approach to distribute the key management activities among the nodes using the concept of the RSA algorithm, the D-H algorithm and the RC4 algorithm. The message is encrypted using a public key and the corresponding private key is shared among the participating parties in all of these cases. The efficiency of each of these cases is demonstrated using the Network Simulator tool.

References
  1. X. Lin, R. Lu, C. Zhang, H. Zhu, P.H. Ho, and X. Shen, "Security in Vehicular Ad Hoc Networks", IEEE Communications Magazine, Vol. 46, No. 4, 88-95, 2008
  2. Nai-Wei Lo and Hsiao-Chien Tsai, "Illusion Attack on VANET Applications", IEEE Globecom Workshops, pp. 1–8 (2007)
  3. IEEE Std. 1609.2-2006, “IEEE Trial-Use Standard for Wireless access in Vehicular Environments-Security Services for Applications and Management Messages,” 2006.
  4. P. Wohlmacher, “Digital Certificates: A Survey of Revocation Methods,” Proc. ACM Wksp. Multimedia, Los Angeles, CA, Oct. 2000, pp. 111–14.
  5. M. Raya and J.-P. Hubaux, “Securing Vehicular Ad Hoc Networks,” J. Computer Security, Special Issue on Security, Ad Hoc and Sensor Networks, vol. 15, no. 1, 2007,pp. 39–68.
  6. Pradeep B, Manohara Pai M.M and M. Boussedjra, J. Mouzna, Global Public Key Algorithm for secure location service in VANET, IEEE 2009
  7. P. S. L. M. Barreto et al., “Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps,” Proc. Advances in Cryptology — ASIACRYPT 2005, Taj Coromandel, Chennai, India, Dec. 2005, pp. 515–32
  8. Xiaodong Lin, Student Member, IEEE, Xiaoting Sun, Pin-Han Ho Member, IEEE, and Xuemin (Sherman) Shen, Senior Member, IEEE “GSIS: A Secure and Privacy Preserving Protocol for Vehicular Communications”, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 6, NOVEMBER 2007
  9. A Stampoulis and Z Chai, Yale University “A survey of security in Vehicular Networks”.
  10. Abedi, O, Fathy, M, and Taghiloo, J “Enhancing AODV routing protocol using mobility parameters in VANET” Computer Systems and Applications, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Key-Management Systems Ad-Hoc Networks RSA algorithm D-H algorithm