A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks - 2018


Vehicular ad-hoc networks (VANETs) are under active development, thanks in part to recent advances in wireless Communication and NetWorking technologies. The most elementary part in VANETs is to enable message authentications between vehicles and roadside units. Message authentication using proxy vehicles has been proposed to reduce the computational overhead of roadside units significantly. During this message authentication theme, proxy vehicles that verify multiple messages at the same time improve roadside units' efficiency. During this Project, first we tend to show that the only proxy-primarily based authentication scheme (PBAS) presented for this goal by Liu et al. cannot guarantee message authenticity, and also it is not resistant against impersonation and modification attacks and false acceptance of batched invalid signatures. Next, we tend to propose a new identity-based mostly message authentication scheme using proxy vehicles (ID-MAP). Then, to ensure that it will satisfy the message authentication requirement, existential unforgeability of underlying signature against adaptively chosen-message and identity attack is proved below elliptic curve discrete logarithm problem in the random oracle model. It ought to be highlighted that ID-MAP not only is additional efficient than PBAS since it's pairing-free and identity-primarily based, and additionally it will not use map-to-purpose hash functions, however conjointly it satisfies security and privacy requirements of VANETs. Furthermore, analysis shows that the specified time to verify 3000 messages in ID-MAP is reduced by 76p.c compared to that of PBAS.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : Fast and Secure Distributed Nonnegative Matrix Factorization ABSTRACT: The nonnegative matrix factorization (NMF) technique has been utilized effectively in a number of different data mining activities. Because
PROJECT TITLE : ESVSSE Enabling Efficient, Secure, Verifiable Searchable Symmetric Encryption ABSTRACT: It is believed that symmetric searchable encryption, also known as SSE, will solve the problem of privacy in data outsourcing
PROJECT TITLE : Secure Cloud Data Deduplication with Efficient Re-encryption ABSTRACT: The data deduplication technique has seen widespread adoption among commercial cloud storage providers, which is both important and necessary
PROJECT TITLE : Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus ABSTRACT: In the fields of cryptography and algorithmic number theory, modular inversion is regarded as one of the operations that
PROJECT TITLE : Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage ABSTRACT: Cloud storage has become a primary industry in remote data management services, but it also attracts security concerns.

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry