An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Communications

Abstract

Now a days people facing many problems because of traffic. To avoid this problem VANET is used here.In this group signature is used in VANETs to realized unauthorized authentication. In the existing system, group signatures is used and its suffers from long delay in the certificate revocation list (CRL) checking and process of signature verification, high message loss. In VANET in which roadside units (RSUs) are responsible for distributing group private keys and to managing vehicles in a localized manner. Then to avoid time consuming, hash message authentication (HMAC) is used here. The proposed work of this project is trinary partitioned black-burst-based broadcast protocol(3P3B) consists of two primary mechanisms. First, a mini distributed interframe space (DIFS) in a medium access control (MAC) sublayer is used to give higher access priority to the time critical emergency message as a higher priority and to communication channel compared with other messages. Second, a trinary is designed to iteratively partition the communication range into small sectors. In 3P3B outperforms benchmarks of the existing broadcast protocols in VANETs in terms of the packet delivery ratio, average message speed, message progress and communication delay.

Authors and Affiliations

Mr. K. Kamal Kishore

Keywords

Related Articles

Object Oriented Software Modularization Quality Measurement Based On API and Information Theoretic Metrics

In this research project we are enhancing the software quality measurement using API and theoretic information metrics. Along with the new set of metrics that measure the quality of modularization of a non-object-oriente...

Enhanced Round Robin Technique with Variant Time Quantum for Task Scheduling In Grid Computing

Grid computing is a form of distributed architecture in which large number of computers are connected to solve a complex problem. In the grid computing model, geographically distributed resources run independent tasks an...

The Case Study of Optimization of DG System in Jamnagar District

This research work is present in Indian energy sector, however, has constraints of resources, capital, technology and environment raising issues of energy security. The traditional electrical power system model in the Gu...

Glaucoma Screening Using Superpixel Classification

Glaucoma is a chronic eye disease that leads to vision loss. As it cannot be cured, detecting the disease in time is important. At present to detect Glaucoma intraocular pressure (IOP) method is used. It is a fluid press...

Scientific Software based on Markov Model for Weather Forecast

Hidden Markov models and also their own utility in informatics usually are examined. These statistical models are considered as general function string modeling resources that are capable of understanding patterns and al...

Download PDF file
  • EP ID EP221546
  • DOI -
  • Views 117
  • Downloads 0

How To Cite

Mr. K. Kamal Kishore (2015). An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Communications. International journal of Emerging Trends in Science and Technology, 2(2), 1792-1799. https://europub.co.uk/articles/-A-221546