An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Communications

Abstract

Now a days people facing many problems because of traffic. To avoid this problem VANET is used here.In this group signature is used in VANETs to realized unauthorized authentication. In the existing system, group signatures is used and its suffers from long delay in the certificate revocation list (CRL) checking and process of signature verification, high message loss. In VANET in which roadside units (RSUs) are responsible for distributing group private keys and to managing vehicles in a localized manner. Then to avoid time consuming, hash message authentication (HMAC) is used here. The proposed work of this project is trinary partitioned black-burst-based broadcast protocol(3P3B) consists of two primary mechanisms. First, a mini distributed interframe space (DIFS) in a medium access control (MAC) sublayer is used to give higher access priority to the time critical emergency message as a higher priority and to communication channel compared with other messages. Second, a trinary is designed to iteratively partition the communication range into small sectors. In 3P3B outperforms benchmarks of the existing broadcast protocols in VANETs in terms of the packet delivery ratio, average message speed, message progress and communication delay.

Authors and Affiliations

Mr. K. Kamal Kishore

Keywords

Related Articles

Analyzing Sun Angles of Solar Time Dial for Design of Building Envelope Components for the Region of Andhra Pradesh, India

The solar radiation is a major factor for thermal condition in built forms. The residential and commercial buildings consume 45 to 55 percentage of the energy for thermal comforts. It was evident that the higher the ener...

Low Voltage Low Dropout Regulator with Current Splitting Technique

Integrated regulators are used for power management in modern portable devices. There are many primary regulators and post regulators which converts high dc voltages, but they are unable to work on low voltage with low q...

Porous Asphat Design for Cold Climate Use

Porous asphalt pavements offer an alternative technology for stormwater management. A porous asphalt pavement differs from traditional asphalt pavement designs in that the structure permits fluids to pass freely through...

Signed Total Domatic Number of Directed Circulant Graphs

A function f : V(D) → {−1, 1} is a signed total dominating function (STDF) of a directed graph D, if forevery vertex v ∈ V, ( ( )) ∑ ∈ ( ) ( ) . A STDF of a directed graph D is said to be SETDF iffor every vertex v ∈ V,...

Control of Power Flow in Transmission Line Using UPFC

Electrical power systems is a large interrelated network which requires a careful design to maintain the system with constant power flow operation without any limitations. Flexible to improve the system stability of a po...

Download PDF file
  • EP ID EP221546
  • DOI -
  • Views 102
  • Downloads 0

How To Cite

Mr. K. Kamal Kishore (2015). An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Communications. International journal of Emerging Trends in Science and Technology, 2(2), 1792-1799. https://europub.co.uk/articles/-A-221546