An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Communications
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2015, Vol 2, Issue 2
Abstract
Now a days people facing many problems because of traffic. To avoid this problem VANET is used here.In this group signature is used in VANETs to realized unauthorized authentication. In the existing system, group signatures is used and its suffers from long delay in the certificate revocation list (CRL) checking and process of signature verification, high message loss. In VANET in which roadside units (RSUs) are responsible for distributing group private keys and to managing vehicles in a localized manner. Then to avoid time consuming, hash message authentication (HMAC) is used here. The proposed work of this project is trinary partitioned black-burst-based broadcast protocol(3P3B) consists of two primary mechanisms. First, a mini distributed interframe space (DIFS) in a medium access control (MAC) sublayer is used to give higher access priority to the time critical emergency message as a higher priority and to communication channel compared with other messages. Second, a trinary is designed to iteratively partition the communication range into small sectors. In 3P3B outperforms benchmarks of the existing broadcast protocols in VANETs in terms of the packet delivery ratio, average message speed, message progress and communication delay.
Authors and Affiliations
Mr. K. Kamal Kishore
Evolution of the SELF in Lady Oracle by Margaret Atwood
Feminism is essentially linked with cultural moorings and social taboos. Every country has its own cultural heritage. As fiction is bound to the mirror of a particular country, feminism has assumed new shapes and name. W...
Keyword NNE for the Fast Keyword Cover Search
Mobile computing is very wide popular and so as its applications. Along with it, accessing position based services of the objects have increased the use of spatial object search. Spatial database contains each object as...
Multideployment and Multisnapshotting on IAAS Cloud Environments
Infrastructure as a Service (IaaS) cloud computing has revolutionized the way we think of acquiring resources by introducing a simple change: allowing users to lease computational resources from the cloud provider’s data...
Space Time Adaptive Processing for Clutter Suppression in Radar
Space-time adaptive processing (STAP) is a signal processing technique most commonly used in radar systems where interference is a problem. The radar signal processor is used to remove the unintentional cluttering effect...
Phenology of Fingermillet (Eleusine coracana L.) in Relation to AgroClimatic Indices under Different Sowing Dates
A field experiment was conducted during kharif 2015 at Agricultural College Farm, Bapatla on sandy loam soil to study the phenology, accumulated growing degree days, photo thermal unit, helio-thermal unit, heat use effic...