An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Communications
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2015, Vol 2, Issue 2
Abstract
Now a days people facing many problems because of traffic. To avoid this problem VANET is used here.In this group signature is used in VANETs to realized unauthorized authentication. In the existing system, group signatures is used and its suffers from long delay in the certificate revocation list (CRL) checking and process of signature verification, high message loss. In VANET in which roadside units (RSUs) are responsible for distributing group private keys and to managing vehicles in a localized manner. Then to avoid time consuming, hash message authentication (HMAC) is used here. The proposed work of this project is trinary partitioned black-burst-based broadcast protocol(3P3B) consists of two primary mechanisms. First, a mini distributed interframe space (DIFS) in a medium access control (MAC) sublayer is used to give higher access priority to the time critical emergency message as a higher priority and to communication channel compared with other messages. Second, a trinary is designed to iteratively partition the communication range into small sectors. In 3P3B outperforms benchmarks of the existing broadcast protocols in VANETs in terms of the packet delivery ratio, average message speed, message progress and communication delay.
Authors and Affiliations
Mr. K. Kamal Kishore
Labourers of Unorganised sectors and their Problems
It is crystal clear that unorganized labours are living their life below the minimum standards level. Without a doubt, many informal workers are not in a position to meet their daily requirement. Maximum numbers of women...
Globalization: A Mathematical Biology & Topology Transformation
“The secrets of Globalization lie in Mathematics” is what this Paper really targets. Mathematicians like Abraham Robinson solved in 1960 the three hundred year old problem of infinitesimals in the belief that infinitesim...
Role of Consumer Protection Act, 1986 in Protecting the Consumers
Consumers are the largest economic group in any country. They are the central point of all economic activity. Everyone is a born consumer, whether he is an industrialist, a producer, a trader engaged in any profession or...
Study on Framework for Efficient Document Clustering on Centralized System
The word "cluster" is used broadly in computer networking to refer to a number of different implementations of shared computing resources. Typically, a cluster integrates the resources of two or more computing devices (t...
Isolation and Screening of Protease Producing Bacteria from Soil
Proteases execute a large variety of functions and have important biotechnological applications. Proteases represent one of the three largest groups of industrial enzymes and find application in detergents, leather indus...