Enhanced Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks Using Authentication Group Key
Journal Title: Bonfring International Journal of Software Engineering and Soft Computing - Year 2018, Vol 8, Issue 1
Abstract
The vehicular ad-hoc networks (VANETs) are expected to support the diverse infrastructure based commercial services, including internet access, real-time traffic concerns, video streaming and content distribution. It also enables a wide range of promising applications and services. It has brought new security challenges due to their mobile and infrastructure less nature. In particular, confidentiality and location privacy are regarded as the most critical security concerns for securing service-oriented vehicular networks. Forwarded messages in vehicular ad-hoc networks are primarily multimedia data, including structured data, plain text, sound, and video which require access control with efficient privacy preservation. In this project, Ciphertext-policy attribute-based encryption (CP-ABE) delegation scheme is proposed, which allows road side units (RSUs) to perform most of the computation for the purpose of improving the decryption efficiency of the vehicles. In addition to that, proposed a novel Sybil attack detection mechanism, Footprint, using the trajectories of vehicles for identification while still preserving their location privacy. More specifically, when a vehicle approaches a road-side unit (RSU), it actively demands an authorized message from the RSU as the proof of the appearance time at this RSU. A location-hidden authorized message generation scheme is designed for two objectives: first, RSU signatures on messages are signer ambiguous so that the RSU location information is concealed from the resulted authorized message; Second, two authorized messages signed by the same RSU within the same given period of time are recognizable so that they can be used for identification. If the RSU is found to be failure but not updated with Trusted Authority, the current RSU which reads the records from the vehicle, queries the Trusted Authority about all the nearest nodes of missed RSU (second hop) from current RSU, and calculate the two hop timings and suspect the vehicle if the messages are not matched.
Authors and Affiliations
Poongodi R. K, Sivakumar T
Fit for Life: Home Personal Coach
The development of mobile applications in recent years has been a huge explosion that led to the transformation of normal life into a life linked to mobile services and applications, here in this introduction we presenta...
Secure Medical Data Transmission in Body Area Sensor Networks Using Dynamic Biometrics and Steganography
In this paper, we have used ECG signal for secure key exchange between two nodes of the same Body Sensor Network (BSN). InterPulsed Interval (IPI) of the ECG signal is considered as a biometric characteristic for key gen...
Locating Hybrid Power Flow Controller in a 30-Bus System Using Chaotic Evolutionary Algorithm to Improve Power System Stability
The Hybrid Power Flow Controller (HPFC) is a versatile FACTS device which can independently control the power losses and voltage stability. The main purpose of my work is to identify the optimal location and sizing of Hy...
Hybridization Approach to Classify Big Data Using Social Internet of Things
Recently there has been quite a number of independent research activities that investigated the potentialities of integrating social networking concepts into Internet of Things solutions. The resulting paradigm, named So...
Assessment of Rainfall and Temperature using OSA Estimators of Extreme Value Distributions
Estimation of rainfall and temperature for a desired return period is one of the pre-requisite for planning, design and management of the civil structures at the project site. This paper illustrates the use of extreme va...