SlideShare una empresa de Scribd logo
1 de 6
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 1, JANUARY 2014 
EMAP: Expedite Message Authentication 
Protocol for Vehicular Ad Hoc Networks
Abstract 
 Vehicular ad hoc networks (VANETs) adopt the Public Key 
Infrastructure (PKI) and Certificate Revocation Lists (CRLs) for 
their security. In any PKI system, the authentication of a received 
message is performed by checking if the certificate of the sender is 
included in the current CRL, and verifying the authenticity of the 
certificate and signature of the sender. In this paper, we propose an 
Expedite Message Authentication Protocol (EMAP) for VANETs, 
which replaces the time-consuming CRL checking process by an 
efficient revocation checking process. The revocation check 
process in EMAP uses a keyed Hash Message Authentication Code 
ðHMACÞ, where the key used in calculating theHMAC is shared 
only between nonrevoked On-Board Units (OBUs). In addition, 
EMAP uses a novel probabilistic key distribution, which enables 
nonrevoked OBUs to securely share and update a secret key. EMAP 
can significantly decrease the message loss ratio due to the 
message verification delay compared with the conventional 
authentication methods employing CRL. By conducting security 
analysis and performance evaluation, EMAP is demonstrated to be 
secure and efficient.
Existing System 
 Existing system focused on the problem of collusion in distance 
bounding, in which two dishonest verifiers pool information to 
make one of the verifiers look closer by sending similar kind of 
signals. 
 A verifier could then request to have a key distributed to it and 
the prover, which the prover could then use to authenticate its 
authenticated response. 
 Existing methodology involves the 
 Validation of the request by key exchanges and remedial measures 
in checking the genuinity of the message. – if the data is not proper 
reject the message which indicates genuinity is a notable problem. 
 Validating the users data origin in turn checking out the MAC 
data of the user requests raised. – arising from other machine 
indicates the genuinity of request origin. 
 Verifying the turn around time taken for processing the request. 
inappropriate duration indicates an issue at the prover side
Proposed System 
 Proposed system holds the existing processing model with an 
enhanced ciphering algorithm to make the system more robust. 
 Although, the researchers are interested in authentication 
enhanced system. We are utilizing some of the concepts 
introduced in the secrecy logic for authenticating the users. This 
involves the logic to show what a verifier can conclude from 
interacting with an honest prover.A timing based input 
information followed by consecutive timing measurement 
provides more optimistic approach in authenticating the user. 
 Our proposed system provides a proof breaks down concept if 
the prover is dishonest. 
 Validate the authentication information provided by the user. 
 Extract the MAC address to validate the request origin location. 
 Consecutive Execution time duration on the request processing
System Requirements 
 Hardware Requirements: 
Processor : Core 2 duo 
Speed : 2.2GHZ 
RAM : 2GB 
Hard Disk : 160GB 
 Software Requirements: 
Platform : DOTNET (VS2010) , ASP.NET 
Dotnet framework 4.0 
Database : SQL Server 2008 R2
Architecture Diagram

Más contenido relacionado

La actualidad más candente

USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES
USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICESUSING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES
USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICESijsptm
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageJPINFOTECH JAYAPRAKASH
 
05 20254 financial stock application
05 20254 financial stock application05 20254 financial stock application
05 20254 financial stock applicationIAESIJEECS
 
Trusted Hardware Database With Privacy And Data Confidentiality
Trusted Hardware Database With Privacy And Data ConfidentialityTrusted Hardware Database With Privacy And Data Confidentiality
Trusted Hardware Database With Privacy And Data Confidentialitytheijes
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storageparry prabhu
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageMustaq Syed
 
IEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detection
IEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detectionIEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detection
IEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detectionmadhucharis
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageJPINFOTECH JAYAPRAKASH
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storageLeMeniz Infotech
 
Attributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryptionAttributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryptionKaashivInfoTech Company
 
Attribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionAttribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionIEEEFINALYEARPROJECTS
 
Mmb authenticated index for verifiable
Mmb authenticated index for verifiableMmb authenticated index for verifiable
Mmb authenticated index for verifiableKamal Spring
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storageNagamalleswararao Tadikonda
 
Smart Contract Security Testing
Smart Contract Security TestingSmart Contract Security Testing
Smart Contract Security TestingDilum Bandara
 

La actualidad más candente (16)

32
3232
32
 
USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES
USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICESUSING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES
USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
05 20254 financial stock application
05 20254 financial stock application05 20254 financial stock application
05 20254 financial stock application
 
Trusted Hardware Database With Privacy And Data Confidentiality
Trusted Hardware Database With Privacy And Data ConfidentialityTrusted Hardware Database With Privacy And Data Confidentiality
Trusted Hardware Database With Privacy And Data Confidentiality
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
IEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detection
IEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detectionIEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detection
IEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detection
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
Attributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryptionAttributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryption
 
Attribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionAttribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryption
 
Mmb authenticated index for verifiable
Mmb authenticated index for verifiableMmb authenticated index for verifiable
Mmb authenticated index for verifiable
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
AAA Protocol
AAA ProtocolAAA Protocol
AAA Protocol
 
Smart Contract Security Testing
Smart Contract Security TestingSmart Contract Security Testing
Smart Contract Security Testing
 

Similar a EMAP Protocol Expedites Message Authentication in VANETs

Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEcway Technologies
 
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Java  emap expedite message authentication protocol for vehicular ad hoc netw...Java  emap expedite message authentication protocol for vehicular ad hoc netw...
Java emap expedite message authentication protocol for vehicular ad hoc netw...ecwayerode
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksecway
 
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Java  emap expedite message authentication protocol for vehicular ad hoc netw...Java  emap expedite message authentication protocol for vehicular ad hoc netw...
Java emap expedite message authentication protocol for vehicular ad hoc netw...Ecway Technologies
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEcway Technologies
 
Distance-bounding facing both mafia and distance frauds
Distance-bounding facing both mafia and distance fraudsDistance-bounding facing both mafia and distance frauds
Distance-bounding facing both mafia and distance fraudsKaashivInfoTech Company
 
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksEMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksPonmudiselvan.N Selvan
 
Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Improving Security Features In MANET Authentication Through Scrutiny Of The C...Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Improving Security Features In MANET Authentication Through Scrutiny Of The C...Editor IJMTER
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol     for vehicular ad hoc networksEmap expedite message authentication protocol     for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksMadan Golla
 
Balancing performance, accuracy, and precision for secure cloud transactions
Balancing performance, accuracy, and precision for secure cloud transactionsBalancing performance, accuracy, and precision for secure cloud transactions
Balancing performance, accuracy, and precision for secure cloud transactionsPapitha Velumani
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...Ecwaytech
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEcwaytech
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksecwayprojects
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...Ecwayt
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEcwayt
 
top-k query result completeness verification in tiered sensor networks
top-k query result completeness verification in tiered sensor networkstop-k query result completeness verification in tiered sensor networks
top-k query result completeness verification in tiered sensor networksswathi78
 
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
JPJ1449 Efficient Authentication for Mobile and Pervasive ComputingJPJ1449 Efficient Authentication for Mobile and Pervasive Computing
JPJ1449 Efficient Authentication for Mobile and Pervasive Computingchennaijp
 
Balancing performance, accuracy, and precision for secure cloud transactions
Balancing performance, accuracy, and precision for secure cloud transactionsBalancing performance, accuracy, and precision for secure cloud transactions
Balancing performance, accuracy, and precision for secure cloud transactionsieeepondy
 
A novel secure handover mechanism in
A novel secure handover mechanism inA novel secure handover mechanism in
A novel secure handover mechanism inijitcs
 
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETsAn Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETsJAYAPRAKASH JPINFOTECH
 

Similar a EMAP Protocol Expedites Message Authentication in VANETs (20)

Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Java  emap expedite message authentication protocol for vehicular ad hoc netw...Java  emap expedite message authentication protocol for vehicular ad hoc netw...
Java emap expedite message authentication protocol for vehicular ad hoc netw...
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Java  emap expedite message authentication protocol for vehicular ad hoc netw...Java  emap expedite message authentication protocol for vehicular ad hoc netw...
Java emap expedite message authentication protocol for vehicular ad hoc netw...
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Distance-bounding facing both mafia and distance frauds
Distance-bounding facing both mafia and distance fraudsDistance-bounding facing both mafia and distance frauds
Distance-bounding facing both mafia and distance frauds
 
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksEMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
 
Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Improving Security Features In MANET Authentication Through Scrutiny Of The C...Improving Security Features In MANET Authentication Through Scrutiny Of The C...
Improving Security Features In MANET Authentication Through Scrutiny Of The C...
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol     for vehicular ad hoc networksEmap expedite message authentication protocol     for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Balancing performance, accuracy, and precision for secure cloud transactions
Balancing performance, accuracy, and precision for secure cloud transactionsBalancing performance, accuracy, and precision for secure cloud transactions
Balancing performance, accuracy, and precision for secure cloud transactions
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
top-k query result completeness verification in tiered sensor networks
top-k query result completeness verification in tiered sensor networkstop-k query result completeness verification in tiered sensor networks
top-k query result completeness verification in tiered sensor networks
 
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
JPJ1449 Efficient Authentication for Mobile and Pervasive ComputingJPJ1449 Efficient Authentication for Mobile and Pervasive Computing
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
 
Balancing performance, accuracy, and precision for secure cloud transactions
Balancing performance, accuracy, and precision for secure cloud transactionsBalancing performance, accuracy, and precision for secure cloud transactions
Balancing performance, accuracy, and precision for secure cloud transactions
 
A novel secure handover mechanism in
A novel secure handover mechanism inA novel secure handover mechanism in
A novel secure handover mechanism in
 
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETsAn Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
 

Más de KaashivInfoTech Company

A Framework for Periodic Outlier Pattern Detection in Time-Series Sequences
A Framework for Periodic Outlier Pattern Detection in Time-Series SequencesA Framework for Periodic Outlier Pattern Detection in Time-Series Sequences
A Framework for Periodic Outlier Pattern Detection in Time-Series SequencesKaashivInfoTech Company
 
Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithre...
Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithre...Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithre...
Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithre...KaashivInfoTech Company
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud EnvironmentKaashivInfoTech Company
 
Operational Data Fusion Framework for Building Frequent Land sat-Like Imagery
Operational Data Fusion Framework for Building Frequent Land sat-Like ImageryOperational Data Fusion Framework for Building Frequent Land sat-Like Imagery
Operational Data Fusion Framework for Building Frequent Land sat-Like ImageryKaashivInfoTech Company
 
Mining Gene Expression Data Focusing Cancer Therapeutics: A Digest
Mining Gene Expression Data Focusing Cancer Therapeutics: A DigestMining Gene Expression Data Focusing Cancer Therapeutics: A Digest
Mining Gene Expression Data Focusing Cancer Therapeutics: A DigestKaashivInfoTech Company
 
CoDe Modeling of Graph Composition for Data Warehouse Report Visualization
CoDe Modeling of Graph Composition for Data Warehouse Report VisualizationCoDe Modeling of Graph Composition for Data Warehouse Report Visualization
CoDe Modeling of Graph Composition for Data Warehouse Report VisualizationKaashivInfoTech Company
 
Data-Centric OS Kernel Malware Characterization
Data-Centric OS Kernel Malware CharacterizationData-Centric OS Kernel Malware Characterization
Data-Centric OS Kernel Malware CharacterizationKaashivInfoTech Company
 
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...KaashivInfoTech Company
 
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...KaashivInfoTech Company
 
Localization of License Plate Number Using Dynamic Image Processing Techniq...
Localization of License Plate Number Using Dynamic Image Processing   Techniq...Localization of License Plate Number Using Dynamic Image Processing   Techniq...
Localization of License Plate Number Using Dynamic Image Processing Techniq...KaashivInfoTech Company
 
Analysis of Field Data on Web Security Vulnerabilities
Analysis of Field Data on Web Security VulnerabilitiesAnalysis of Field Data on Web Security Vulnerabilities
Analysis of Field Data on Web Security VulnerabilitiesKaashivInfoTech Company
 
A New Algorithm for Inferring User Search Goals with Feedback Sessions
A New Algorithm for Inferring User Search Goals with Feedback SessionsA New Algorithm for Inferring User Search Goals with Feedback Sessions
A New Algorithm for Inferring User Search Goals with Feedback SessionsKaashivInfoTech Company
 
Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery...
Traffic Pattern-Based Content Leakage Detection for Trusted Content  Delivery...Traffic Pattern-Based Content Leakage Detection for Trusted Content  Delivery...
Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery...KaashivInfoTech Company
 

Más de KaashivInfoTech Company (13)

A Framework for Periodic Outlier Pattern Detection in Time-Series Sequences
A Framework for Periodic Outlier Pattern Detection in Time-Series SequencesA Framework for Periodic Outlier Pattern Detection in Time-Series Sequences
A Framework for Periodic Outlier Pattern Detection in Time-Series Sequences
 
Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithre...
Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithre...Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithre...
Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithre...
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud Environment
 
Operational Data Fusion Framework for Building Frequent Land sat-Like Imagery
Operational Data Fusion Framework for Building Frequent Land sat-Like ImageryOperational Data Fusion Framework for Building Frequent Land sat-Like Imagery
Operational Data Fusion Framework for Building Frequent Land sat-Like Imagery
 
Mining Gene Expression Data Focusing Cancer Therapeutics: A Digest
Mining Gene Expression Data Focusing Cancer Therapeutics: A DigestMining Gene Expression Data Focusing Cancer Therapeutics: A Digest
Mining Gene Expression Data Focusing Cancer Therapeutics: A Digest
 
CoDe Modeling of Graph Composition for Data Warehouse Report Visualization
CoDe Modeling of Graph Composition for Data Warehouse Report VisualizationCoDe Modeling of Graph Composition for Data Warehouse Report Visualization
CoDe Modeling of Graph Composition for Data Warehouse Report Visualization
 
Data-Centric OS Kernel Malware Characterization
Data-Centric OS Kernel Malware CharacterizationData-Centric OS Kernel Malware Characterization
Data-Centric OS Kernel Malware Characterization
 
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...
 
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...
 
Localization of License Plate Number Using Dynamic Image Processing Techniq...
Localization of License Plate Number Using Dynamic Image Processing   Techniq...Localization of License Plate Number Using Dynamic Image Processing   Techniq...
Localization of License Plate Number Using Dynamic Image Processing Techniq...
 
Analysis of Field Data on Web Security Vulnerabilities
Analysis of Field Data on Web Security VulnerabilitiesAnalysis of Field Data on Web Security Vulnerabilities
Analysis of Field Data on Web Security Vulnerabilities
 
A New Algorithm for Inferring User Search Goals with Feedback Sessions
A New Algorithm for Inferring User Search Goals with Feedback SessionsA New Algorithm for Inferring User Search Goals with Feedback Sessions
A New Algorithm for Inferring User Search Goals with Feedback Sessions
 
Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery...
Traffic Pattern-Based Content Leakage Detection for Trusted Content  Delivery...Traffic Pattern-Based Content Leakage Detection for Trusted Content  Delivery...
Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery...
 

Último

Rajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
Rajkot Call Girls Contact Number +919358341802 Call Girls In RajkotRajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
Rajkot Call Girls Contact Number +919358341802 Call Girls In RajkotSivanyaPandeya
 
Udupi Call girl service 6289102337 Udupi escort service
Udupi Call girl service 6289102337 Udupi escort serviceUdupi Call girl service 6289102337 Udupi escort service
Udupi Call girl service 6289102337 Udupi escort servicemaheshsingh64440
 
Lucknow ❣️ Call Girl 97487*63073 Call Girls in Lucknow Escort service book now
Lucknow ❣️  Call Girl 97487*63073 Call Girls in Lucknow Escort service book nowLucknow ❣️  Call Girl 97487*63073 Call Girls in Lucknow Escort service book now
Lucknow ❣️ Call Girl 97487*63073 Call Girls in Lucknow Escort service book nowapshanarani255
 
Call Girls in Saket (delhi) call me [8264348440 ] escort service 24X7
Call Girls in Saket (delhi) call me [8264348440 ] escort service 24X7Call Girls in Saket (delhi) call me [8264348440 ] escort service 24X7
Call Girls in Saket (delhi) call me [8264348440 ] escort service 24X7soniya singh
 
Bhopal Call girl service 6289102337 bhopal escort service
Bhopal Call girl service 6289102337 bhopal escort serviceBhopal Call girl service 6289102337 bhopal escort service
Bhopal Call girl service 6289102337 bhopal escort servicemaheshsingh64440
 
Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...
Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...
Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...aakahthapa70
 
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...riyasharma00119
 
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7Sana Rajpoot
 
Indore ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
Indore  ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book nowIndore  ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
Indore ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book nowapshanarani255
 
Kolkata 💋 Call Girl 9748763073 Call Girls in Kolkata Escort service book now
Kolkata 💋 Call Girl 9748763073 Call Girls in Kolkata Escort service book nowKolkata 💋 Call Girl 9748763073 Call Girls in Kolkata Escort service book now
Kolkata 💋 Call Girl 9748763073 Call Girls in Kolkata Escort service book nowapshanarani255
 
+91-9899900591 Russian Call Girls In New Delhi Independent Russian Call Girls...
+91-9899900591 Russian Call Girls In New Delhi Independent Russian Call Girls...+91-9899900591 Russian Call Girls In New Delhi Independent Russian Call Girls...
+91-9899900591 Russian Call Girls In New Delhi Independent Russian Call Girls...kauryashika82
 
Call Now ☎9870417354|| Call Girls in Gurgaon Sector 13 Escort Service Gurgaon...
Call Now ☎9870417354|| Call Girls in Gurgaon Sector 13 Escort Service Gurgaon...Call Now ☎9870417354|| Call Girls in Gurgaon Sector 13 Escort Service Gurgaon...
Call Now ☎9870417354|| Call Girls in Gurgaon Sector 13 Escort Service Gurgaon...riyadelhic riyadelhic
 
Girls For Night in Islamabad | 03274100048 🔞
Girls For Night in Islamabad | 03274100048 🔞Girls For Night in Islamabad | 03274100048 🔞
Girls For Night in Islamabad | 03274100048 🔞Ifra Zohaib
 
Call Now HIgh profile ☎9870417354|| Call Girls in Ghaziabad Escort Service De...
Call Now HIgh profile ☎9870417354|| Call Girls in Ghaziabad Escort Service De...Call Now HIgh profile ☎9870417354|| Call Girls in Ghaziabad Escort Service De...
Call Now HIgh profile ☎9870417354|| Call Girls in Ghaziabad Escort Service De...riyadelhic riyadelhic
 
Radhika Call Girls In Jaipur 9358660226 Escorts service
Radhika Call Girls In Jaipur 9358660226 Escorts serviceRadhika Call Girls In Jaipur 9358660226 Escorts service
Radhika Call Girls In Jaipur 9358660226 Escorts servicerahul222jai
 
9999266834 Call Girls In Noida Sector 18 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 18 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 18 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 18 (Delhi) Call Girl Servicenishacall1
 
Call Girls In Noida Free Ad 24/7 Hours Online Call 9310659962 Shot 2000 Night...
Call Girls In Noida Free Ad 24/7 Hours Online Call 9310659962 Shot 2000 Night...Call Girls In Noida Free Ad 24/7 Hours Online Call 9310659962 Shot 2000 Night...
Call Girls In Noida Free Ad 24/7 Hours Online Call 9310659962 Shot 2000 Night...DelhiMahipalpur
 
9999266834 Call Girls In Noida Sector 37 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 37 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 37 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 37 (Delhi) Call Girl Servicenishacall1
 
MYSORE CALL GIRLS ESCORT SER 92628/71154
MYSORE CALL GIRLS ESCORT SER 92628/71154MYSORE CALL GIRLS ESCORT SER 92628/71154
MYSORE CALL GIRLS ESCORT SER 92628/71154NiteshKumar82226
 
+91-9310611641 Russian Call Girls In New Delhi Independent Russian Call Girls...
+91-9310611641 Russian Call Girls In New Delhi Independent Russian Call Girls...+91-9310611641 Russian Call Girls In New Delhi Independent Russian Call Girls...
+91-9310611641 Russian Call Girls In New Delhi Independent Russian Call Girls...teencall080
 

Último (20)

Rajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
Rajkot Call Girls Contact Number +919358341802 Call Girls In RajkotRajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
Rajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
 
Udupi Call girl service 6289102337 Udupi escort service
Udupi Call girl service 6289102337 Udupi escort serviceUdupi Call girl service 6289102337 Udupi escort service
Udupi Call girl service 6289102337 Udupi escort service
 
Lucknow ❣️ Call Girl 97487*63073 Call Girls in Lucknow Escort service book now
Lucknow ❣️  Call Girl 97487*63073 Call Girls in Lucknow Escort service book nowLucknow ❣️  Call Girl 97487*63073 Call Girls in Lucknow Escort service book now
Lucknow ❣️ Call Girl 97487*63073 Call Girls in Lucknow Escort service book now
 
Call Girls in Saket (delhi) call me [8264348440 ] escort service 24X7
Call Girls in Saket (delhi) call me [8264348440 ] escort service 24X7Call Girls in Saket (delhi) call me [8264348440 ] escort service 24X7
Call Girls in Saket (delhi) call me [8264348440 ] escort service 24X7
 
Bhopal Call girl service 6289102337 bhopal escort service
Bhopal Call girl service 6289102337 bhopal escort serviceBhopal Call girl service 6289102337 bhopal escort service
Bhopal Call girl service 6289102337 bhopal escort service
 
Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...
Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...
Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...
 
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
 
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
 
Indore ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
Indore  ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book nowIndore  ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
Indore ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
 
Kolkata 💋 Call Girl 9748763073 Call Girls in Kolkata Escort service book now
Kolkata 💋 Call Girl 9748763073 Call Girls in Kolkata Escort service book nowKolkata 💋 Call Girl 9748763073 Call Girls in Kolkata Escort service book now
Kolkata 💋 Call Girl 9748763073 Call Girls in Kolkata Escort service book now
 
+91-9899900591 Russian Call Girls In New Delhi Independent Russian Call Girls...
+91-9899900591 Russian Call Girls In New Delhi Independent Russian Call Girls...+91-9899900591 Russian Call Girls In New Delhi Independent Russian Call Girls...
+91-9899900591 Russian Call Girls In New Delhi Independent Russian Call Girls...
 
Call Now ☎9870417354|| Call Girls in Gurgaon Sector 13 Escort Service Gurgaon...
Call Now ☎9870417354|| Call Girls in Gurgaon Sector 13 Escort Service Gurgaon...Call Now ☎9870417354|| Call Girls in Gurgaon Sector 13 Escort Service Gurgaon...
Call Now ☎9870417354|| Call Girls in Gurgaon Sector 13 Escort Service Gurgaon...
 
Girls For Night in Islamabad | 03274100048 🔞
Girls For Night in Islamabad | 03274100048 🔞Girls For Night in Islamabad | 03274100048 🔞
Girls For Night in Islamabad | 03274100048 🔞
 
Call Now HIgh profile ☎9870417354|| Call Girls in Ghaziabad Escort Service De...
Call Now HIgh profile ☎9870417354|| Call Girls in Ghaziabad Escort Service De...Call Now HIgh profile ☎9870417354|| Call Girls in Ghaziabad Escort Service De...
Call Now HIgh profile ☎9870417354|| Call Girls in Ghaziabad Escort Service De...
 
Radhika Call Girls In Jaipur 9358660226 Escorts service
Radhika Call Girls In Jaipur 9358660226 Escorts serviceRadhika Call Girls In Jaipur 9358660226 Escorts service
Radhika Call Girls In Jaipur 9358660226 Escorts service
 
9999266834 Call Girls In Noida Sector 18 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 18 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 18 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 18 (Delhi) Call Girl Service
 
Call Girls In Noida Free Ad 24/7 Hours Online Call 9310659962 Shot 2000 Night...
Call Girls In Noida Free Ad 24/7 Hours Online Call 9310659962 Shot 2000 Night...Call Girls In Noida Free Ad 24/7 Hours Online Call 9310659962 Shot 2000 Night...
Call Girls In Noida Free Ad 24/7 Hours Online Call 9310659962 Shot 2000 Night...
 
9999266834 Call Girls In Noida Sector 37 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 37 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 37 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 37 (Delhi) Call Girl Service
 
MYSORE CALL GIRLS ESCORT SER 92628/71154
MYSORE CALL GIRLS ESCORT SER 92628/71154MYSORE CALL GIRLS ESCORT SER 92628/71154
MYSORE CALL GIRLS ESCORT SER 92628/71154
 
+91-9310611641 Russian Call Girls In New Delhi Independent Russian Call Girls...
+91-9310611641 Russian Call Girls In New Delhi Independent Russian Call Girls...+91-9310611641 Russian Call Girls In New Delhi Independent Russian Call Girls...
+91-9310611641 Russian Call Girls In New Delhi Independent Russian Call Girls...
 

EMAP Protocol Expedites Message Authentication in VANETs

  • 1. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 1, JANUARY 2014 EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
  • 2. Abstract  Vehicular ad hoc networks (VANETs) adopt the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs) for their security. In any PKI system, the authentication of a received message is performed by checking if the certificate of the sender is included in the current CRL, and verifying the authenticity of the certificate and signature of the sender. In this paper, we propose an Expedite Message Authentication Protocol (EMAP) for VANETs, which replaces the time-consuming CRL checking process by an efficient revocation checking process. The revocation check process in EMAP uses a keyed Hash Message Authentication Code ðHMACÞ, where the key used in calculating theHMAC is shared only between nonrevoked On-Board Units (OBUs). In addition, EMAP uses a novel probabilistic key distribution, which enables nonrevoked OBUs to securely share and update a secret key. EMAP can significantly decrease the message loss ratio due to the message verification delay compared with the conventional authentication methods employing CRL. By conducting security analysis and performance evaluation, EMAP is demonstrated to be secure and efficient.
  • 3. Existing System  Existing system focused on the problem of collusion in distance bounding, in which two dishonest verifiers pool information to make one of the verifiers look closer by sending similar kind of signals.  A verifier could then request to have a key distributed to it and the prover, which the prover could then use to authenticate its authenticated response.  Existing methodology involves the  Validation of the request by key exchanges and remedial measures in checking the genuinity of the message. – if the data is not proper reject the message which indicates genuinity is a notable problem.  Validating the users data origin in turn checking out the MAC data of the user requests raised. – arising from other machine indicates the genuinity of request origin.  Verifying the turn around time taken for processing the request. inappropriate duration indicates an issue at the prover side
  • 4. Proposed System  Proposed system holds the existing processing model with an enhanced ciphering algorithm to make the system more robust.  Although, the researchers are interested in authentication enhanced system. We are utilizing some of the concepts introduced in the secrecy logic for authenticating the users. This involves the logic to show what a verifier can conclude from interacting with an honest prover.A timing based input information followed by consecutive timing measurement provides more optimistic approach in authenticating the user.  Our proposed system provides a proof breaks down concept if the prover is dishonest.  Validate the authentication information provided by the user.  Extract the MAC address to validate the request origin location.  Consecutive Execution time duration on the request processing
  • 5. System Requirements  Hardware Requirements: Processor : Core 2 duo Speed : 2.2GHZ RAM : 2GB Hard Disk : 160GB  Software Requirements: Platform : DOTNET (VS2010) , ASP.NET Dotnet framework 4.0 Database : SQL Server 2008 R2