IJIRST (International Journal for Innovative Research in Science & Technology)ISSN (online) : 2349-6010

 International Journal for Innovative Research in Science & Technology

Secure and Privacy Preserving Message Authentication with Chameleon Hashing using Proxy Vehicles in Vanets


Print Email Cite
International Journal for Innovative Research in Science & Technology
Volume 3 Issue - 2
Year of Publication : 2016
Authors : Athira P J ; Dr. S Dhanabal; Mr. Naveen Raja S M

BibTeX:

@article{IJIRSTV3I2056,
     title={Secure and Privacy Preserving Message Authentication with Chameleon Hashing using Proxy Vehicles in Vanets},
     author={Athira P J, Dr. S Dhanabal and Mr. Naveen Raja S M},
     journal={International Journal for Innovative Research in Science & Technology},
     volume={3},
     number={2},
     pages={149--154},
     year={},
     url={http://www.ijirst.org/articles/IJIRSTV3I2056.pdf},
     publisher={IJIRST (International Journal for Innovative Research in Science & Technology)},
}



Abstract:

Several services and applications are there in daily life which requires preserving privacy and data security in communications. In Vehicular Ad-hoc Networks to improve the driving comfort and safety of information, the messages are broadcasted regularly. Because of broadcasting of messages without the security and privacy guarantees, the messages can be easily retrieved by the third party. Only the certificate authority should be able to recover vehicle’s real identity when the vehicles are in a dispute event. To overcome this issue chameleon hashing based privacy preserving method is used. This scheme uses an elliptic curve based light weight privacy preserving protocol that exploits dynamic public keys to improve the security and efficiency of VANET communications. Although it is one of the best schemes, it fails to deal with certain issues. One of the main disadvantages is that it is difficult for a single Road Side Unit (RSU) to verify each vehicle’s signature sequentially when a large number of vehicles emerge under the coverage area of an RSU. To reduce this computational difficulty, the proposed scheme uses proxy vehicles which are acting as an intermediate between RSU and vehicles. Proxy vehicles are used to authenticate multiple messages from the requested users using a verification function at the same time. The proposed system improves the total security of the existing system by adding separate secure and private authentication on messages so that the third party cannot access the messages and modify it.


Keywords:

Elliptic Curve Based Chameleon Hashing, Privacy Preservation, Proxy Authentication, Proxy Vehicle, Security and Privacy, Vehicular Ad-Hoc Networks


Download Article