Fast and Secure Countermand Verification Process Using MAP in Vehicular Ad Hoc Network | Abstract

ISSN ONLINE(2319-8753)PRINT(2347-6710)

Research Article Open Access

Fast and Secure Countermand Verification Process Using MAP in Vehicular Ad Hoc Network

Abstract

Secure Authentication in VANNET is deploying by Public Key Infrastructure (PKI), and to use Certificate Revocation Lists (CRLs) for managing the revoked certificates. In PKI, each entity in the network holds an authentic certificate, and every message should be digitally signed before its transmission. A CRL, usually issued by a Trusted Authority (TA), contains the list of revoked certificates. In a PKI system, the authentication of any message is performed by first checking in the CRL. The user in the CRL list can be maintained by OBU and the certificate list can be huge. So, checking for the authentication can be performed by using linear search or some other searches in optimized way. In the proposed system, Message Authentication Protocol (MAP) can be used for authentication purposes here to check the revocation list based on Keyed Hash Message Authentication code generated by MAP. The OBU units can maintain the secret keys and it can be communicate with RSU for update the secret keys. The checking authentication shares the secret code only between the non-revoked lists in the On Board Units (OBU) and also updates the secret key. MAP can be reducing the time delay for checking the message verification.MAP method for revocation process uses the keyed Hash Message Authentication Code(HMAC).Such Calculation for HMAC helps in share message between the non-revoked On-Board Units (OBUs).MAP can significantly decrease the message loss ratio. As per the security analysis and performance evaluation, MAP is demonstrated to be secure and efficient. The RSU can convert the revoked vehicle to non revoked vehicle. It is faster than the TA verification. The non revocation process is done by the road side unit and the batch verification is also used for verify the message.

A.Masanam, S.Suganya, P.RajiPriyadharshini

To read the full article Download Full Article | Visit Full Article