33,402 research outputs found

    Secure protocol for ad hoc transportation system

    Full text link
    Abstract—We define an ad hoc transportation system as one that has no infrastructure such as roads (and lanes), traffic lights etc. We assume that in such a system the vehicle are autonomic and can guide and direct themselves without a human driver. In this paper we investigate how a safe distance can be maintained between vehicles. A vehicle which has been compromised by an adversary can cause serious chaos and accidents in such a network (a denial of service type of attack). A simple key management scheme is then introduced to ensure secure communications between the components of the system. Keywords–collision avoidance, cyber-physical systems, secure communications I

    Implementation of Efficient Cooperative Message Authentication for Vehicular Ad-Hoc Networks

    Get PDF
    Vehicular Ad-Hoc Network(VANET) is a potential area in research field to bestow Intelligent Transportation System (ITS) services to the end users. It is a exigent topic for its high mobility and frequent network distraction. Lately researchers are carrying out task on many specific issues related to VANET like routing, broadcasting, Quality of Service (QoS), security, architectures, applications, protocols, etc. The augment in vehicles in today’s life has lead to brutal road accidents and traffic jam in urban areas. One of the solution to this problem could be a means of communication between the vehicles for safety. Safety measures lack these days in VANET as malicious drivers in the network disrupt the system routine. In this paper , a new location Based Secure Routing Protocol( PBSRP) which is a hybrid of Most Forward within Radius and Border Node based Most Forward within Radius (B-MFR) routing protocols. A module for security is implemented in this protocol using station to station key agreement protocol for preventing system from several attacks. The module goes through three phases: initialization phase, optimal node selection phase and secure data delivery phase. The outcome of Simulation imparts that PBSRP has better performance than MFR in terms of end to end delay and packet delivery ratio when malicious drivers are included in the network

    A Contribution to Secure the Routing Protocol "Greedy Perimeter Stateless Routing" Using a Symmetric Signature-Based AES and MD5 Hash

    Full text link
    This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ad hoc network security. Then, we propose a solution to secure GPSR packet by adding a digital signature based on symmetric cryptography generated using the AES algorithm and the MD5 hash function more suited to a mobile environment
    • …
    corecore