19 research outputs found

    EFFICIENT SECRECY MAINTAINING CERTIFICATION SCHEME FOR VANET

    Get PDF
    Abstract VANET are one of the new promising techniques used to enable communication on roads. Here for VANETs an efficient secrecy maintaining authentication scheme is done .To detect anonymous authentication group signature is used widely used but in previous scheme it suffers from long computation delay in CRL (certificate revocation list) checking. It leads to a high message loss.so they cannot achieve the target of receiving 100 of messages per second.so HMAC is used here to avoid time consuming CRL checking and to ensure the integrity of messages before batch group authentication. To reduce authentication burden each vehicle needs to verify a small number of messages using cooperative message authentication among entities. Hence security and performance analysis shows that our scheme is more efficient in terms of authentication speed by keeping conditional privacy in VANETs. Thus the proposed scheme is analyzed through simulations in NS2 and proved to out performs the existing available techniques. Keywords-Vehicular Ad Hoc Network (VANET), CRL(Certificate Revocation List)HMAC(Hash Message Authentication Code),Cooperative Message Authentication. 1. Introduction In the advanced development of wireless communication technologies, car manufactures and telecom industries help to equip each vehicle with wireless devices. It allows vehicles to communicate with each other as well as with other vehicles network communication devices like road side units (RSU) and Trustedauthority (TA)etc. Generally a VANET consists of three components they are onboard units, Road side units and a central trusted authority. In VANET when vehicles communicate with each other and also with RSU and TA in which the attackers can easily get users private information such as identity, tracing etc. The reason is that they are not properly protected so we should design an efficiency secrecy maintaining authentication scheme for VANET. In previous scheme group signature is used for detecting unknown authentication so for which any group member allows to sign behalf of the group without reveling its real identity. So when a vehicle receives a message from unknown entity, a vehicle has to check the (certificate revocation list) CRL to avoid communicate with revoked vehicles. Also To verify the sender's group signature to check the validity of the received message. The problem here occurs is the time consuming for CRL checking because it takes 11ms to verify a message with a group signature and 9ms to check one identity in CRL. If n revoked number in CRL th number of messages verified in one second is 1000/9n+1 it is very smaller than the target of verifying 600.so we should try to overcome the delay caused by CRL checking and group signature verification to achieve rapid authentication. Thus an efficient privacy authentication scheme for VANET has been done through RSU by jointly using the techniques of distributed management, HMAC, group signature verification and cooperative authentication. First dividing the precinct into several domains so the system can run in a localized manner. Then HMAC is calculated with group key generated by the self-healing group-key generation algorithm which reduces time consuming CRL checking and ensure the integrity of messages before batch verification. Then cooperative message authentication is used to improve the message authentication scheme .By using these P.Anand Sateesh Kumar et al

    Olsen, Howey, and Owen 1 DEVELOPMENT OF A REGIONAL GIS PORTAL WITH TRANSIT DATA Corresponding Author

    Get PDF
    ABSTRACT The New River Valley (NRV) Metropolitan Planning Organization (MPO) recently launched a project creating a regional GIS portal in support of transit planning initiatives. The purpose of the project is to improve connections between transit providers and other modes of transportation, and to assist on-going and future transportation planning efforts at the local and regional scale. The project was conducted in two phases. Phase I included meetings with stakeholders to assess regional needs and to discuss transit-planning processes, GIS technologies, and existing data sources. Several stakeholder agencies collaborated to share transit-related data, which was cataloged and edited for public consumption. Phase II made transit data available to the public. The MPO partnered with the NRV Planning District Commission (PDC) to host the transit data on a FTP site. Using ArcGIS Online, an interactive web map was created featuring route and stop layers for the four fixed-route providers in the region. The project provided an outlet for important discussions between regional transit stakeholders and led to increased communication and collaboration between agencies. A regional transit GIS portal was created to share transit data featuring links to the FTP site, web map and additional resources regarding the MPO project

    Number 2

    No full text
    ABSTRACT In this paper, self starting block method of order directly without reducing it to first systems of odes. The continuous formation of the integrator enable us to differentiate and evaluate at some grids points to take care of y' in the method. The schemes compare favorably with optimal order four (Fatunla Based) proposed in (Keywords: general second order, initial value problems, parallel/block method, self starting

    ICEF2005-1313 PREDICTION OF HEAT FLOW AND TEMPERATURE FOR PISTONS WITH IMPROVED COOLING METHODS

    No full text
    ABSTRACT This study deals with the prediction of the heat flow and temperature of an IC engine piston having different types of cooling methods. This decade has seen a very significant increase in the load rating of the internal combustion engines. There is a marked shift in the current engines from the conventional NA (Naturally Aspirated) engines. The presence of turbo chargers and super chargers has improved the power output by more than two times. The engines develop a pressure upto180 bar and release very high heat energy. This has resulted in a piston crown temperature to the tune of 350 Deg. Centigrade. The increase in temperature will have a very serious effect on th

    An Order Five Implicit 3-StepBlock Method for Solving Ordinary Differential Equations

    No full text
    ABSTRACT In this paper, self-starting block hybrid method of orde

    Sustainable Work. Concepts and Elements of Practice’, The

    No full text
    Abstract: Work is almost totally absent in the debate about societal sustainability and the development of sustainable forms of production. However, social orientations related to work and workplace practices contain underestimated and overlooked possibilities which could be used to enhance efforts towards sustainability. Likewise changes in the direction towards sustainability can contribute to the quality of work. The link between the world of work and sustainability is examined by studying the origins of institutional changes and organisational renewal towards socially and environmentally sustainable production among environmentalists, business and labour. A common vision of sustainable environmentalism and social sustainable working life development is provided through a rough outline of a concept of sustainable work. The concept of sustainable work will be pinned down by confronting the current concept of sustainability with a classical, ontological, concept of work, were work is seen as the core element in individual and social development. The article provides suggestions for the development of a sustainable work practice illustrated by a reflexive transition management practice for sustainability and a trade union practice where labour policy and handling of workers interest is linked to efforts to bring about societal change in the direction of sustainability

    Querying the schema's using xspath in xml language

    No full text
    Abstract: -Schemas are often used to constrain the content and structure of XML documents. That is by using previous one we can't navigate an XML document in an easy way and quickly. We propose a query language, named XSPath, specifically tailored for XML schema that works on logical graph-based representations of schemas, on which it enables the navigation, and allows the selection of nodes. However, XML Schemas are themselves XML documents. Thus, the structure of a schema can be navigated and its components can be retrieved through a path language. XSPath is a language tailored for specifying path expressions on XML Schemas

    International Journal on Recent and Innovation Trends in Computing and Communication Minimization of Latency and Power for Network-on-Chip

    No full text
    Abstract-Network-on-chip (NoC) has emerged as a imperative aspect that determines the performance and power consumption of many-core systems. This paper proposes a combination scheme for NoCs, which aims at gaining low latency and low power consumption. In the presented combination scheme, a peculiar switching mechanism, called virtual circuit switching, is proposed to interweave with circuit switching and packet switching. Flits traveling in virtual circuit switching can pass through the router with only one stage. In addition, multiple virtual circuit-switched (VCS) connections are granted to share a common physical channel. Moreover, a path allocation algorithm is used in this paper to determine VCS connections and circuit-switched connections on a mesh-connected NoC, such that both communication latency and power are optimized

    Development of a biometrically-controlled door system (using iris), with power backup

    No full text
    ABSTRACT This paper presents a design and implementation of a biometrically-controlled door system using iris recognition with power backup(case: Nigeria with epileptic power supply) where user's life property will serve as the key to granting access to a place or resource . Today, door system with handles is sub-standard due to its instability to provide the expected security and is susceptible to breakages and deliberate compromises of human operators(due to corruption). Black iris data sets were used to simulate the iris recognition algorithms employed on the fabricated door prototype. The system was tested with a number of pre-enrolled templates and some fresh, incoming subjects. The door only unlocked for pre-enrolled subjects while for the latter, access denial was the case. The door system developed thus, answered only to iris signature
    corecore