首页    期刊浏览 2024年12月05日 星期四
登录注册

文章基本信息

  • 标题:Enhanced Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks Using Authentication Group Key
  • 本地全文:下载
  • 作者:R.K. Poongodi ; T. Sivakumar
  • 期刊名称:Bonfring International Journal of Software Engineering and Soft Computing
  • 印刷版ISSN:2250-1045
  • 电子版ISSN:2277-5099
  • 出版年度:2018
  • 卷号:8
  • 期号:1
  • 页码:26-30
  • DOI:10.9756/BIJSESC.8385
  • 语种:English
  • 出版社:Bonfring
  • 摘要:The vehicular ad-hoc networks (VANETs) are expected to support the diverse infrastructure based commercial services, including internet access, real-time traffic concerns, video streaming and content distribution. It also enables a wide range of promising applications and services. It has brought new security challenges due to their mobile and infrastructure less nature. In particular, confidentiality and location privacy are regarded as the most critical security concerns for securing service-oriented vehicular networks. Forwarded messages in vehicular ad-hoc networks are primarily multimedia data, including structured data, plain text, sound, and video which require access control with efficient privacy preservation. In this project, Ciphertext-policy attribute-based encryption (CP-ABE) delegation scheme is proposed, which allows road side units (RSUs) to perform most of the computation for the purpose of improving the decryption efficiency of the vehicles. In addition to that, proposed a novel Sybil attack detection mechanism, Footprint, using the trajectories of vehicles for identification while still preserving their location privacy. More specifically, when a vehicle approaches a road-side unit (RSU), it actively demands an authorized message from the RSU as the proof of the appearance time at this RSU. A location-hidden authorized message generation scheme is designed for two objectives: first, RSU signatures on messages are signer ambiguous so that the RSU location information is concealed from the resulted authorized message; Second, two authorized messages signed by the same RSU within the same given period of time are recognizable so that they can be used for identification. If the RSU is found to be failure but not updated with Trusted Authority, the current RSU which reads the records from the vehicle, queries the Trusted Authority about all the nearest nodes of missed RSU (second hop) from current RSU, and calculate the two hop timings and suspect the vehicle if the messages are not matched.
  • 关键词:--
国家哲学社会科学文献中心版权所有