Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology
ISSN: 2321-3337 Impact Factor:1.521 Volume:3 Issue:2 Year: 25 August,2014 Pages:375-380
In the recent years, Vehicular Ad Hoc Networks (VANETs) has evolved as new paradigm for broadband Authentication Protocol. In Vehicular Ad Hoc Networks (VANETs), adopt the public key Infrastructure Service Server (SS) for their security. In any PKI system, the authentication of a client is performed by checking if the Service of the Service Server is included in the current Authenticate Server (AS), and verifying their authority of the service of the server. In this paper, we propose Secure Enhancing Service Authentication Protocol (SESAP) for VANETs, which replace the time-consuming Service Server checking process by an efficient service server process. In recent years, many secure authentication protocols has been proposed for VANETs. In this paper we present a theoretical survey on predominant secure authentication protocols and compare the security issues of the following protocol such as SAODV, SRP, and SEAD.
VANETs, Authentication Protocol, SAODV, SRP, SEAD Protocols
[1] Dedicated Short Range Communications (DSRC), [On-line] http://grouper.ieee.org/groups/scc32/dsrc/index.html. [2] W. Franz, C. Wagner, C. Maihofer, and H. Hartenstein, “Fleetnet: platform for inter-vehicle communications," in Proc. 1st Intl. Workshopon Intelligent Transportation, Hamburg, Germany, 2004. [3] “NoW: Network on Wheels Project," [On-line] http://www.network-onwheels. de, 2007. [4] “US Vehicle Safety Communication Consortium," [On-line] http://wwwnrd.nhtsa.dot.gov/pdf/nrd-12/CAMP3/pages/VSCC.htm [5] M. E. Zarki, S. Mehrotra, G. Tsudik, and N. Venkatasubramanian, “Security issues in a future vehicular network," in Proc. European Wireless, Next Generation Wireless Networks, vol. 1, pp. 270-274, 2002. [6] S. Duri, M. Gruteser, X. Liu, P. Moskowitz, R. Perez, and J.-M. Tang, “Framework for security and privacy in automotive telematics," in Proc.2nd International Workshop on placeMobile Commerce, pp. 25-32,2002. [7] A. R. Beresford and F. Stajano, “Location privacy in pervasive computing,"IEEE Pervasive Computing, vol. 2, no. 1, pp. 46-55, 2003. [8] K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K.Sezaki, “CARAVAN: providing location privacy for VANET," in Proc.Workshop on Embedded Security in Cars (ESCAR), 2005. [9] K.P. Laberteaux, J.J. Haas, and Y. Hu, “Security Certificate Revocation List Distribution for VANET,” Proc. Fifth ACM int’l Workshop VehiculAr Inter-NETworking, pp. 88-89, 2008. [10] H. Chan, A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” Proc. IEEE Symp. Security and Privacy, pp. 197-213, 2003. [12] L. Eschenauer and V.D. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” Proc. ACM Conf. Computer and Comm. Security, pp. 41-47, 2002. [13] S. Zhu, S. Setia, S. Xu, and S. Jajodia, “GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks,”J. Computer Security, vol. 14, pp. 301-325, 2006. [14] A. Wasef and X. Shen, “PPGCV: Privacy Preserving Group Communications Protocol for Vehicular Ad Hoc Networks,” Proc.IEEE Int’l Conf. Comm. (ICC ’08), pp. 1458-1463, 2008. [15] Y. C. Hu and H. J. Wang, “A framework for location privacy in wireless networks," in Proc. ACM SIGCOMM Asia Workshop, China, 2005