Region Authority (RA) Collaborated Certificate Organization and Management in VANET

Size: px
Start display at page:

Download "Region Authority (RA) Collaborated Certificate Organization and Management in VANET"

Transcription

1 Region Authority (RA) Collaborated Certificate Organization and Management in VANET Shahnawaj Khan CSE Department National Institute of Technology, Hamirpur Hamirpur, India Abstract- Vehicular ad hoc networks (VANETs) are receiving increasing attention from academics due to the various applications and potential tremendous benefits they offer for future VANET users. Safety information exchange enables lifecritical applications, such as the alerting functionality during medical emergencies, and thus, plays a key role in VANET applications. In a VANET, vehicles rely on the integrity of receiving data for deciding when to present alerts to drivers. The communication between car to car, car to the roadside unit done through wireless communication. That is why security is an important concern area for vehicular network application. For authentication purposes large amount of bandwidth is consumed and the performance becomes low. In VANET some serious network attacks such as man in the middle attack, masquerading is possible. In this paper various previous researches done in this area are analyzed and compared on the basis of drawbacks of those approaches. After that the different issues on VANET are discussed and finally conclude with proposed idea. Keywords-Security, Region authority (RA), on board unit (OBUs), certificate revocation lists (CRLs). I. INTRODUCTION Vehicular Ad-Hoc Network is a special class of Mobile Ad-Hoc Networks (MANETs) in which communication link is established between road side units (RSUs) and on board units (OBUs), OBUs to OBUs in a short range of 100 to 300 m and between RSUs to RSUs. To enable application for safety, traffic, driver assistance, infotainment vehicular communication is evolving very rapidly. But the race of providing various services raises the security concern and makes VANET vulnerable to various attacks like jamming, forgery, privacy violation, on board tampering. Existing protocols to secure VANETs resolves these issues up to some extent but raises some concerns on the basis of which, this paper reviews the different schemes developed for VANET. More specifically, the purpose of the paper is to survey the literature, and provide an overview of the extent of the research done in the area of VANETs and also provide some protocols to resolve the security issues. This paper is organized as follows: In the second section the challenges for the security in VANET are discussed. In the third section, previous work that is close to this approach has been discussed. In the fourth section, system model which we Naveen Chauhan CSE Department National Institute of Technology, Hamirpur Hamirpur, India naveenchauhan.nith@gmail.com assumed for the proposed scheme is discussed. In the fifth section, evaluation criteria are discussed based on which proposed scheme is evaluated. In section sixth proposed scheme is discussed. In section 7 paper is concluded. II. CHALLENGES The most significant challenges of VANET are A.Network Volatility The connectivity among nodes can often be highly transient and a one-time event (same vehicles may not get the chance to communicate again). For example, two vehicles (nodes) traveling on a highway may remain within their transceiver range, or within a few wireless hops, for a limited period of time. Hence password-based establishment of secure channels, gradual development of trust by enlarging a circle of trusted acquaintances, or secure communication only with a handful of endpoints and may be impractical for Securing vehicular communication (VC). B. Authentication vs. Privacy In the process of providing authentication for communication between OBUs, The privacy of the sender can be revealed and can pose threat to the sender by many ways like tracking someone s location, journey details. C. Delay Sensitive Applications Many of the safety and driver-assistance applications Pose strict deadlines for message delivery or are Time-sensitive. Security mechanisms must take these constraints into consideration and impose a low processing and messaging overhead. D. Network Scale The scale of the network, with roughly a billion vehicles around the globe, is another challenge. E. Heterogeneity The heterogeneity in VC technologies and the supported applications are additional challenges, especially taking into account the gradual deployment. With nodes possibly equipped with cellular transceivers, digital audio and Global Positioning System (GPS) but with the current standard architecture using the vehicular public key infrastructure (PKI)

2 and tamper proof device (TPD) and various protocols these problems are resolved up to some point. III. PREVIOUS WORK In VANETs, the primary security requirements are identified as entity authentication, message integrity, nonrepudiation, and privacy preservation. The PKI is the most viable technique to achieve these security requirements. In [6] author proposed TACKs for certificate organization and vehicle revocation in a VANET, which we consider to be the most relevant and closely related scheme to the work we propose in this paper. TACK adopts a hierarchy system architecture consisting of a central trusted authority and regional authorities (RAs) distributed all over the network. The authors adopted group signature where the trusted authority acts as the group manager and the vehicles act as the group members. Upon entering a new region, each vehicle must update its certificate from the RA dedicated for that region. The vehicle sends a request signed by its group key to the RA to update its certificate, the RA verifies the group signature of the vehicle and ensures that the vehicle is not in the current Revocation List (RL). After the RA authenticates the vehicle, it issues short lifetime region-based certificate. This certificate is valid only within the coverage range of the RA. It should be noted that TACK requires the RAs to wait for some time, e.g., 2 seconds, before sending the new certificate to the requesting vehicle. It restricts the vehicle to send messages to neighboring vehicles within this period, which makes TACK not suitable for the safety applications. Also, TACK requires the RAs to completely cover the network, otherwise, the TACK technique may not function properly. This requirement may not be feasible especially in the early deployment stages of VANETs. In [1] author considers the deployment stage of VANET and proposes 3 protocols revocation using tamper proof device (RTPD) which uses the tamper proof device (TPD) to revoke all the certificates of the malicious vehicle with the help of radio or FM to broadcast in case of vehicle is not in the range of road side units (RSUs), distributed revocation protocol (DRP) which uses group based revocation technique to revoke the certificate. In case if any vehicle is suspected of doing malicious activity by its neighbor and if then the numbers of neighbors are greater than a certain threshold then they inform it to the CA to remove its certificate. The last is revocation using compressed certificate revocation list (RCCRL) which uses the distribution of the only updated and compressed list. For privacy it proposes using a set of anonymous keys that change frequently. These keys are preloaded in the vehicle s TPD for a long duration. For authentication vehicles will sign each message with their private key and attach the corresponding certificate. To reduce the security overhead, it uses the approach of elliptic curve cryptography (ECC). In [2] author does not consider the deployment stage problem. It uses the RSU aided certificate revocation scheme in which RSU checks all passing vehicles for revoked certificates which are already stored at RSUs distributed by the CAs to the RSUs. If revoked certificate is found from any malicious vehicle it inform to all local vehicles about the revoked certificate by broadcasting it locally. This helps in reduction in the size of the CRL and high cost of the distribution of the CRL. It also considered revocation using tamper proof device (RTPD), DRP, RCCRL which reduce the size of the CRL. It follows group signature and identity based signature (GSIS) to preserve the privacy of the vehicle. In [3] author only focuses on the CRL size and its distribution. It divides the CRL into various parts uses network coding and erasure coding to reassemble complete CRL with few pieces. Using erasure coding, a node will simply send out the same pieces it received without making any changes. Using network coding, a node will generate linear combinations of all of the pieces currently possessed, requiring greater processing capability at every OBU. Erasure coding has less overhead, both in packet overhead carry the coding information, and in processing overhead to reconstruct the file. It uses vehicle to vehicle (V2V) communicate to forward pieces between vehicles. The Most Pieces Broadcast method creates a situation where only the node with the most number of CRL file pieces is selected to broadcast within a given radio broadcast range. In [4] author focuses on the issue of authentication and privacy. Here CA uses a pseudo random key generator (PRNG) to generate all the certificates of a single vehicle so that only CA can backtrack the detail of the source. CA generate all the certificates by selecting a random number "n" then generate all the certificates from it and send all the certificates to the corresponding vehicle and hold the random no to itself so that in case of need of detail of the sender only CA can back track the identity of the vehicle. It also uses the group certificate policy in which vehicles have a very large database of certificate up to each certificate is valid up to a very short time period to ensure a high level of privacy. In [5] author uses a new approach to accelerate the certificate validation procedure by adding 2 new attributes credibility and issued date. Credibility is the measure of the authenticity of a particular vehicle. If a vehicle is having high credibility then it is a more trust full vehicle and the other one shows the date at which the particular certificate has been issued. With k-mean clustering it divide CRL into the k- cluster. Each cluster is divided based on these two new attributes. Whenever a request arrives, to check its validity it is compared with the certificate resides in its cluster only which in term reduces the overhead to search the entire CRL. IV. SYSTEM MODEL As shown in Fig. 1, the system model under consideration consists of the following: A. Certificate Authority(CA) It is responsible for providing anonymous certificates and distributing secret keys to all RAs and OBUs in the network. It is assumed that it cannot be compromised.

3 B. Region Authorities (RAs) These are fixed units dedicated only one for a region. RAs are the middleware between CAs and RSUs. It is assumed that it cannot be compromised. C. Roadside Units (RSUs) RSUs are considered to be fixed and installed throughout the network. The RSUs can communicate securely with their RAs. It can be compromised because these lies near the road so attacker can easily reach to them. D. On Board Unit (OBUs) These are embedded in vehicles. OBUs can communicate either with other OBUs through V2V communications or with RSUs through vehicle to infrastructure (V2I) communications. These have the highest chances of being attacked. According to the WAVE standard, each OBU is equipped with a TPD, which is a tamper-resistant resistant module used to store the security materials, e.g., secret keys and certificates of the OBU. Also, the TPD in each OBU is responsible for performing all the cryptographic phic operations such as signing messages, verifying certificates, keys updating. We consider that legitimate OBUs cannot collude with the revoked OBUs as it is difficult for legitimate OBUs to extract their security materials from their TPDs. Finally, we consider that a compromised OBU is instantly detected by the RA. V. PROPOSED SCHEME In this approach the functionality of RAs and RSUs are very distinct as compare to the other scheme, we have seen so far. OBUs are loaded with certificates in its tamper proof devices (TPDs) by the certificate authorities (CA), which are valid for a long time. These are loaded with large numbers so that OBUs need to update only once in a year. Certificates are generated by the CA for each OBUs and only CA can recover the original identity of the OBUs. Algorithm 1 Certificate Generation Algorithm 1. M = no. of certificates per time interval for vehicle. 2. I = no. of time intervals during a reload period. 3. Begin 4. n = get random number() 5. for i = 1 to I do 6. S i = H i (n) 7. for j = 1 to M do 8. (PK j,i, SK j,i ) = generate public private key pair() 9. SIG CA,j,i = SIGN(H{E Si (j), PK j,i }), SK CA ) 10. CERT j,i = {E Si (j), PK j,i, SIG CA,j,i} 11. UPLOAD((CERT 1,i,PK1,i,SK1,i SK1,i)...,(CERT M,i, PKM,i, SKM,i)) at OBU 12. end for 13. end for 14. end Whenever the vehicle enters a new region, it needs to obtain the certificate for that region. With the help of road side units (RSUs) which are used only for communication purpose only in this approach because they are located near the road and highly vulnerable to attack.. RSUs here are used only to cover the entire network. Once RSU get any request for the certificate by a vehicle. It forwards it to the RA of its region. RA has two types of certificate revocation lists (CRLs). Revocation list of RSUs as well as the revocation list of the OBUs. Revocation list of the OBUs at RA is provided by the CA while the RL of RSUs is generated by RA itself by detecting any malicious activity by any RSU. On getting any request by any OBU it checks it against all the entries of the CRL for the OBUs. If no entry is found then it generate a temporary certificate, valid for a short time period and in that region only. These certificates are sent to the corresponding vehicle Fig.1. System model

4 along with the CRL of OBUs as well as RSUs of that region only. CRL is very small in size to distribute and search. CRL is also updated time to time on any revocation of certificate by distributing only required pieces of information. Algorithm 2 Certificate updation algorithm AT OBU 1. N = no. of possible regions in path. 2. Begin 3. for i = 1 to N do 4. X = SIGN SK (PK,CERT CA ) 5. SEND(X,PK,CERT CA ) to RA 6. end for 7. end AT RSU 1. Begin 2. verify(x,cert CA ) 3. (PK V, SK V, ) = generate public private key pair() 4. Y = SIGN SKRA (PK V, CERT CA ) 5. CERT RA = (Y, Expiration, RA id ) 6. add (X, CERT RA ) in history table of RA 7. SEND (CERT RA, PK V, SK V, RA id, CRL OBU, CRL RSU )to OBU 8. End A. Certificate Generation To upload certificates initially in an OBU, it requires a number of certificates for a time interval as well as the number of time intervals during a reload period. Here n is a random number, the S i is a key to some block of certificates. It is generated by hashing n by i times using some hash function 'H'. PK and SK are public and secret key pair. Signature is used to ensure integrity of the certificates by hashing the public key and encrypted value of 'j' using block identifier 'S' and then applying some signature algorithm with the secret key of CA. Certificates are generated by using sign, public key, and encrypted value. Now these are uploaded to the OBU. B. Certificate Updation N is the number of possible region a vehicle can enter. OBU send its request to each RA for their certificates by sending a sign of PK and certificate CERT issued by the CA using its SK. Now on receiving the request from an OBU each RA verifies its signature and then its certificate. If it is not found in CRL then generate new public-private key pair and sign OBU's public key and its CERT issued by a CA by its SK. now it generates a new regional certificate with sign, expiration period and its region authority id. It further adds the mapping detail in its history table and then sends the certificate of its region and ID of its region to the OBU. C. Certificate authentication and verification Each OBU need to authenticate to each other before the start of communication. Sender OBU initially broadcast its PK to all the other OBUs as well as RA. For authentication, sender OBU generate the signature by signing the message M by its SK Y = SIGN SK (M) And then send (Y,M,CERT RA ) to the receiving OBU. On receiving the above parameters receiving OBU needs to verify before to start the communication. First receiving OBU checks the validity of the sign Y, then check the CERT RA against all entries of the CRL. IF match found M is dropped else further communication will be established. In TACK [6] RA delay the around 2 min to process the request of OBUs which is not considerable by VANET applications. In this paper RA collaborated approach is proposed to resolve such issue. Each RA is connected with their neighbor RAs to reduce the delay in the process. Before entering a new region OBUs can be easily facilitated by the functionality of early request of the certificate. Hence OBUs can have the certificate of the region even before entering it. Sometime it may also be possible that at any point vehicle can have a choice to enter into more than one region but generally it is restricted to either two or three regions possibility. In such case vehicle gets the early certificate of each region and with few choices it cannot be an accountable waste of resources. It considers all the challenges and facts about the VANET. The Deployment stage problem is resolved by providing only one RA for each region. It also restricts the work of RSUs with covering the network only. It also provides the low cost deployment with most of the coverage. It also provides the authentication with RA certificate as well as group based key while preserving the privacy. With pseudonymous certificates and the hierarchy approached used here. Search and distribution of CRLs also cost very low because of very few entries in each CRL to deal with. VI. EVALUATION CRITERIA In this section we define a set of evaluation criteria which will help us in the comparison of the different schemes. Following is a list of the evaluation criteria used in the revocation schemes in VANETs. A. Deployment Stage of VANET The very first thing to consider is deployment stage because currently either VANET is an idea for most of the world or it is in the deployment stage. To fulfill the complete objective of secure VANET. Deployment stage must be considered because each protocol has their different performance in partial and full deployment of VANET. B. Size of Certificate Revocation List and its Distribution As the revocation of certificates takes place frequently. And the size of the VANET is very large with having millions of vehicles around the globe. The problem of distribution of

5 the certificate revocation list (CRL) costs very huge amount of time and bandwidth. And with such huge size of CRL it also needs huge storage AT on board units (OBUs) as well as high processing speed to search that huge CRL. C. Authentication vs. Privacy Although each proposed scheme provides different methods for authentication between vehicles as well as providing privacy for the sender but there is a need to evaluate the performance of each protocol to ensure a high level of authentication while providing complete privacy in which only higher authorities can have the right to access the detail of the sender under any case of malicious activity. VII. CONCLUSION This paper proposes RAs based certificate organization and management scheme which resolves the basic challenges of VANET and provide a feasible solution of the deployment of VANET, The huge size of CRLs and its distribution and search, authentication and privacy. In comparisons with the available protocols, it can be deduced that the RA collaboration scheme will give better results than the existing ones. As the next step towards our research, we would like to augment this research with mathematical analysis and simulation result. REFERENCES [1] M Raya, P Papadimitratos and JP Hubaux, Securing Vehicular Communications, IEEE Wireless Communications, vol. 13, no. 5, pp. 8-15, October [2] X. Lin, R. Lu, C. Zhang, H. Zhu, P. Ho and X. Shen, Security in Vehicular Ad Hoc Networks, IEEE Communications Magazine, vol. 46, no. 4, pp , April [3] Michael E. Nowatkowski and Henry L. Owen, Certificate Revocation List Distribution in VANETs Using Most Pieces Broadcast, proceedings of the IEEE SoutheastCon, pp , [4] Jason J. Haas, Yih-Chun Hu, and Kenneth P. Laberteaux, Efficient Certificate Revocation List Organization and Distribution, IEEE Journal on Selected Areas In Communications, vol. 29, no. 3, pp , March [5] Qingwei Zhang, Mohammed Almulla, Yonglin Ren and Azzedine Boukerche, An Efficient Certificate Revocation Validation Scheme with k-means Clustering for Vehicular Ad hoc Networks, IEEE Symposium on Computers and Communications (ISCC), pp , [6] Ahren Studer, Elaine Shi, Fan Bai and Adrian Perrig, TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs, 6 th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad-Hoc Communications and Networks, pp. 1-9, 2009 [7] Albert Wasef and Xuemin Shen, EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks, IEEE Transactions on Mobile Computing, vol. 12, no. 1, pp , January [8] Vighnesh N V, N Kavita, Shalini R. Urs and Srinivas Sampalli, A Novel Sender Authentication Scheme Based on Hash Chain for Vehicular Ad-Hoc Networks, IEEE Symposium on Wireless Technology and Applications (ISWTA), pp , September [9] Hind AI Falasi and Ezedin Barka, Revocation in VANETs: A Survey, IEEE International Conference on Innovations in Information Technology (IIT), pp , [10] Albert Wasef, R. Lu, X. Lin and X. Shen, Complementing Public Key Infrastructure to Secure Vehicular Ad Hoc Networks, IEEE Wireless Communications, vol. 17, no. 5, pp , October [11] Ghassan Samara, Wafaa A.H. Al-Salihy and R. Sures, Security Analysis of Vehicular Ad Hoc Networks (VANET), Second International Conference on Network Applications Protocols and Services (NETAPPS), pp , [12] Nurain Izzati Shuhaimi and Tutun Juhana, Security in Vehicular Ad-Hoc Network with Identity-Based Cryptography Approach: A Survey, IEEE 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA), pp , 2012.

Efficient Certificate Management in VANET

Efficient Certificate Management in VANET Efficient Certificate Management in VANET Ghassan Samara #1, Wafaa A.H. Al-Salihy *2, R. Sures #3 # National Advanced IPv6 Center, Universiti Sains Malaysia Penang, Malaysia 1 ghassan@nav6.org, 3 sures@nav6.org

More information

A New Security Mechanism for Vehicular Communication Networks

A New Security Mechanism for Vehicular Communication Networks A New Security Mechanism for Vehicular Communication Networks Ghassan Samara Department of Computer Science, Faculty of Science and Information Technology, Zarqa University Zarqa, Jordan. gsamarah@yahoo.com

More information

Certificate Based Scheme and Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks

Certificate Based Scheme and Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks Certificate Based Scheme and Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks Ms. Rupali H. Kandhari PG Student, Department of Computer Engineering, JSPM s RSCOE, Tathawade, Pune.

More information

Certificate Revocation Management in VANET

Certificate Revocation Management in VANET Certificate Revocation Management in VANET Ghassan Samara Department of Computer Science, Faculty of Science and Information Technology, Zarqa University Zarqa, Jordan. Gsamara@zu.edu.jo ABSTRACT Vehicular

More information

Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET s

Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET s Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET s Ghassan Samara, Sureswaran Ramadas National Advanced IPv6 Center, Universiti Sains Malaysia Penang, Malaysia ghassan@nav6.org,

More information

Proxy Based Authentication Scheme Using Distributed Computing in Vehicular Ad Hoc Networks

Proxy Based Authentication Scheme Using Distributed Computing in Vehicular Ad Hoc Networks Proxy Based Authentication Scheme Using Distributed Computing in Vehicular Ad Hoc Networks CH. SHIREESHA 1, P PROMAD KUMAR 2 1 M.Tech Student, CSE, SR Engineering College, Warangal,Telangana,India. 2 Assistant

More information

Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks

Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Petra Ardelean advisor: Panos Papadimitratos January 2009 Abstract Vehicular Ad-hoc Networks (VANETs)

More information

COMPLEMENTING PUBLIC KEY INFRASTRUCTURE TO SECURE VEHICULAR AD HOC NETWORKS

COMPLEMENTING PUBLIC KEY INFRASTRUCTURE TO SECURE VEHICULAR AD HOC NETWORKS SECURITY AND P RIVACY IN E MERGING WIRELESS N ETWORKS COMPLEMENTING PUBLIC KEY INFRASTRUCTURE TO SECURE VEHICULAR AD HOC NETWORKS ALBERT WASEF AND RONGXING LU, UNIVERSITY OF WATERLOO XIAODONG LIN, UNIVERSITY

More information

Security Challenges And Implementation Mechanism For Vehicular Ad Hoc Network

Security Challenges And Implementation Mechanism For Vehicular Ad Hoc Network Security Challenges And Implementation Mechanism For Vehicular Ad Hoc Network Mostofa Kamal Nasir, A.S.M. Delowar Hossain, Md. Sazzad Hossain, Md. Mosaddik Hasan, Md. Belayet Ali Abstract: - Vehicular

More information

EFFICIENT SECRURITY IMPLEMENTATION FOR EMERGING VANETS

EFFICIENT SECRURITY IMPLEMENTATION FOR EMERGING VANETS EFFICIENT SECRURITY IMPLEMENTATION FOR EMERGING VANETS Chan Yeob Yeun, Mahmoud Al-Qutayri, Faisal Al-Hawi Khalifa University of Science Technolgoy and Research, UAE {cyeun, mqutayri, f.alhawi}@kustar.ac.ae

More information

An Investigation of DOS Flooding Attack in VANET.

An Investigation of DOS Flooding Attack in VANET. A B S T R A C T International Journal of Advance Foundation and Research in Computer (IJAFRC) An Investigation of DOS Flooding Attack in VANET. Vikash Porwal, Rajeev Patel, Dr. R. K. Kapoor. National Institute

More information

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,

More information

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010 Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture

More information

Problems of Security in Ad Hoc Sensor Network

Problems of Security in Ad Hoc Sensor Network Problems of Security in Ad Hoc Sensor Network Petr Hanáček * hanacek@fit.vutbr.cz Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless

More information

Cryptography and Network Security Chapter 14

Cryptography and Network Security Chapter 14 Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture

More information

Security of Emerging wireless networks

Security of Emerging wireless networks Security and Cooperation in Wireless Networks http://secowinet.epfl.ch Security of Emerging wireless networks Generalities Mesh networks 2007 Levente Buttyán and Jean-Pierre Hubaux Introduction Emerging

More information

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview of CSS SSL. SSL Cryptography Overview CHAPTER CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers

More information

Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks

Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks Yong Xi, Kewei Sha, Weisong Shi and Loren Schwiebert Wayne State University {yongxi,kewei,weisong,loren}@wayne.edu Tao Zhang Telcordia

More information

Securing vehicular ad hoc networks

Securing vehicular ad hoc networks Journal of Computer Security 15 (2007) 39 68 39 IOS Press Securing vehicular ad hoc networks Maxim Raya and Jean-Pierre Hubaux Laboratory for computer Communications and Applications (LCA), School of Computer

More information

Preventing Unauthorized Messages and Achieving End-to-End Security in Delay Tolerant Heterogeneous Wireless Networks

Preventing Unauthorized Messages and Achieving End-to-End Security in Delay Tolerant Heterogeneous Wireless Networks 152 JOURNAL OF COMMUNICATIONS, VOL. 5, NO. 2, FEBRUARY 2010 Preventing Unauthorized Messages and Achieving End-to-End Security in Delay Tolerant Heterogeneous Wireless Networks Hany Samuel and Weihua Zhuang

More information

Certificate Management in Ad Hoc Networks

Certificate Management in Ad Hoc Networks Certificate Management in Ad Hoc Networks Matei Ciobanu Morogan, Sead Muftic Department of Computer Science, Royal Institute of Technology [matei, sead] @ dsv.su.se Abstract Various types of certificates

More information

Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture

Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture IEEE GLOBECOM Design and Developers Forum Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture Tim Weil CISSP, CISA Booz Allen Hamilton

More information

Intelligent transportation systems: Past, present and look to future by using Grid technology

Intelligent transportation systems: Past, present and look to future by using Grid technology Intelligent transportation systems: Past, present and look to future by using Grid technology Behin Alipour Islamic Azad University of Tabriz Alipour_behin@yahoo.com Abstract Existing technologies in ITS

More information

Wireless Sensor Networks Chapter 14: Security in WSNs

Wireless Sensor Networks Chapter 14: Security in WSNs Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks

More information

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,

More information

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network Review of Prevention techniques for Denial of Service s in Wireless Sensor Network Manojkumar L Mahajan MTech. student, Acropolis Technical Campus, Indore (MP), India Dushyant Verma Assistant Professor,

More information

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,

More information

Securing Internet Gateway Discovery Protocol in Ubiquitous Wireless Internet Access Networks

Securing Internet Gateway Discovery Protocol in Ubiquitous Wireless Internet Access Networks Securing Internet Gateway Discovery Protocol in Ubiquitous Wireless Internet Access Networks Bok-Nyong Park 1, Wonjun Lee 1 and Christian Shin 2 1 Dept. of Computer Science and Engineering, Korea University,

More information

The Security of Vehicular Ad Hoc Networks

The Security of Vehicular Ad Hoc Networks The Security of Vehicular Ad Hoc Networks Maxim Raya and Jean-Pierre Hubaux Laboratory for computer Communications and Applications (LCA) School of Computer and Communication Sciences EPFL, Switzerland

More information

IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS

IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS Mythily V.K 1, Jesvin Veancy B 2 1 Student, ME. Embedded System Technologies, Easwari Engineering College, Ramapuram, Anna University,

More information

A framework using IBC achieving non-repudiation and privacy in vehicular network.

A framework using IBC achieving non-repudiation and privacy in vehicular network. A framework using IBC achieving non-repudiation and privacy in vehicular network. Amira Bradai, Afifi Hossam To cite this version: Amira Bradai, Afifi Hossam. A framework using IBC achieving non-repudiation

More information

Lecture 7: Privacy and Security in Mobile Computing. Cristian Borcea Department of Computer Science NJIT

Lecture 7: Privacy and Security in Mobile Computing. Cristian Borcea Department of Computer Science NJIT Lecture 7: Privacy and Security in Mobile Computing Cristian Borcea Department of Computer Science NJIT Location Privacy Location Authentication Trusted Ad Hoc Networks 2 Privacy Violated Request: Retrieve

More information

Electronic Network - Advantages and Disadvantages

Electronic Network - Advantages and Disadvantages Refining Bogus Data in Wireless Sensor Network Using Non Repudiation and Enrouting Filter Mechanism Shobhana S PG Scholar, Dept of CSE, Apollo Priyadarshanam Institute of Technology, Chennai Abstract Wireless

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,

More information

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management

More information

An Implementation of Public Key Infrastructure Using Wireless Communication Networks

An Implementation of Public Key Infrastructure Using Wireless Communication Networks , pp.35-42 http://dx.doi.org/10.14257/ijgdc.2015.8.3.04 An Implementation of Public Key Infrastructure Using Wireless Communication Networks Nandhini M 1 and PraveenkumarB 2 1 PG Scholar, Muthayammal Engineering

More information

An Enhanced Security Protocol for VANET-based Entertainment Services

An Enhanced Security Protocol for VANET-based Entertainment Services IEICE TRANS. FUNDAMENTALS/COMMUN./ELECTRON./INF. & SYST., VOL. E85-A/B/C/D, No. xx JANUARY 20xx REGULAR PAPER An Enhanced Security Protocol for VANET-based Entertainment Services 1 Jung-Yoon Kim, Student

More information

Security for Ad Hoc Networks. Hang Zhao

Security for Ad Hoc Networks. Hang Zhao Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile

More information

Secure Neighbor Discovery in Wireless Sensor Networks

Secure Neighbor Discovery in Wireless Sensor Networks Purdue University Purdue e-pubs ECE Technical Reports Electrical and Computer Engineering 8-16-2007 Secure Neighbor Discovery in Wireless Sensor Networks Saurabh Bagchi Purdue University, sbagchi@purdue.edu

More information

A survey on securing user authentication in vehicular ad hoc networks

A survey on securing user authentication in vehicular ad hoc networks A survey on securing user authentication in vehicular ad hoc networks Mrs. Arzoo Dahiya Assistant Professor Computer Science & IT Department Institute of Technology and Management Sector-23 A, Gurgaon-122017

More information

Single Sign-On Secure Authentication Password Mechanism

Single Sign-On Secure Authentication Password Mechanism Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,

More information

Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks

Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Donggang Liu Peng Ning Department of Computer Science North Carolina State University Raleigh,

More information

Packet Level Authentication Overview

Packet Level Authentication Overview Packet Level Authentication Overview Dmitrij Lagutin, Dmitrij.Lagutin@hiit.fi Helsinki Institute for Information Technology HIIT Aalto University School of Science and Technology Contents Introduction

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information

BUSINESS GUIDE SECURING YOUR SOFTWARE FOR THE MOBILE APPLICATION MARKET THE LATEST CODE SIGNING TECHNOLOGY

BUSINESS GUIDE SECURING YOUR SOFTWARE FOR THE MOBILE APPLICATION MARKET THE LATEST CODE SIGNING TECHNOLOGY SECURING YOUR SOFTWARE FOR THE MOBILE APPLICATION MARKET THE LATEST CODE SIGNING TECHNOLOGY Now from CONTENTS 1 THE CHALLENGE 1 A BRIEF REVIEW OF CODE SIGNING 2 THE SOLUTION 2 HOW THE CODE SIGNING PORTAL

More information

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks

More information

Securing Wireless Access for Vehicular Environments (WAVE)

Securing Wireless Access for Vehicular Environments (WAVE) Securing Wireless Access for Vehicular Environments (WAVE) May 7, 2009 CTST, New Orleans Tim Weil CISSP/CISA Security Architect ITS Engineering Booz Allen Hamilton 0 The concept of VII started upon the

More information

Key Management and Distribution

Key Management and Distribution and Distribution CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 January 2011 CSS322Y10S2L12, Steve/Courses/CSS322/Lectures/key.tex,

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

More information

A Secure Decentralized Access Control Scheme for Data stored in Clouds

A Secure Decentralized Access Control Scheme for Data stored in Clouds A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University

More information

SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS

SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS Ayesha Tabassum 1 1 Assistant Professor, Department of Computer Science and Engineering, DCET, Osmania University, Telangana, India Abstract

More information

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S ramya_88@yahoo.com, k shobsi@yahoo.co.in,thangam_85@yahoo.com Department of Computer Science,

More information

Wireless Network Security 14-814 Spring 2014

Wireless Network Security 14-814 Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #8 Broadcast Security & Key Mgmt 1 Announcements 2 Broadcast Communication Wireless networks can leverage the broadcast advantage property

More information

CERTIFICATE REVOCATION LIST DISTRIBUTION IN VEHICULAR AD HOC NETWORKS

CERTIFICATE REVOCATION LIST DISTRIBUTION IN VEHICULAR AD HOC NETWORKS CERTIFICATE REVOCATION LIST DISTRIBUTION IN VEHICULAR AD HOC NETWORKS A Dissertation Presented to The Academic Faculty By Michael E. Nowatkowski In Partial Fulfillment Of the Requirements for the Degree

More information

ssumathy@vit.ac.in upendra_mcs2@yahoo.com

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks

Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Jing Deng Department of Computer Science University of New Orleans New Orleans, LA 7048, USA jing@cs.uno.edu Yunghsiang

More information

A Trust-driven Privacy Architecture for Vehicular Ad-Hoc Networks

A Trust-driven Privacy Architecture for Vehicular Ad-Hoc Networks A Trust-driven Privacy Architecture for Vehicular Ad-Hoc Networks Jetzabel M. Serna-Olvera Computer Architecture Department Universitat Politècnica de Catalunya A thesis submitted for the degree of Doctor

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

Public Key Cryptography in Practice. c Eli Biham - May 3, 2005 372 Public Key Cryptography in Practice (13)

Public Key Cryptography in Practice. c Eli Biham - May 3, 2005 372 Public Key Cryptography in Practice (13) Public Key Cryptography in Practice c Eli Biham - May 3, 2005 372 Public Key Cryptography in Practice (13) How Cryptography is Used in Applications The main drawback of public key cryptography is the inherent

More information

SAFE: A Social Based Updatable Filtering Protocol with Privacy-preserving in Mobile Social Networks

SAFE: A Social Based Updatable Filtering Protocol with Privacy-preserving in Mobile Social Networks IEEE ICC 23 - Wireless Networking Symposium SAFE: A Social Based Updatable Filtering Protocol with Privacy-preserving in Mobile Social Networks Kuan Zhang, Xiaohui Liang, Rongxing Lu, and Xuemin (Sherman)

More information

Internet Sustainability and Network Marketing Safety

Internet Sustainability and Network Marketing Safety Protecting Neighbor Discovery Against Node Compromises in Sensor Networks Donggang Liu isec Laboratory, CSE Department The University of Texas at Arlington Abstract The neighborhood information has been

More information

An Approach to Enhance in Group Signature Scheme with Anonymous Revocation

An Approach to Enhance in Group Signature Scheme with Anonymous Revocation An Approach to Enhance in Group Signature Scheme with Anonymous Revocation Thu Thu Mon Oo, and Win Htay Abstract This paper concerns with the group signature scheme. In this scheme, anyone who can access

More information

Public-Key Infrastructure

Public-Key Infrastructure Public-Key Infrastructure Technology and Concepts Abstract This paper is intended to help explain general PKI technology and concepts. For the sake of orientation, it also touches on policies and standards

More information

Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme

Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme Asha A 1, Hussana Johar 2, Dr B R Sujatha 3 1 M.Tech Student, Department of ECE, GSSSIETW, Mysuru, Karnataka, India

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram. Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech

More information

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication

More information

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:

More information

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile

More information

Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation

Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation Katrin Hoeper and Guang Gong khoeper@engmail.uwaterloo.ca, ggong@calliope.uwaterloo.ca Department of Electrical

More information

Secure Cluster Formation and Certificate Revocation Of Adversary Nodes In Mobile Adhoc Network

Secure Cluster Formation and Certificate Revocation Of Adversary Nodes In Mobile Adhoc Network Secure Cluster Formation and Certificate Revocation Of Adversary Nodes In Mobile Adhoc Network Ambarish.A 1, Gowthamani.R 2 Department of Computer Science, Nehru Institute of Technology, Coimbatore 1,

More information

Securing Wireless Mesh Networks

Securing Wireless Mesh Networks Securing Wireless Mesh Networks Naouel Ben Salem Jean-Pierre Hubaux Laboratory of Computer Communications and Applications (LCA) EPFL Lausanne, Switzerland naouel.bensalem@epfl.ch jean-pierre.hubaux@epfl.ch

More information

Resistance of Denial-of-Service Attack in Network Coding using Node Authenticity

Resistance of Denial-of-Service Attack in Network Coding using Node Authenticity Resistance of Denial-of-Service Attack in Network Coding using Node Authenticity P. ANITHA PG Scholar Dept. of Computer Science Velalar College of Engineering and Technology ANNA UNIVERSITY, CHENNAI anita4890@gmail.com

More information

Tema 5.- Seguridad. Problemas Soluciones

Tema 5.- Seguridad. Problemas Soluciones Tema 5.- Seguridad Problemas Soluciones Wireless medium is easy to snoop on Routing security vulnerabilities Due to ad hoc connectivity and mobility, it is hard to guarantee access to any particular node

More information

A Secure Key Management Scheme in Wireless Mesh Networks

A Secure Key Management Scheme in Wireless Mesh Networks A Secure Key Management Scheme in Wireless Mesh Networks Farah Kandah, Weiyi Zhang, Xiaojiang Du, Yashaswi Singh Department of Computer Science, North Dakota State University, Fargo, ND 585 Department

More information

Car Connections. Johan Lukkien. System Architecture and Networking

Car Connections. Johan Lukkien. System Architecture and Networking Car Connections Johan Lukkien System Architecture and Networking 1 Smart mobility, TU/e wide Cooperative Driving (platooning), A270: Helmond-Eindhoven, 2011 (Mechanical Engineering/TNO) Full electric:

More information

Chapter 14. Key management and Distribution. Symmetric Key Distribution Using Symmetric Encryption

Chapter 14. Key management and Distribution. Symmetric Key Distribution Using Symmetric Encryption Chapter 14. Key management and Distribution Symmetric Key Distribution Using Symmetric Encryption For symmetric encryption to work, the two parties to an exchange must share the same key, and that key

More information

Special Properties of Ad-hoc Wireless Network and Security Models

Special Properties of Ad-hoc Wireless Network and Security Models Special Properties of Ad-hoc Wireless Network and Security Models Han Zhong Department of Computer Science, University of Auckland E-mail: hzho023@aucklanduni.ac.nz Abstract:There are certain amounts of

More information

Introduction to Network Security Key Management and Distribution

Introduction to Network Security Key Management and Distribution Introduction to Network Security Key Management and Distribution Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and Technology cetinkayae@mst.edu http://web.mst.edu/~cetinkayae/teaching/cpe5420fall2015

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Security Digital Certificate Manager

Security Digital Certificate Manager IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,

More information

Intelligent Transportation System for Vehicular Ad-Hoc Networks

Intelligent Transportation System for Vehicular Ad-Hoc Networks Intelligent Transportation System for Vehicular Ad-Hoc Networks T. Sujitha 1, S. Punitha Devi 2 1,2 Department of CSE, P.A College of Engineering and Technology, Coimbatore, Tamilnadu Abstract - Vehicular

More information

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1 KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE Mihir Bellare UCSD 1 The public key setting Alice M D sk[a] (C) Bob pk[a] C C $ E pk[a] (M) σ $ S sk[a] (M) M, σ Vpk[A] (M, σ) Bob can: send encrypted data

More information

An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture

An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture 435 An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture Balamurugan.V School of Computing Science and Engineering, VIT University Chennai Campus, 600127, Tamilnadu, India. Abstract

More information

ISSN: 2321-7782 (Online) Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

DDoS Attack on WAVE-enabled VANET Through Synchronization

DDoS Attack on WAVE-enabled VANET Through Synchronization DDoS Attack on WAVE-enabled VANET Through Synchronization Subir Biswas Department of Computer Science University of Manitoba Winnipeg, Canada R3T 2N2 Email: bigstan@cs.umanitoba.ca Jelena Mišić Department

More information

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0 Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust

More information

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication

More information

On the Limits of Anonymous Password Authentication

On the Limits of Anonymous Password Authentication On the Limits of Anonymous Password Authentication Yan-Jiang Yang a Jian Weng b Feng Bao a a Institute for Infocomm Research, Singapore, Email: {yyang,baofeng}@i2r.a-star.edu.sg. b School of Computer Science,

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Authentication Application

Authentication Application Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be

More information

Lecture VII : Public Key Infrastructure (PKI)

Lecture VII : Public Key Infrastructure (PKI) Lecture VII : Public Key Infrastructure (PKI) Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 Problems with Public

More information

CHAPTER 5 ACO BASED MOBILE AGENT FOR SECURED KEY MANAGEMENT

CHAPTER 5 ACO BASED MOBILE AGENT FOR SECURED KEY MANAGEMENT 112 CHAPTER 5 ACO BASED MOBILE AGENT FOR SECURED KEY MANAGEMENT 5.1 Related Work Security in ad hoc network becomes a critical issue for the past few decades. Attacks will be avoided by authenticating

More information