Open Access Open Access  Restricted Access Subscription Access

GSIS: A Secure and Timed-Efficient Stream Loss-Tolerant Authentication Protocol For Vehicular Communications


Affiliations
1 Department of Computer Science, Karpagam University, Coimbatore, India
2 Department of Computer Science, Tamil University, Thanjavur, India
 

In this paper, we first identify some unique design requirements in the aspects of security and TESLA for communication between different communication devices in vehicular ad hoc networks. We propose a Time-Efficient stream Loss -Tolerant Authentication broadcast authentication protocol based on Group signature and Identify (ID) based signature techniques. We demonstrate that the proposed protocol as an efficient protocol with communication and computation overhead, which scales to large number of receiver, and tolerate packet loss. TESLA protocol guarantee the requirements of security can provide the desired traceability of each vehicle in the case where the ID of the message sender has to be receiver by the authority of any dispute event Extensive simulation is conducted to verify the efficiency, effectiveness and applicability of the proposed protocol in various application scenarios under different road systems.

Keywords

ID – Based Signature, TESLA, and Vehicular Communication.
User
Notifications
Font Size

Abstract Views: 140

PDF Views: 2




  • GSIS: A Secure and Timed-Efficient Stream Loss-Tolerant Authentication Protocol For Vehicular Communications

Abstract Views: 140  |  PDF Views: 2

Authors

R. Suganya
Department of Computer Science, Karpagam University, Coimbatore, India
K. Ravikumar
Department of Computer Science, Tamil University, Thanjavur, India

Abstract


In this paper, we first identify some unique design requirements in the aspects of security and TESLA for communication between different communication devices in vehicular ad hoc networks. We propose a Time-Efficient stream Loss -Tolerant Authentication broadcast authentication protocol based on Group signature and Identify (ID) based signature techniques. We demonstrate that the proposed protocol as an efficient protocol with communication and computation overhead, which scales to large number of receiver, and tolerate packet loss. TESLA protocol guarantee the requirements of security can provide the desired traceability of each vehicle in the case where the ID of the message sender has to be receiver by the authority of any dispute event Extensive simulation is conducted to verify the efficiency, effectiveness and applicability of the proposed protocol in various application scenarios under different road systems.

Keywords


ID – Based Signature, TESLA, and Vehicular Communication.