Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

EBV: Expectation based Validation for Vehicle-to- Vehicle Communication using 3DES

Author : B.Sam 1 S.MuthuKumar 2

Date of Publication :22nd March 2018

Abstract: In vehicular systems, communicate correspondences are basically critical, the same number of security related applications depend on single-bounce guide messages communicate to neighbor vehicles. Be that as it may, it turns into a testing issue to plan a communicate verification conspire for secure vehicle-to-vehicle communication. Particularly when an expansive number of reference points touch base in a brief span, vehicles are powerless against calculation based Denial of Service (DoS) attack that unreasonable signature check depletes their computational assets. In this paper, we propose a proficient communicate confirmation conspire called Expectation based Validation (EBV) to guard against calculation based DoS attack, as well as oppose parcel misfortunes caused by high portability of vehicles. Rather than most existing confirmation conspires, our EBV is a proficient and lightweight plan since it is principally based on symmetric cryptography. To additionally lessen the confirmation delay for some crisis applications, EBV is intended to misuse the sender vehicle's capacity to foresee future reference points ahead of time. What's more, to counteract memory-based DoS attack, EBV just stores abbreviated re-keyed Message Authentication Codes (Macintoshes) of signatures without diminishing security. We dissect the security of our plan and reproduce EBV under changing vehicular system situations. The outcomes show that EBV quick checks very nearly 99% messages with low stockpiling cost in highthickness activity situations as well as in lossy remote conditions

Reference :

    1. Dedicated Short Rang Communications (DSRC), http:// grouper. ieee.org/ groups/scc32/dsrc /index.html
    2. F. Bai, H. Krishnan, V. Sadekar, G. Holland, and T. Elbatt, “Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective,” in Proceedings of IEEE Workshop on Automotive Networking and Applications (AutoNet), pp. 1-25, 2006.
    3. B. Parno and A. Perrig, “Challenges in securing vehicular networks,” in Proceedings of the Fourth Workshop Hot Topics in Networks (HotNets-IV), Nov. 2005
    4. S. B. Lee, G. Pan, J. S. Park, M. Gerla, and S. Lu, “Secure incentives for commercial ad dissemination in vehicular networks,” in Proceedings of ACM Mobihoc, pp. 150-159, 2007.
    5. M. Raya and J. P. Hubaux, “Securing vehicular ad hoc networks,” Journal of Computer Security, vol. 15, no. 1, pp. 39-68 , 2007. [6] IEEE Std 1609.2-2013 - IEEE standard for wireless access in vehicular environments - Security

Recent Article