Skip to content
You are not logged in |Login  
     
Limit search to available items
Record:   Prev Next
Resources
More Information
Bestseller
BestsellerE-book
Author Maria, Azees, author.

Title Efficient Anonymous Authentication and Key Management Techniques for Vehicular Ad-hoc Networks / Azees Maria.

Publication Info. [Place of publication not identified] : Diplomica Verlag GmbH : Anchor Academic Publishing, 2018.

Item Status

Description 1 online resource
Physical Medium polychrome
Description text file
Contents Efficient Anonymous Authentication and Key Management Techniques for Vehicular Ad-hoc Networks; ABSTRACT; ACKNOWLEGDEMENT; TABLE OF CONTENTS; LIST OF TABLES; LIST OF FIGURES; LIST OF SYMBOLS AND ABBREVIATIONS; CHAPTER 1 INTRODUCTION; 1.1 VANET OVERVIEW; 1.1.1 VANET System Model; 1.1.2 Dedicated Short Range Communication (DSRC); 1.1.3 VANET Characteristics; 1.2 SECURITY ISSUES IN VANET; 1.3 PROPOSED WORKS; 1.4 OBJECTIVES OF THE RESEARCH WORK; 1.5 ASSUMPTIONS; 1.6 ORGANIZATION OF THE THESIS; CHAPTER 2 LITERATURE SURVEY; 2.1 INTRODUCTION; 2.2 SECURITY SERVICES OF VANETS
2.3 AVAILABILITY IN VANETS2.3.1 Threats and Attacks on Availability; 2.3.2 Works on Availability; 2.4 CONFIDENTIALITY IN VANETS; 2.4.1 Threats and Attacks on Confidentiality; 2.4.2 Works on Confidentiality; 2.5 AUTHENTICATION IN VANETS; 2.5.1 Threats and Attacks on Authentication; 2.5.2 Requirements for Authentication; 2.5.3 Works on Authentication with Privacy Preservation; 2.5.4 Computational Cost for Various Authentication Schemes; 2.6 DATA INTEGRITY IN VANETS; 2.6.1 Threats and Attacks on Data Integrity; 2.6.2 Works on Data Integrity; 2.7 NON-REPUDIATION IN VANETS
2.7.1 Attack on Non-repudiation2.7.2 Works on Non-repudiation; 2.8 COUNTERMEASURES ON VARIOUS SECURITYATTACKS; 2.9 WORKS ON KEY MANAGEMENT; 2.10 LITERATURE SURVEY GAPS; 2.11 PROPOSED WORK; 2.12 CONCLUSIONS; CHAPTER3 SYSTEM ARCHITECTURE; CHAPTER 4 DUAL AUTHENTICATION AND DUAL KEYMANAGEMENT FOR GROUP COMMUNICATION; 4.1 INTRODUCTION; 4.2 PROPOSED DUAL AUTHENTICATION TECHNIQUE; 4.2.1 Registration Through Offline Mode; 4.2.2 Vehicle's Authentication Process; 4.2.3 Trusted Authority's Authentication Process and the Provisionof Authentication Code (AC)
4.3 PROPOSED DUAL KEY MANAGEMENT FOR GROUPCOMMUNICATION4.3.1 TA Initial Set Up; 4.3.2 Group Key Computation; 4.3.3 Secure Data Transmission in VANETs; 4.3.4 Key Updating; 4.4 SECURITY ANALYSIS; 4.4.1 Resistance to Replay Attack; 4.4.2 Masquerade and Sybil Attacks; 4.4.3 Message Tampering /Fabrication/Alteration Attack; 4.4.4 Backward Secrecy; 4.4.5 Forward Secrecy; 4.4.6 Collusion Attack; 4.5 PERFORMANCE ANALYSIS; 4.6 CONCLUSIONS; CHAPTER 5 CPAV: COMPUTATIONALLY EFFICIENT PRIVACY PRESERVING ANONYMOUS AUTHENTICATION FOR A VEHICLE USER IN VANETS; 5.1 INTRODUCTION; 5.2 SECURITY REQUIREMENTS
5.3 BILINEAR PAIRING5.4 PROPOSED CPAV SCHEME; 5.4.1 System Initialization; 5.4.2 Registration; 5.4.3 Secure Activation Key Distribution; 5.4.4 CPAV Secure Anonymous Mutual Authentication; 5.5 SECURITY ANALYSIS; 5.5.1 Message Integrity and Source Authentication; 5.5.2 Conditional Privacy Preservation; 5.5.3 Anonymity; 5.6 PERFORMANCE ANALYSIS; 5.7 CONCLUSIONS; CHAPTER 6 EFFICIENT ANONYMOUS AUTHENTICATION OF AN RSU; 6.1 INTRODUCTION; 6.2 ANONYMOUS AUTHENTICATION; 6.2.1 System Initialization; 6.2.2 Anonymous Authentication of an RSU; 6.3 SECURITY ANALYSIS; 6.4 PERFORMANCE ANALYSIS
Local Note eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America
Subject Vehicular ad hoc networks (Computer networks)
Vehicular ad hoc networks (Computer networks)
Traffic congestion.
Traffic congestion.
Intelligent transportation systems.
Intelligent transportation systems.
Genre/Form Electronic books.
ISBN 9783960676805 (electronic book)
3960676808 (electronic book)
9783960671800