SlideShare a Scribd company logo
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 1, JANUARY 2014 
EMAP: Expedite Message Authentication 
Protocol for Vehicular Ad Hoc Networks
Abstract 
 Vehicular ad hoc networks (VANETs) adopt the Public Key 
Infrastructure (PKI) and Certificate Revocation Lists (CRLs) for 
their security. In any PKI system, the authentication of a received 
message is performed by checking if the certificate of the sender is 
included in the current CRL, and verifying the authenticity of the 
certificate and signature of the sender. In this paper, we propose an 
Expedite Message Authentication Protocol (EMAP) for VANETs, 
which replaces the time-consuming CRL checking process by an 
efficient revocation checking process. The revocation check 
process in EMAP uses a keyed Hash Message Authentication Code 
ðHMACÞ, where the key used in calculating theHMAC is shared 
only between nonrevoked On-Board Units (OBUs). In addition, 
EMAP uses a novel probabilistic key distribution, which enables 
nonrevoked OBUs to securely share and update a secret key. EMAP 
can significantly decrease the message loss ratio due to the 
message verification delay compared with the conventional 
authentication methods employing CRL. By conducting security 
analysis and performance evaluation, EMAP is demonstrated to be 
secure and efficient.
Existing System 
 Existing system focused on the problem of collusion in distance 
bounding, in which two dishonest verifiers pool information to 
make one of the verifiers look closer by sending similar kind of 
signals. 
 A verifier could then request to have a key distributed to it and 
the prover, which the prover could then use to authenticate its 
authenticated response. 
 Existing methodology involves the 
 Validation of the request by key exchanges and remedial measures 
in checking the genuinity of the message. – if the data is not proper 
reject the message which indicates genuinity is a notable problem. 
 Validating the users data origin in turn checking out the MAC 
data of the user requests raised. – arising from other machine 
indicates the genuinity of request origin. 
 Verifying the turn around time taken for processing the request. 
inappropriate duration indicates an issue at the prover side
Proposed System 
 Proposed system holds the existing processing model with an 
enhanced ciphering algorithm to make the system more robust. 
 Although, the researchers are interested in authentication 
enhanced system. We are utilizing some of the concepts 
introduced in the secrecy logic for authenticating the users. This 
involves the logic to show what a verifier can conclude from 
interacting with an honest prover.A timing based input 
information followed by consecutive timing measurement 
provides more optimistic approach in authenticating the user. 
 Our proposed system provides a proof breaks down concept if 
the prover is dishonest. 
 Validate the authentication information provided by the user. 
 Extract the MAC address to validate the request origin location. 
 Consecutive Execution time duration on the request processing
System Requirements 
 Hardware Requirements: 
Processor : Core 2 duo 
Speed : 2.2GHZ 
RAM : 2GB 
Hard Disk : 160GB 
 Software Requirements: 
Platform : DOTNET (VS2010) , ASP.NET 
Dotnet framework 4.0 
Database : SQL Server 2008 R2
Architecture Diagram

More Related Content

DOCX
Emap expedite message authentication protocol for vehicular ad hoc networks
PPT
Security in Large Networks by Raja Velampalli
PDF
Vehicular ad hoc_networks
PDF
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
DOCX
Emap expedite message authentication protocol for vehicular ad hoc networks
DOCX
Computer Architecture Performance Evolution of Caches using Patch
DOCX
Privacy preserving public auditing for secure cloud storage
DOCX
Dynamic audit services for outsourced storages in clouds
Emap expedite message authentication protocol for vehicular ad hoc networks
Security in Large Networks by Raja Velampalli
Vehicular ad hoc_networks
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Emap expedite message authentication protocol for vehicular ad hoc networks
Computer Architecture Performance Evolution of Caches using Patch
Privacy preserving public auditing for secure cloud storage
Dynamic audit services for outsourced storages in clouds

What's hot (16)

PDF
USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES
DOCX
Privacy preserving public auditing for secure cloud storage
PDF
05 20254 financial stock application
PDF
Trusted Hardware Database With Privacy And Data Confidentiality
DOCX
Privacy preserving public auditing for regenerating-code-based cloud storage
PPT
Privacy preserving public auditing for secure cloud storage
PPTX
IEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detection
DOCX
Privacy preserving public auditing for secure cloud storage
PDF
Privacy preserving public auditing for regenerating-code-based cloud storage
PPTX
Attributes based encryption with verifiable outsourced decryption
DOCX
Attribute based encryption with verifiable outsourced decryption
DOC
Mmb authenticated index for verifiable
PPTX
Privacy preserving public auditing for regenerating-code-based cloud storage
PDF
AAA Protocol
PPTX
Smart Contract Security Testing
USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES
Privacy preserving public auditing for secure cloud storage
05 20254 financial stock application
Trusted Hardware Database With Privacy And Data Confidentiality
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for secure cloud storage
IEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detection
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
Attributes based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryption
Mmb authenticated index for verifiable
Privacy preserving public auditing for regenerating-code-based cloud storage
AAA Protocol
Smart Contract Security Testing
Ad

Similar to EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks (20)

PDF
Java emap expedite message authentication protocol for vehicular ad hoc netw...
PDF
Emap expedite message authentication protocol for vehicular ad hoc networks
PDF
Java emap expedite message authentication protocol for vehicular ad hoc netw...
PDF
Emap expedite message authentication protocol for vehicular ad hoc networks
PDF
Emap expedite message authentication protocol for vehicular ad hoc networks
PPTX
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
PPTX
Emap expedite message authentication protocol for vehicular ad hoc networks
PPTX
Efficient authentication for mobile and pervasive computing
PPTX
Efficient authentication for mobile and pervasive computing
DOCX
Emap expedite message authentication protocol for vehicular ad hoc networks
PDF
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
PDF
Emap expedite message authentication protocol for vehicular ad hoc networks
PDF
Emap expedite message authentication protocol for vehicular ad hoc networks
PDF
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
PDF
Efficient authentication for mobile and pervasive computing
PPTX
Network Security its attacks and countersmeasures
DOCX
Efficient authentication for mobile and pervasive computing
PPTX
Distance-bounding facing both mafia and distance frauds
DOCX
efficient authentication for mobile and pervasive computing
PDF
vanderMerwePhDEngThesis
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Emap expedite message authentication protocol for vehicular ad hoc networks
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
Emap expedite message authentication protocol for vehicular ad hoc networks
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
Emap expedite message authentication protocol for vehicular ad hoc networks
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Efficient authentication for mobile and pervasive computing
Network Security its attacks and countersmeasures
Efficient authentication for mobile and pervasive computing
Distance-bounding facing both mafia and distance frauds
efficient authentication for mobile and pervasive computing
vanderMerwePhDEngThesis
Ad

More from KaashivInfoTech Company (13)

PPTX
A Framework for Periodic Outlier Pattern Detection in Time-Series Sequences
PPTX
Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithre...
PPTX
Security as a Service Model for Cloud Environment
PPTX
Operational Data Fusion Framework for Building Frequent Land sat-Like Imagery
PPTX
Mining Gene Expression Data Focusing Cancer Therapeutics: A Digest
PPTX
CoDe Modeling of Graph Composition for Data Warehouse Report Visualization
PPTX
Data-Centric OS Kernel Malware Characterization
PPTX
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...
PPTX
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...
PPTX
Localization of License Plate Number Using Dynamic Image Processing Techniq...
PPTX
Analysis of Field Data on Web Security Vulnerabilities
PPTX
A New Algorithm for Inferring User Search Goals with Feedback Sessions
PPTX
Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery...
A Framework for Periodic Outlier Pattern Detection in Time-Series Sequences
Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithre...
Security as a Service Model for Cloud Environment
Operational Data Fusion Framework for Building Frequent Land sat-Like Imagery
Mining Gene Expression Data Focusing Cancer Therapeutics: A Digest
CoDe Modeling of Graph Composition for Data Warehouse Report Visualization
Data-Centric OS Kernel Malware Characterization
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...
Localization of License Plate Number Using Dynamic Image Processing Techniq...
Analysis of Field Data on Web Security Vulnerabilities
A New Algorithm for Inferring User Search Goals with Feedback Sessions
Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery...

Recently uploaded (20)

PDF
Why Infotrench Stands Out as the Best SEO Agency in Noida.pdf
PDF
Choosing an Entrepreneurial Path Based on Your Personality.pdf
PPT
8.1 Protein energy malnutrition paedatric.ppt
PPTX
Social Media Marketing Services in USA | Boost Your Brand
PDF
Threat Intelligence Services in Abu Dhabi
PDF
Why Should Call Centers Use Inbound Call Tracking in 2025.pdf
PDF
Looking to Work Abroad_ Here’s Why Canada is a Great Option.pdf
PPTX
Precision Mapping with Scan to BIM Services
PDF
The Cost of Neglect How Skipping Fire Safety Maintenance Can Lead to Disaster...
PDF
Green minimalist professional Business Proposal Presentation.pdf
PPTX
Al Tamayoz Company Profile asd asd asdasd
PDF
Sustainable Fire Safety How AMCs Contribute to a Greener Future.pdf
PDF
AI Staffing for Startups & Growing Businesses | Rubixe
PDF
How to Inspect Exterior Paint for Early Signs of Summer Damage.pdf
PPTX
Why Outsourcing Debt Collection Saves Time and Money.pptx
PDF
The Role of Testing and QA in Successful Mobile App Development_Spinx Infotec...
PDF
The Dark Web’s Front Door: Finding the Real Hidden Wiki
PPTX
Expert Tree Pruning & Maintenance Services in Sydney
PDF
How Firewalls Stop Cyber Attacks Before They Happen?
PDF
Blush & Brown Modern Minimalist eBook Workbook.pdf
Why Infotrench Stands Out as the Best SEO Agency in Noida.pdf
Choosing an Entrepreneurial Path Based on Your Personality.pdf
8.1 Protein energy malnutrition paedatric.ppt
Social Media Marketing Services in USA | Boost Your Brand
Threat Intelligence Services in Abu Dhabi
Why Should Call Centers Use Inbound Call Tracking in 2025.pdf
Looking to Work Abroad_ Here’s Why Canada is a Great Option.pdf
Precision Mapping with Scan to BIM Services
The Cost of Neglect How Skipping Fire Safety Maintenance Can Lead to Disaster...
Green minimalist professional Business Proposal Presentation.pdf
Al Tamayoz Company Profile asd asd asdasd
Sustainable Fire Safety How AMCs Contribute to a Greener Future.pdf
AI Staffing for Startups & Growing Businesses | Rubixe
How to Inspect Exterior Paint for Early Signs of Summer Damage.pdf
Why Outsourcing Debt Collection Saves Time and Money.pptx
The Role of Testing and QA in Successful Mobile App Development_Spinx Infotec...
The Dark Web’s Front Door: Finding the Real Hidden Wiki
Expert Tree Pruning & Maintenance Services in Sydney
How Firewalls Stop Cyber Attacks Before They Happen?
Blush & Brown Modern Minimalist eBook Workbook.pdf

EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks

  • 1. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 1, JANUARY 2014 EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
  • 2. Abstract  Vehicular ad hoc networks (VANETs) adopt the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs) for their security. In any PKI system, the authentication of a received message is performed by checking if the certificate of the sender is included in the current CRL, and verifying the authenticity of the certificate and signature of the sender. In this paper, we propose an Expedite Message Authentication Protocol (EMAP) for VANETs, which replaces the time-consuming CRL checking process by an efficient revocation checking process. The revocation check process in EMAP uses a keyed Hash Message Authentication Code ðHMACÞ, where the key used in calculating theHMAC is shared only between nonrevoked On-Board Units (OBUs). In addition, EMAP uses a novel probabilistic key distribution, which enables nonrevoked OBUs to securely share and update a secret key. EMAP can significantly decrease the message loss ratio due to the message verification delay compared with the conventional authentication methods employing CRL. By conducting security analysis and performance evaluation, EMAP is demonstrated to be secure and efficient.
  • 3. Existing System  Existing system focused on the problem of collusion in distance bounding, in which two dishonest verifiers pool information to make one of the verifiers look closer by sending similar kind of signals.  A verifier could then request to have a key distributed to it and the prover, which the prover could then use to authenticate its authenticated response.  Existing methodology involves the  Validation of the request by key exchanges and remedial measures in checking the genuinity of the message. – if the data is not proper reject the message which indicates genuinity is a notable problem.  Validating the users data origin in turn checking out the MAC data of the user requests raised. – arising from other machine indicates the genuinity of request origin.  Verifying the turn around time taken for processing the request. inappropriate duration indicates an issue at the prover side
  • 4. Proposed System  Proposed system holds the existing processing model with an enhanced ciphering algorithm to make the system more robust.  Although, the researchers are interested in authentication enhanced system. We are utilizing some of the concepts introduced in the secrecy logic for authenticating the users. This involves the logic to show what a verifier can conclude from interacting with an honest prover.A timing based input information followed by consecutive timing measurement provides more optimistic approach in authenticating the user.  Our proposed system provides a proof breaks down concept if the prover is dishonest.  Validate the authentication information provided by the user.  Extract the MAC address to validate the request origin location.  Consecutive Execution time duration on the request processing
  • 5. System Requirements  Hardware Requirements: Processor : Core 2 duo Speed : 2.2GHZ RAM : 2GB Hard Disk : 160GB  Software Requirements: Platform : DOTNET (VS2010) , ASP.NET Dotnet framework 4.0 Database : SQL Server 2008 R2