SlideShare une entreprise Scribd logo
1  sur  18
EMAP: Expedite Message Authentication Protocol
for Vehicular Ad Hoc Networks

EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
Introduction:
A taxonomy of wireless networks

EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
Ad Hoc Networks
• Non-infrastructure
• Fixed and Mobile Nodes
• Special Classes of Ad Hoc Networks
 Vehicular Ad Hoc Networks
 Wireless Mesh Networks
 Wireless Sensor Networks
 Bluetooth Scatternets…

EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
What is a VANET
(Vehicular Ad hoc NETwork)?
Roadside
base station

Emergency
event

Inter-vehicle
communications
Vehicle-to-roadside
communications

EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
HMAC
 HMAC stands for Hash-based Message Authentication

Code
 It used to verify data integrity and authenticity of a
message
 It uses current cryptographic hash functions with a
secret key (SHA )
Terms
 Some terms to help out with the next slide:
 H = hash function
 K = key
 M = message
 || = concatenation
 XOR = XOR
 o_key_pad = outer padding (one block long 0x36)
 i_key_pad = inner padding (one block long 0x5c)
 In short:

HMAC(k,m) = H((k XOR o_key_pad) || H((k XOR
i_key_pad) || m))
A visual look
Objective:
 The main aim of this project is to propose

EMAP(Expedite Message Authentication Protocol)
for vehicular Ad hoc Networks which replaces the
time-consuming CRL(Certificate Revocation List)
checking process by an efficient revocation checking
process.

EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
Existing System:
 In existing system, VANETs use the Public Key

Infrastructure (PKI) and Certificate Revocation Lists
(CRLs) in which the authentication of a received
message is performed by checking if the Certificate of
the sender is included in the current CRL.

EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
Demerits:
 A variety of attacks such as
 Injecting false information,
 Modifying and
 Replaying the disseminated messages can be easily

launched.
 Delay in checking the revocation status of a
certificate.

EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
Proposed System:
 Expedite Message Authentication Protocol (EMAP)

for VANETs, replaces the time-consuming CRL
checking process by an efficient revocation checking
process which uses a keyed Hash Message
Authentication Code (HMAC) and novel probabilistic
key distribution.

EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
Merits:
 Decreased message loss ratio

 EMAP is secure and efficient.
 The number of messages that can be verified using

EMAP within 300msec is greater than that using
linear and binary CRL checking by 88.7 and 48.38
percent respectively

EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
Modules:
 Vehicle-to-Vehicle (V2V) and Vehicle-toInfrastructure

 Expedite Message Authentication Protocol

EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
1. Vehicle-to-Vehicle (V2V) and Vehicle-toInfrastructure

 OBU’s can communicate either with other OBU’s

through V2V communications or with RSU’s through
V2I communications.

EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
2. Expedite Message Authentication Protocol
In this Module,
 A Trusted Authority (TA): provides anonymous
certificate and Distributing secret keys to all OBUs in
the network.
 Roadside units (RSUs): RSUs are fixed units
distributed all over the network.
 On-Board Units (OBUs): OBUs are embedded in
vehicles.

EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
System Requirements:
 Hardware Requirements:

System
Hard Disk
Floppy Drive
Monitor
Mouse
Ram

: Pentium IV 2.4 GHz.
: 40 GB.
: 1.44 Mb.
: 15 VGA Color.
: Logitech.
: 512 Mb.

 Software Requirements:

Operating system
Coding Language
Front End

: Windows 7 Ultimate (32-bit)
: ASP.Net with C#.
: Visual Studio 2010 Professional

EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
Thank you

EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc
Networks

Contenu connexe

Tendances

[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network SecurityLim Jung
 
Restricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection
Restricted Usage of Anonymous Credentials in VANET for Misbehaviour DetectionRestricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection
Restricted Usage of Anonymous Credentials in VANET for Misbehaviour DetectionAnkit Singh
 
Presentation pfe
Presentation pfePresentation pfe
Presentation pfeMalik Riahi
 
VANET in Mobile Computing
VANET in Mobile ComputingVANET in Mobile Computing
VANET in Mobile ComputingKABILESH RAMAR
 
VANETs Presentation
VANETs PresentationVANETs Presentation
VANETs PresentationiQra Rafaqat
 
Vehicular sensor netwks ppt
Vehicular sensor netwks pptVehicular sensor netwks ppt
Vehicular sensor netwks pptVenkatesh Kaduru
 
Performance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsPerformance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsjournalBEEI
 
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...Joarder Kamal
 
Vanet modeling and clustering design under practical traffic, channel and mob...
Vanet modeling and clustering design under practical traffic, channel and mob...Vanet modeling and clustering design under practical traffic, channel and mob...
Vanet modeling and clustering design under practical traffic, channel and mob...IISTech2015
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
 
Inter vehicle communication
Inter vehicle communicationInter vehicle communication
Inter vehicle communicationR prasad
 
Adaptive Beaconing Schemes in VANETs: Hybrid Approach
Adaptive Beaconing Schemes in VANETs: Hybrid ApproachAdaptive Beaconing Schemes in VANETs: Hybrid Approach
Adaptive Beaconing Schemes in VANETs: Hybrid ApproachSyed Hassan Ahmed
 
(Slides) Inter-Vehicle Communication Protocol for Cooperatively Capturing and...
(Slides) Inter-Vehicle Communication Protocol for Cooperatively Capturing and...(Slides) Inter-Vehicle Communication Protocol for Cooperatively Capturing and...
(Slides) Inter-Vehicle Communication Protocol for Cooperatively Capturing and...Naoki Shibata
 

Tendances (20)

[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security
 
Restricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection
Restricted Usage of Anonymous Credentials in VANET for Misbehaviour DetectionRestricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection
Restricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection
 
VANET
VANETVANET
VANET
 
Presentation pfe
Presentation pfePresentation pfe
Presentation pfe
 
Issues of routing in vanet
Issues of routing in vanetIssues of routing in vanet
Issues of routing in vanet
 
VANET
VANETVANET
VANET
 
VANET overview & technical review
VANET overview &  technical reviewVANET overview &  technical review
VANET overview & technical review
 
VANET in Mobile Computing
VANET in Mobile ComputingVANET in Mobile Computing
VANET in Mobile Computing
 
VANETs Presentation
VANETs PresentationVANETs Presentation
VANETs Presentation
 
Vehicular sensor netwks ppt
Vehicular sensor netwks pptVehicular sensor netwks ppt
Vehicular sensor netwks ppt
 
V2V tech
V2V techV2V tech
V2V tech
 
Performance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsPerformance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocols
 
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
 
Vanet modeling and clustering design under practical traffic, channel and mob...
Vanet modeling and clustering design under practical traffic, channel and mob...Vanet modeling and clustering design under practical traffic, channel and mob...
Vanet modeling and clustering design under practical traffic, channel and mob...
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANET
 
VANET (BY-VEDANT)
VANET (BY-VEDANT)VANET (BY-VEDANT)
VANET (BY-VEDANT)
 
Inter vehicle communication
Inter vehicle communicationInter vehicle communication
Inter vehicle communication
 
Routing protocols in Vanet
Routing protocols in VanetRouting protocols in Vanet
Routing protocols in Vanet
 
Adaptive Beaconing Schemes in VANETs: Hybrid Approach
Adaptive Beaconing Schemes in VANETs: Hybrid ApproachAdaptive Beaconing Schemes in VANETs: Hybrid Approach
Adaptive Beaconing Schemes in VANETs: Hybrid Approach
 
(Slides) Inter-Vehicle Communication Protocol for Cooperatively Capturing and...
(Slides) Inter-Vehicle Communication Protocol for Cooperatively Capturing and...(Slides) Inter-Vehicle Communication Protocol for Cooperatively Capturing and...
(Slides) Inter-Vehicle Communication Protocol for Cooperatively Capturing and...
 

Similaire à Emap expedite message authentication protocol for vehicular ad hoc networks

Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksJPINFOTECH JAYAPRAKASH
 
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Java  emap expedite message authentication protocol for vehicular ad hoc netw...Java  emap expedite message authentication protocol for vehicular ad hoc netw...
Java emap expedite message authentication protocol for vehicular ad hoc netw...ecwayerode
 
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Java  emap expedite message authentication protocol for vehicular ad hoc netw...Java  emap expedite message authentication protocol for vehicular ad hoc netw...
Java emap expedite message authentication protocol for vehicular ad hoc netw...Ecway Technologies
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...Ecway Technologies
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEcway Technologies
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksecway
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEcway Technologies
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksIEEEFINALYEARPROJECTS
 
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksEMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksKaashivInfoTech Company
 
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...JAYAPRAKASH JPINFOTECH
 
Remote access service
Remote access serviceRemote access service
Remote access serviceApoorw Pandey
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...Ecwaytech
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEcwaytech
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksecwayprojects
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...Ecwayt
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEcwayt
 
authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)Azad Kaki
 
Vehicular ad hoc_networks
Vehicular ad hoc_networksVehicular ad hoc_networks
Vehicular ad hoc_networksAbdulrub Moshin
 

Similaire à Emap expedite message authentication protocol for vehicular ad hoc networks (20)

Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Java  emap expedite message authentication protocol for vehicular ad hoc netw...Java  emap expedite message authentication protocol for vehicular ad hoc netw...
Java emap expedite message authentication protocol for vehicular ad hoc netw...
 
Java emap expedite message authentication protocol for vehicular ad hoc netw...
Java  emap expedite message authentication protocol for vehicular ad hoc netw...Java  emap expedite message authentication protocol for vehicular ad hoc netw...
Java emap expedite message authentication protocol for vehicular ad hoc netw...
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
32
3232
32
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksEMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
 
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...
 
Remote access service
Remote access serviceRemote access service
Remote access service
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Introduction to WAP
Introduction to WAPIntroduction to WAP
Introduction to WAP
 
authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)
 
Vehicular ad hoc_networks
Vehicular ad hoc_networksVehicular ad hoc_networks
Vehicular ad hoc_networks
 

Plus de Madan Golla

Optimizing cloud resources for delivering iptv services through virtualization
Optimizing cloud resources for delivering iptv services through virtualizationOptimizing cloud resources for delivering iptv services through virtualization
Optimizing cloud resources for delivering iptv services through virtualizationMadan Golla
 
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...Madan Golla
 
Document clustering for forensic analysis an approach for improving compute...
Document clustering for forensic   analysis an approach for improving compute...Document clustering for forensic   analysis an approach for improving compute...
Document clustering for forensic analysis an approach for improving compute...Madan Golla
 
Collaboration in multi cloud computing environments framework and security is...
Collaboration in multi cloud computing environments framework and security is...Collaboration in multi cloud computing environments framework and security is...
Collaboration in multi cloud computing environments framework and security is...Madan Golla
 
Cloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energyCloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energyMadan Golla
 
A system to filter unwanted messages from the
A system to filter unwanted messages from theA system to filter unwanted messages from the
A system to filter unwanted messages from theMadan Golla
 
A generalized flow based method for analysis of implicit
A generalized flow based method for analysis of implicitA generalized flow based method for analysis of implicit
A generalized flow based method for analysis of implicitMadan Golla
 

Plus de Madan Golla (9)

Rise
RiseRise
Rise
 
Optimizing cloud resources for delivering iptv services through virtualization
Optimizing cloud resources for delivering iptv services through virtualizationOptimizing cloud resources for delivering iptv services through virtualization
Optimizing cloud resources for delivering iptv services through virtualization
 
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
 
Document clustering for forensic analysis an approach for improving compute...
Document clustering for forensic   analysis an approach for improving compute...Document clustering for forensic   analysis an approach for improving compute...
Document clustering for forensic analysis an approach for improving compute...
 
Collaboration in multi cloud computing environments framework and security is...
Collaboration in multi cloud computing environments framework and security is...Collaboration in multi cloud computing environments framework and security is...
Collaboration in multi cloud computing environments framework and security is...
 
Cloud mo v
Cloud mo vCloud mo v
Cloud mo v
 
Cloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energyCloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energy
 
A system to filter unwanted messages from the
A system to filter unwanted messages from theA system to filter unwanted messages from the
A system to filter unwanted messages from the
 
A generalized flow based method for analysis of implicit
A generalized flow based method for analysis of implicitA generalized flow based method for analysis of implicit
A generalized flow based method for analysis of implicit
 

Dernier

Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 

Dernier (20)

Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 

Emap expedite message authentication protocol for vehicular ad hoc networks

  • 1. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
  • 2. Introduction: A taxonomy of wireless networks EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
  • 3. Ad Hoc Networks • Non-infrastructure • Fixed and Mobile Nodes • Special Classes of Ad Hoc Networks  Vehicular Ad Hoc Networks  Wireless Mesh Networks  Wireless Sensor Networks  Bluetooth Scatternets… EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
  • 4. What is a VANET (Vehicular Ad hoc NETwork)? Roadside base station Emergency event Inter-vehicle communications Vehicle-to-roadside communications EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
  • 5. HMAC  HMAC stands for Hash-based Message Authentication Code  It used to verify data integrity and authenticity of a message  It uses current cryptographic hash functions with a secret key (SHA )
  • 6. Terms  Some terms to help out with the next slide:  H = hash function  K = key  M = message  || = concatenation  XOR = XOR  o_key_pad = outer padding (one block long 0x36)  i_key_pad = inner padding (one block long 0x5c)  In short: HMAC(k,m) = H((k XOR o_key_pad) || H((k XOR i_key_pad) || m))
  • 8. Objective:  The main aim of this project is to propose EMAP(Expedite Message Authentication Protocol) for vehicular Ad hoc Networks which replaces the time-consuming CRL(Certificate Revocation List) checking process by an efficient revocation checking process. EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
  • 9. Existing System:  In existing system, VANETs use the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs) in which the authentication of a received message is performed by checking if the Certificate of the sender is included in the current CRL. EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
  • 10. Demerits:  A variety of attacks such as  Injecting false information,  Modifying and  Replaying the disseminated messages can be easily launched.  Delay in checking the revocation status of a certificate. EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
  • 11. Proposed System:  Expedite Message Authentication Protocol (EMAP) for VANETs, replaces the time-consuming CRL checking process by an efficient revocation checking process which uses a keyed Hash Message Authentication Code (HMAC) and novel probabilistic key distribution. EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
  • 12. Merits:  Decreased message loss ratio  EMAP is secure and efficient.  The number of messages that can be verified using EMAP within 300msec is greater than that using linear and binary CRL checking by 88.7 and 48.38 percent respectively EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
  • 13. Modules:  Vehicle-to-Vehicle (V2V) and Vehicle-toInfrastructure  Expedite Message Authentication Protocol EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
  • 14. 1. Vehicle-to-Vehicle (V2V) and Vehicle-toInfrastructure  OBU’s can communicate either with other OBU’s through V2V communications or with RSU’s through V2I communications. EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
  • 15. 2. Expedite Message Authentication Protocol In this Module,  A Trusted Authority (TA): provides anonymous certificate and Distributing secret keys to all OBUs in the network.  Roadside units (RSUs): RSUs are fixed units distributed all over the network.  On-Board Units (OBUs): OBUs are embedded in vehicles. EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
  • 16. System Requirements:  Hardware Requirements: System Hard Disk Floppy Drive Monitor Mouse Ram : Pentium IV 2.4 GHz. : 40 GB. : 1.44 Mb. : 15 VGA Color. : Logitech. : 512 Mb.  Software Requirements: Operating system Coding Language Front End : Windows 7 Ultimate (32-bit) : ASP.Net with C#. : Visual Studio 2010 Professional EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
  • 17. EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks
  • 18. Thank you EMAP: Expedite Message Authentication protocol for Vehicular Ad Hoc Networks