Repository logo
  • English
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Log In
    or
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • Research Outputs
  • Projects
  • People
  • Statistics
  • English
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Log In
    or
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Scholalry Output
  3. Publications
  4. Identity based proficient message verification scheme for vehicle users
 
  • Details
Options

Identity based proficient message verification scheme for vehicle users

ISSN
15741192
Date Issued
2019-11-01
Author(s)
Limbasiya, Trupil
Das, Debasis
DOI
10.1016/j.pmcj.2019.101083
Abstract
The vehicular ad-hoc network (VANET) is a significant platform for smart transportation in which vehicles and road-side-units (RSUs) publicly transmit important information with each other on the road. Thus, receivers should generally confirm the sender and data before considering obtained data. Therefore, researchers suggested different vehicular communication schemes to transfer data on the road, but most of these schemes are vulnerable to crucial security attacks, and they are not efficient for vehicular communications due to high computational cost and communication overhead. To overcome security and performance issues, we propose an effective vehicle-to-RSU data transmission scheme using the one-way hash function to exchange meaningful data securely. Further, we do security and performance analysis of the proposed method and do the comparison with other relevant communication schemes. Moreover, the suggested method resists to various security attacks, and it performs better in storage requirement, communication cost, experimental time, and energy consumption compared to other relevant data transmission methods.
Subjects
  • Attack

  • Data

  • Identity

  • Vehicular communicati...

  • Verification

Copyright © 2016-2025  Indian Institute of Technology Jodhpur

Developed and maintained by Dr. Kamlesh Patel and Team, S. R. Ranganathan Learning Hub, IIT Jodhpur.

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback