DSRC: DEDICATED SHORT-RANGE COMMUNICATION FOR IMPROVED ROAD SAFETY
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.7, No. 1)Publication Date: 2018-01-30
Authors : Vinitha Mathew; Leya Elizabeth Sunny;
Page : 613-622
Keywords : Dedicated Short Range Communication; ITS; Denial of Service (DoS); Computational based Dos;
Abstract
Many wireless communication systems are available now, which facilitate a wide range of applications and benefits in the vehicular environment. These applications can be organize into two types, namely, lane safety and traffic efficiency where each have its own set of functional and performance requirements. For ancillary drivers to travel safely and comfortably, many of these requirements need to be met. Also the harmony of different radio access technologies brings limitless opportunities for showdown the application requirements, it is very important and assert to note the toughness and vulnerability of each technology and get an idea about which technology is more suitable for the given networking scenario. In ITS, we need to deal with both vehicles and the road side units which is very important to bring these systems to awareness. In this paper, Dedicated Short Rang communication technique is used for improved road safety with aid of Secure Prediction based authentication scheme. Here, Beacons are used for secure V2V and V2R communication. When a large number of beacons arrive in a short time, vehicles are vulnerable to computation-based Denial of Service (DoS) attacks that excessive signature verification exhausts their computational resources. In contrast to most existing authentication schemes, our SPBAis an efficient and lightweight scheme since it is primarily built on symmetric cryptography. To further reduce the verification delay for some emergency applications, SPBA is designed to exploit the sender vehicle's ability to predict future beacons in advance. In addition, to prevent memory-based DoS attacks, SPBA only stores shortened re-keyed Message Authentication Codes (MACs) of signatures without decreasing security
Other Latest Articles
- MANUFACTURE OF INTERLOCKING CONCRETE PAVING BLOCKS WITH FLY ASH AND GLASS POWDER
- A REVIEW ON SOFTWARE PRONE DETECTION AND ITS PREVENTION TECHNIQUES
- APPLICATION OF ADAPTIVE NEURO-FUZZY INFERENCE SYSTEMS AND ARTIFICIAL NEURAL NETWORK AND FOR KINEMATIC VISCOSITY OF BIODIESEL PREDICTION
- CORPORATE GOVERNANCE PRACTICES IN INDIA – A STUDY
- INNOVATIVE MARKETING STRATEGIES IN TOP MOST COMPANIES
Last modified: 2018-02-01 21:51:16