International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-2  ( Feb, 2024 )
Past issues
  1. Volume-12,Issue-1  ( Jan, 2024 )
  2. Volume-11,Issue-12  ( Dec, 2023 )
  3. Volume-11,Issue-11  ( Nov, 2023 )
  4. Volume-11,Issue-10  ( Oct, 2023 )
  5. Volume-11,Issue-9  ( Sep, 2023 )
  6. Volume-11,Issue-8  ( Aug, 2023 )
  7. Volume-11,Issue-7  ( Jul, 2023 )
  8. Volume-11,Issue-6  ( Jun, 2023 )
  9. Volume-11,Issue-5  ( May, 2023 )
  10. Volume-11,Issue-4  ( Apr, 2023 )

Statistics report
Jun. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 134
Paper Published : 1567
No. of Authors : 4088
  Journal Paper


Paper Title :
A Privacy-Preserving Decentralized Group-Authentication Protocol For VANETS

Author :P.Chandra Sekhar, B.Praveen Kumar, M.R.Pavan Kumar, N.Papanna

Article Citation :P.Chandra Sekhar ,B.Praveen Kumar ,M.R.Pavan Kumar ,N.Papanna , (2013 ) " A Privacy-Preserving Decentralized Group-Authentication Protocol For VANETS " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 51-54, Volume-1,Issue-1

Abstract : Vehicular ad hoc networks (VANETs) are an instance of mobile ad hoc networks that aim to enhance the safety and the efficiency. In vehicular ad hoc networks(VANETs) raise challenges such as certificate distribution and revocation, avoidance of computation and communication bottlenecks, and reduction of the strong reliance on tamper-proof devices. This paper efficiently copes with these challenges with a decentralized group-authentication protocol in the sense that the group is maintained by each roadside unit (RSU) rather than by a centralized authority, as in most existing protocols that are employing group signatures. In our proposal Vehicles entering the group can anonymously broadcast vehicle-to-vehicle (V2V) messages, which can be instantly verified by the vehicles in the same group (and neighboring groups). Later, if the message is found to be false, a third party can be invoked to disclose the identity of the message originator.

Type : Research paper

Published : Volume-1,Issue-1


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-9   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 26
| Published on 2014-01-17
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY