Amazon cover image
Image from Amazon.com

Efficient Anonymous Authentication and Key Management Techniques for Vehicular Ad-hoc Networks / Azees Maria.

By: Material type: TextTextPublisher: [Place of publication not identified] : Diplomica Verlag GmbH : Anchor Academic Publishing, 2018Description: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783960676805
  • 3960676808
Subject(s): Genre/Form: DDC classification:
  • 004.6 23
LOC classification:
  • TE228.37
Online resources:
Contents:
Efficient Anonymous Authentication and Key Management Techniques for Vehicular Ad-hoc Networks; ABSTRACT; ACKNOWLEGDEMENT; TABLE OF CONTENTS; LIST OF TABLES; LIST OF FIGURES; LIST OF SYMBOLS AND ABBREVIATIONS; CHAPTER 1 INTRODUCTION; 1.1 VANET OVERVIEW; 1.1.1 VANET System Model; 1.1.2 Dedicated Short Range Communication (DSRC); 1.1.3 VANET Characteristics; 1.2 SECURITY ISSUES IN VANET; 1.3 PROPOSED WORKS; 1.4 OBJECTIVES OF THE RESEARCH WORK; 1.5 ASSUMPTIONS; 1.6 ORGANIZATION OF THE THESIS; CHAPTER 2 LITERATURE SURVEY; 2.1 INTRODUCTION; 2.2 SECURITY SERVICES OF VANETS
2.3 AVAILABILITY IN VANETS2.3.1 Threats and Attacks on Availability; 2.3.2 Works on Availability; 2.4 CONFIDENTIALITY IN VANETS; 2.4.1 Threats and Attacks on Confidentiality; 2.4.2 Works on Confidentiality; 2.5 AUTHENTICATION IN VANETS; 2.5.1 Threats and Attacks on Authentication; 2.5.2 Requirements for Authentication; 2.5.3 Works on Authentication with Privacy Preservation; 2.5.4 Computational Cost for Various Authentication Schemes; 2.6 DATA INTEGRITY IN VANETS; 2.6.1 Threats and Attacks on Data Integrity; 2.6.2 Works on Data Integrity; 2.7 NON-REPUDIATION IN VANETS
2.7.1 Attack on Non-repudiation2.7.2 Works on Non-repudiation; 2.8 COUNTERMEASURES ON VARIOUS SECURITYATTACKS; 2.9 WORKS ON KEY MANAGEMENT; 2.10 LITERATURE SURVEY GAPS; 2.11 PROPOSED WORK; 2.12 CONCLUSIONS; CHAPTER3 SYSTEM ARCHITECTURE; CHAPTER 4 DUAL AUTHENTICATION AND DUAL KEYMANAGEMENT FOR GROUP COMMUNICATION; 4.1 INTRODUCTION; 4.2 PROPOSED DUAL AUTHENTICATION TECHNIQUE; 4.2.1 Registration Through Offline Mode; 4.2.2 Vehicle's Authentication Process; 4.2.3 Trusted Authority's Authentication Process and the Provisionof Authentication Code (AC)
4.3 PROPOSED DUAL KEY MANAGEMENT FOR GROUPCOMMUNICATION4.3.1 TA Initial Set Up; 4.3.2 Group Key Computation; 4.3.3 Secure Data Transmission in VANETs; 4.3.4 Key Updating; 4.4 SECURITY ANALYSIS; 4.4.1 Resistance to Replay Attack; 4.4.2 Masquerade and Sybil Attacks; 4.4.3 Message Tampering /Fabrication/Alteration Attack; 4.4.4 Backward Secrecy; 4.4.5 Forward Secrecy; 4.4.6 Collusion Attack; 4.5 PERFORMANCE ANALYSIS; 4.6 CONCLUSIONS; CHAPTER 5 CPAV: COMPUTATIONALLY EFFICIENT PRIVACY PRESERVING ANONYMOUS AUTHENTICATION FOR A VEHICLE USER IN VANETS; 5.1 INTRODUCTION; 5.2 SECURITY REQUIREMENTS
5.3 BILINEAR PAIRING5.4 PROPOSED CPAV SCHEME; 5.4.1 System Initialization; 5.4.2 Registration; 5.4.3 Secure Activation Key Distribution; 5.4.4 CPAV Secure Anonymous Mutual Authentication; 5.5 SECURITY ANALYSIS; 5.5.1 Message Integrity and Source Authentication; 5.5.2 Conditional Privacy Preservation; 5.5.3 Anonymity; 5.6 PERFORMANCE ANALYSIS; 5.7 CONCLUSIONS; CHAPTER 6 EFFICIENT ANONYMOUS AUTHENTICATION OF AN RSU; 6.1 INTRODUCTION; 6.2 ANONYMOUS AUTHENTICATION; 6.2.1 System Initialization; 6.2.2 Anonymous Authentication of an RSU; 6.3 SECURITY ANALYSIS; 6.4 PERFORMANCE ANALYSIS
Item type:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Home library Collection Call number Materials specified Status Date due Barcode
Electronic-Books Electronic-Books OPJGU Sonepat- Campus E-Books EBSCO Available

Online resource; title from PDF title page (EBSCO, viewed April 2, 2019).

Efficient Anonymous Authentication and Key Management Techniques for Vehicular Ad-hoc Networks; ABSTRACT; ACKNOWLEGDEMENT; TABLE OF CONTENTS; LIST OF TABLES; LIST OF FIGURES; LIST OF SYMBOLS AND ABBREVIATIONS; CHAPTER 1 INTRODUCTION; 1.1 VANET OVERVIEW; 1.1.1 VANET System Model; 1.1.2 Dedicated Short Range Communication (DSRC); 1.1.3 VANET Characteristics; 1.2 SECURITY ISSUES IN VANET; 1.3 PROPOSED WORKS; 1.4 OBJECTIVES OF THE RESEARCH WORK; 1.5 ASSUMPTIONS; 1.6 ORGANIZATION OF THE THESIS; CHAPTER 2 LITERATURE SURVEY; 2.1 INTRODUCTION; 2.2 SECURITY SERVICES OF VANETS

2.3 AVAILABILITY IN VANETS2.3.1 Threats and Attacks on Availability; 2.3.2 Works on Availability; 2.4 CONFIDENTIALITY IN VANETS; 2.4.1 Threats and Attacks on Confidentiality; 2.4.2 Works on Confidentiality; 2.5 AUTHENTICATION IN VANETS; 2.5.1 Threats and Attacks on Authentication; 2.5.2 Requirements for Authentication; 2.5.3 Works on Authentication with Privacy Preservation; 2.5.4 Computational Cost for Various Authentication Schemes; 2.6 DATA INTEGRITY IN VANETS; 2.6.1 Threats and Attacks on Data Integrity; 2.6.2 Works on Data Integrity; 2.7 NON-REPUDIATION IN VANETS

2.7.1 Attack on Non-repudiation2.7.2 Works on Non-repudiation; 2.8 COUNTERMEASURES ON VARIOUS SECURITYATTACKS; 2.9 WORKS ON KEY MANAGEMENT; 2.10 LITERATURE SURVEY GAPS; 2.11 PROPOSED WORK; 2.12 CONCLUSIONS; CHAPTER3 SYSTEM ARCHITECTURE; CHAPTER 4 DUAL AUTHENTICATION AND DUAL KEYMANAGEMENT FOR GROUP COMMUNICATION; 4.1 INTRODUCTION; 4.2 PROPOSED DUAL AUTHENTICATION TECHNIQUE; 4.2.1 Registration Through Offline Mode; 4.2.2 Vehicle's Authentication Process; 4.2.3 Trusted Authority's Authentication Process and the Provisionof Authentication Code (AC)

4.3 PROPOSED DUAL KEY MANAGEMENT FOR GROUPCOMMUNICATION4.3.1 TA Initial Set Up; 4.3.2 Group Key Computation; 4.3.3 Secure Data Transmission in VANETs; 4.3.4 Key Updating; 4.4 SECURITY ANALYSIS; 4.4.1 Resistance to Replay Attack; 4.4.2 Masquerade and Sybil Attacks; 4.4.3 Message Tampering /Fabrication/Alteration Attack; 4.4.4 Backward Secrecy; 4.4.5 Forward Secrecy; 4.4.6 Collusion Attack; 4.5 PERFORMANCE ANALYSIS; 4.6 CONCLUSIONS; CHAPTER 5 CPAV: COMPUTATIONALLY EFFICIENT PRIVACY PRESERVING ANONYMOUS AUTHENTICATION FOR A VEHICLE USER IN VANETS; 5.1 INTRODUCTION; 5.2 SECURITY REQUIREMENTS

5.3 BILINEAR PAIRING5.4 PROPOSED CPAV SCHEME; 5.4.1 System Initialization; 5.4.2 Registration; 5.4.3 Secure Activation Key Distribution; 5.4.4 CPAV Secure Anonymous Mutual Authentication; 5.5 SECURITY ANALYSIS; 5.5.1 Message Integrity and Source Authentication; 5.5.2 Conditional Privacy Preservation; 5.5.3 Anonymity; 5.6 PERFORMANCE ANALYSIS; 5.7 CONCLUSIONS; CHAPTER 6 EFFICIENT ANONYMOUS AUTHENTICATION OF AN RSU; 6.1 INTRODUCTION; 6.2 ANONYMOUS AUTHENTICATION; 6.2.1 System Initialization; 6.2.2 Anonymous Authentication of an RSU; 6.3 SECURITY ANALYSIS; 6.4 PERFORMANCE ANALYSIS

eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide

There are no comments on this title.

to post a comment.

O.P. Jindal Global University, Sonepat-Narela Road, Sonepat, Haryana (India) - 131001

Send your feedback to glus@jgu.edu.in

Hosted, Implemented & Customized by: BestBookBuddies   |   Maintained by: Global Library