Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology
IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15620
ISSN: 0975-766X
CODEN: IJPTFI
Available Online through Research Article
www.ijptonline.com
A KEYED HASH MESSAGE AUTHENTICATION CODE TECHNIQUE FOR SECURE
COMMUNICATION IN VANETS Akshay Gaikwad*
1, Dr. Pradeep Ready C.H.
2, S. Bharath Bhushan
3
1, 2, 3School of Information Technology & Engineering, VIT University, Tamilnadu, INDIA.
Email: [email protected]
Received on 26-07-2016 Accepted on 29-08-2016
Abstract
Vehicular Ad Hoc Networks (VANETs) are made by applying the standards of Mobile Ad hoc Networks (MANETs)
the unconstrained production of a remote system for information trade to the space of vehicles. They are a key part of
intelligent transportation frameworks. Public Key Infrastructure (PKI) with hashing mechanism can be used to secure
VANETs where the tamper proof device stores a number of encryption keys which are renewed upon visiting a
Trusted Authority (TA).The proposed system is an endeavour to upgrade the current authentication, privacy
preservation and non-repudiation with keyed hashing mechanism. Proficient Message Authentication Protocol can on
a very basic level decrease the message loss ratio on account of the message check delay compared and the existing
authentication systems using Certification Revocation List (CRL).In this process we are using Hash Message
Authentication Protocol (HMAP) where a key is utilized to calculating encryption and decryption with hash message
using Elliptical Curve Cryptographic (ECC) function which is shared just between non revoked On-Board Units
(OBUs).In this paper, the analysis of performance evaluation and security of the proposed hashing mechanism is
investigated analytically and through network simulation. Hence, extensive analysis is performed to demonstrate how
the proposed mechanism can dynamically support efficient and cost-reduced keyed hash message authentication. The
final results will be shown by graphs generated on the NS2 simulator.
Keywords: VANET, Trusted Authority (TA), On Board Unit (OBU), Certification Revocation List (CRL).
I. Introduction
A VANET comprises of system substances, including On board units (OBU), Road side units (RSU), and a Trusted
Authority (TA). These elements shape a system progressive system as showed in Fig. 1. Either an automaker or
government power assumes the part of the TA in charge of a key era and circulation. The RSUs [1][2] are in charge
of directing correspondence amongst vehicles, and conveying messages from the TA. The RSUs are introduced in
Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology
IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15621
standalone towers and sorted out as per the system topology. The OBUs [1][4] are stacked in vehicles and are in
charge of accepting and approving messages. Vehicle-to-Infrastructure (V2I), Vehicle-to-Vehicle (V2V), and
Infrastructure-to-Infrastructure (I2I) are vehicular correspondence modes as appeared in Fig. 1. V2I permits vehicles
to speak with roadside units while V2V permits vehicles to speak with each other. I2I permits roadside units to speak
with each other .For security key storage a VANET relies on upon a Tamper Proof Device (TPD)[1][4] as the
primary stockpiling for security correspondence components. Vehicles, while making their periodical visits to the TA
get some security components and are put away in both the vehicle and the TA.
Fig.1 Hierarchical communication of all parts of VANET system.
The fundamental reason for the project is to build up a solid structure for validation, protection safeguarding, and
non-repudiation of correspondence information among the vehicles. The mischances out and about are a real issue
everywhere throughout the world. This issue, for the most part, emerges because of various reasons, for example,
high speeds of the vehicle, inaccessibility of observing frameworks, no activity signals, and fewer speed barkers at
the swarmed places. A Vehicular Ad-hoc Network (VANET) assumes an essential part to avoid such mishaps.
VANET is a remote bury vehicular correspondence system and it is advanced from Mobile Ad-hoc-system. In this
system, a remote correspondence works in the middle of vehicles and vehicles to street side unit.VANETs can be
valuable in crisis circumstances like a free section for crisis vehicles, for example, an Ambulance or Police vehicle.
In VANET, an On-Board Unit (OBU) is joined to each vehicle, which speaks with a Road Side Unit (RSU) which is
arranged at street side area. At that point, OBUs transmits its data to RSU like its area, rate, and heading. After that
RSU sends required data like activity notices to OBUs, as like this correspondence is traded. Here, the
correspondence can happen in the middle of OBU and RSU to trade some security highlights. Likewise, vehicles can
speak with each other without nearness of RSU.Although there are different focal points of the VANET, it is
Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology
IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15622
additionally powerless because of its structures and operation. The VANET faces distinctive issues like protection,
steering, security, network, and nature of administrations. From the greater part of the above security is the significant
issue in VANET. Security can be of information, personality and area. In this manner, security and protection issues
are essential difficulties for the fate of VANET. In this paper, difficulties and assaults in VANET are talked about.
Likewise, a study on VANET security and with protection procedure with near study has been done.
The main aim this project to provide strong authentication framework which overcome the existing system problem.
In VANET, two sorts of key administration are available. The symmetric key based verification plans are proposed
for VANETs, which utilize symmetric key cryptographies for the message confirmation. The disadvantage of
utilizing symmetric key administration is that vehicles need to confirm each other by means of the trust powers,
which is not suitable for extensive scale vehicular correspondences in VANETs. The asymmetric key based
verification is broadly received in view of the different keys utilized for encryption and decoding. Verification
systems utilizing the ID-based authentication (IBS)[15] plans taking into account the ID-based cryptography (IBC)
have been proposed to diminish the correspondence overheads in which the certificate administration process has
been simplified by utilizing the advanced mark plans. We take note of that, the IBS plans can be embraced to the
confirmation administration for VANETs, in which each vehicular personality is utilized as an open key for
marking/checking messages in correspondence. Utilizing ID-based online/offline signature (IBOOS) is an alluring
answer for validation in VANETs, for reducing the calculation overhead of the IBS process. An IBOOS[14] plan
expands efficiency of the matching procedure by isolating the marking process into an offline stage and an online
stage, in which the verification is nearly more efficient than that of IBS. In this paper, unique in relation to the current
work, we propose a verification system by using the IBS plan in the V2R correspondence, and together with the
IBOOS plan in the V2V correspondence for better execution. In IBOOS [14] for VANETs, the offline stage can be
executed at first at RSUs or vehicles, while the online stage is to be executed in vehicles amid the V2V
correspondence. When traffic mischances or certain violations happen, the vehicle namelessness ought to be
restrictively retrievable, and the character data ought to be uncovered to legitimate powers to build up the risk of
mishaps or wrongdoings, which is supposed contingent protection or contingent secrecy. The non-revocation
administration in VANETs keeps a vehicle from denying past responsibilities or activities. For instance, vehicles
bringing on mishaps ought to be dependably identified, or a vehicle can't refuse any assistance got. Subsequently, the
contingent security conservation with non-denial administration is required for VANETs, against the misuse of
Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology
IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15623
mysterious verification systems by malevolent vehicles to accomplish pernicious objectives or break from liabilities.
The pseudonymous verification utilized as a part of vehicular interchanges can give the protection conservation a
compelling following component, which is utilized just by the trusted powers (e.g., the certification power (CA)) to
uncover the genuine personality of malignant vehicles. Despite the fact that there exists numerous security structures
tending to the protection safeguarding are diverse as a part of every proposition, which render these issues more
critical and more perplexing to be taken care of in VANETs.
II. Related Work
In this section, we are mentioned about the research works that are already existed in VANET for authentication and
privacy preservation problems. So, by referring this work we analyse some drawbacks and make the strong
authentication framework.
[1] In this paper they are discussing on VANET, confirmation is a vital security administration for both between
vehicle and vehicle roadside correspondences. They propose a novel structure with conservation and disavowal
(ACPN) for VANETs. In ACPN, we present the general population key cryptography (PKC) to the pen name, which
guarantees honest to goodness outsiders to accomplish the non-renouncement of vehicles by getting vehicles' genuine
IDs. The self-created PKC based nom de plumes additionally utilized as identifiers rather than vehicle IDs for the
protection safeguarding verification, while the redesign of the pen names on vehicular requests. Validation, protection
safeguarding, non-disavowal and different targets of ACPN have been investigated for VANETs. Run of the mill
execution assessment has been led utilizing proficient IBS and IBOOS plans. We demonstrate that the proposed
ACPN is achievable and sufficient to be utilized proficiently as a part of the VANET environment.
[2]Vehicular specially appointed system (VANET) is a rising new innovation incorporating impromptu system,
remote LAN (WLAN) and cell innovation to accomplish canny between vehicle correspondences and enhance street
activity security and proficiency. VANETs are recognized from different sorts of impromptu systems by their half
and half system designs, hub development qualities, and new application situations. Subsequently, VANETs posture
numerous novel systems administration research challenges and the outline of a proficient steering convention for
VANETs is extremely critical. In this article, we talk about the exploration test of directing in VANETs and review
late steering conventions and related versatility models for VANETs.
[3]This system is another remote systems administration worldview for portable hosts. In this paper, we composed a
savvy transport framework. The ITS (wise transport framework) incorporates two major capacity modules:
Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology
IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15624
Information handling application framework and Road condition data exchanging framework. The principle errand of
the street condition data moving module is responsible for the data trade of the auto inside, auto to auto and auto to
the street. The module works in a specially appointed system, we call the system VANET (vehicular impromptu
system). Vehicular systems are liable to wind up the most significant type of portable specially appointed systems.
For guaranteeing the framework can run typically, the data can be exchanging accurately and fleetly, the security of
VANET (vehicular specially appointed system) of the street condition data exchanging framework is pivotal.
[4]In this paper, they presents a productive contingent protection safeguarding (ECPP) convention in vehicular
specially appointed systems (VANETs) to address the issue on mysterious validation for security messages with
power traceability. The proposed convention is described by the era of on-the-fly brief time unknown keys between
on-load up units (OBUs) and roadside units (RSUs), which can give quick mysterious verification and protection
following while minimizing the required stockpiling for brief time unknown keys. We exhibit the benefits picked up
by the proposed convention through broad examination.
[5]Remote correspondence innovation picked up a considerable measure of significance. It has given a considerable
measure of preferences to individuals by raising different innovations going from Wireless LAN to Mobile Ad Hoc
Networks. This innovation is assuming the vital part in street well-being by staying away from street mischances
through building the remote correspondence between vehicles on the streets. Be that as it may, in this system, the
significant issue is protection and security of the member data. The present paper manages the overview of the
vehicular specially appointed system. In this work, we have clarified diverse existing conventions which ensure the
secrecy in VANET. Likewise, we have portrayed different security difficulties, qualities, and diverse issues in
VANET. In this paper, difficulties and assaults in VANET are talked about. Likewise, the study on VANET security
and protection strategies with near study has been completed.
III. Existing System
The symmetric key based confirmation plans for VANETs, which utilize symmetric key cryptographies for the
message verification. The downside of utilizing symmetric key administration is that vehicles need to validate each
other through the trust powers, which is not suitable for huge scale vehicular correspondences in VANETs. The
asymmetric key based verification is generally received due to the different keys utilized for encryption and
decoding. The studies of the asymmetric key based authentication are classified into two classes: the public key
infrastructure (PKI) based authentication and the identity (ID) based authentication., the framework accessibility is
Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology
IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15625
still not pervasive or achievable, in light of the fact that such systems require extra correspondence to deal with the
vehicular authentications and the certification revocation list (CRLs) that may bring about substantial correspondence
and calculation overheads.In Vehicular Ad-hoc Networks (VANETs), validation is a significant security
administration for both between vehicle and vehicle roadside units. Then again, vehicles must be protected from the
restricted use of their private information and the assaults on their security, and in addition to be fit for being explored
for liabilities from non-repudiation.
Disadvantages of Existing System
Symmetric key administration is not suitable for huge scale vehicular correspondence
May bring about substantial correspondence and calculation overheads
Verification of vehicle and Infrastructure can be effortlessly delicate.
The message can't be safely sent between Vehicles.
IV. Proposed System
A VANET essentially comprises of three system parts: street side units, vehicles (clients) and a local trusted power.
The administration of VANETs is generally partitioned into various areas, each of which is served by one RTA as the
confirmation power. This system structure in VANET situations could be considered as the general urban vehicular
interchanges structure [21].
Fig: Proposed System Architecture.
In the proposed System for VANETs, we consider the UVC structure for VANETs, which comprises of an RTA,
limited numbered enrolled RSUs along roadsides, and an expansive number of vehicles on or by the streets. An RTA
Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology
IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15626
serves in one area, e.g., a city, a territory or a nation. An ID pool of RSUs in an area is preloaded in every vehicle, in
which the quantity of RSUs is normally settled that does not change as often as possible. The vehicle enrolment is
required before a vehicle begins off to take off in an area. In the event that the vehicle is recently produced, it can be
enlisted to the RTA at the auto merchant by means of a safe system framework. In the event that a vehicle is crashed
into another locale, it can be enlisted to the RTA at the passage exit organization or the outskirt movement office by
means of the protected system base. Through the vehicle enrolment of every vehicle, the RTA registers the vehicle ID
and profile, then distributes and disperses the RSU ID pool and the guaranteed space parameters for confirmation to
the vehicle, which is characterized.
Advantages of proposed system
Less computational and communication overhead
More authentication Efficiency
Provide more security
Reusability
Flow Chart of System Process
Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology
IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15627
Algorithm of Elliptical Curve Cryptography
Elliptical Curve Cryptography is the most effective public key encryption plan in light of elliptic bend ideas that can
be utilized to make quicker, littler, and productive cryptographic key. Elliptic bend framework is connected to
cryptography were initially proposed in 1985 freely by Neal Koblitz and Victor Miller. The discrete logarithm issue
on open bend gatherings is accepted to be more troublesome than the comparing issue in the basic limited field.
Public key cryptography is powerful security answer for give secure versatile correspondence. ECC can be utilized
with public key encryptions techniques, for example, RSA, and Diffie-Hellman key trade correspondence security
through encryption, confirmation of sender and advanced mark to guarantee message respectability. ECC can sets up
equal security with lower registering force and battery asset utilization.
For current cryptographic purposes, an elliptic curve shows following mathematical expression
y2=x3+ax+b
Fig-2. Curve for Elliptical Curve.
Step1: Key Generation
The key is animportant part of the algorithm where we need to make both public and private keys. The sender should
be encoding the message with recipient's public key and the receiver should be decodedby its private key.
Consider to choose a number "d" inside the scope of 'n'.
Utilizing the accompanying mathematical statement we can create the general public key
N = d * M
d = The irregular number that we have chosen inside the scope of (1 to n-1). M is the point on the bend.
"N" is people in general key and "d" is the private key.
Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology
IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15628
Step2: Encryption of Algorithm
Give "p" a chance to be the message that we are sending. We have to represent this message on the curve. These have
in-depth implementation details.
These have inside and out execution points of interest. All the development research on ECC is finished by an
organization called certicom.
Consider "p" has the point "P" on the curve 'E'. Arbitrarily select "k" from [1 – (n-1)].
Two figure writings will be produced given it a chance to be C1 and C2.
C1 = k*M
C2 = P + k*N
C1 and C2 will be sent.
Step3: Decryption of Algorithm
We need to get back the message "p" that was sent to us,
P = C2 – d * C1
P is the first message that we have sent.
Proof of Algorithm
How does we get back the message”,
P = C2 – d * C1
‘P’ can be represented as ‘C2 – d * C1’
C2 – d * C1 = (P + k * N) – d * (k * M) (C2 = P + k * N and C1 = k * M )
= P + k * d * M – d * k *M (cancelling out k * d * M)
= P (Original Message)
V. Results and Discussion
The outcomes area of the proposition is the place we report the discoveries of our study in light of the strategy (or
methodologies) we connected to accumulate data. The outcomes segment ought to just express the discoveries of the
exploration orchestrated in an intelligent arrangement without predisposition or elucidation. This area of depicting
results which are especially fundamental for demonstrating our proposed framework execution as for the current
system .We can see their near examination by utilizing graphs. In the graphs X-axis is showing distance in km and Y-
axis is showing time in seconds.
Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology
IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15629
Performance Evolution: In this area, we can assess the execution of reproduction. We are utilizing the X graph for
assessing the execution. We pick the three assessment measurements as follows:
1. Correspondence Overhead
2. Verification Efficiency
3. Computational Delay
1. Communication Delay: This part gives an estimation of proficiency on applying the proposed System for
VANETs, by investigating the calculation overhead and the correspondence overhead. We concentrate on applying
the effective IBS and IBOOS plans to the framework, in light of the fact that the embraced uneven PKC plan utilized
as a part of the nom de plume does not influence the proficiency of verification amid correspondence in VANETs.
Despite the fact that the computationally escalated matching operations are not included in traditional PKI, we trust
that the ID-construct cryptographies with hashing calculation in light of message taking into account pairings is
exceedingly appropriate, particularly giving solid security in the VANET environment. The communication delay
will be shown in fig 3.
2. Authentication Efficiency:
In this area, the productivity of shared validation among vehicles in VANETs is assessed through hypothetical
quantitative counts for UVC. In the proposed framework, the productivity of verification is assessed by the
correspondence delay among vehicles, in which we concentrate on the computational postponement devoured by
utilizing cryptographic systems and hashing instruments including IBS and IBOOS plans. The authentication
efficiency will be shown in fig 4.
3. Computational Delay:
We look at the execution of our proposed framework with a current validation convention, called ACPN
(Authentication and contingent protection conservation convention for secure vehicular interchanges), which could be
embraced for the same situation with our own. The computational deferral of the V2V confirmation in ACPN is
ascertained. The computational deferral of ACPN is more than our proposed arrangement of hashing system. Along
these lines, utilizing our framework more vehicles get speak with each other in less time. In the interim, the more
vehicles are in the state of hashing instrument: Inner-RSUV2V, the fewer time costs in the computational deferral of
the V2V confirmation, where high validation productivity could be accomplished in proposed framework than
existing. The computational delay is shown in fig 5.
Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology
IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15630
Analysis of the system
Fig-3: Communication Overhead.
Fig-4: Authentication Efficiency.
Fig-5: Computational Overhead.
VI. Conclusion and Future Work
A keyed-Hash Message Authentication Code Technique for strong check and secure correspondence in VANETs has
been proposed, which uses the IBS and IBOOS plans with PKI and hashing systems for the solid validation and
safely impart the vehicles and Infrastructure with every other. The new framework accomplishes the wanted strong
confirmation, protection safeguarding, non-disavowal and other security destinations for UVC in VANETs. Another
essential normal for the new framework is its extensibility and reusability, i.e., it can likewise be used with other new
0.5
2.5
4.5
6.5
8.5
0.5 1 1.5 2 2.5 3
Trav
ellin
g ti
me(
min
)
Distance(m)x103
EMAP
ACPN
0
0.5
1
1.5
2
2.5
3
3.5
0.5 1 1.5 2 2.5 3
No
rmal
ized
Tim
e (%
)
Distance(m)x103
EMAP
ACPN
0
5
10
15
20
0.5 1 1.5 2 2.5 3 Ro
ute
Blo
ckin
g ra
te(m
in)
Distance(m)x103
EMAP
ACPN
Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology
IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15631
plans for security and execution changes. Investigation and execution assessment demonstrate that the proposed new
framework is more possible and sufficient than past to UVC in the VANET environment for proficient verification
with non-repetitive information transmission over systems.
In future, we are attempting to settle the different new kind of assaults connected to the framework by reproducing it
with more grounded security convention.There are numerous different difficulties left that will affect the eventual
fate of VANETs. By understanding this we can diminish the issue effect of VANETs on activity wellbeing, and
productivity
References
1. Jie Li, Senior Member, IEEE, Huang Lu, Member, IEEE, and Mohsen Guizani, Fellow, IEEE, “ACPN: A Novel
Authentication Framework with Conditional Privacy-Preservation and Non-Repudiation for VANETs”, IEEE
Transactions On Parallel And Distributed Systems, VOL. 26, NO. 4, APRIL, 2015.
2. F.Li, Y.wang, “Routing in Vehicular ad hoc networks: A survey,” IEEE vehicular technology Magazine, vol. 2,
No.2,pp 12-22,June 2007.
3. X.Liu, Z.Fang, L.shi “Securing Vehicular Ad Hoc Networks,” J.Computer society vol.15 no.1 pp. 39-68, 2007.
4. R. Lu et al., “ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications,”
Proc. IEEE INFOCOM, pp. 1229-1237, 2008.
5. Er,Sushil Lekhi et al “Vehicular ad hoc Communication Security Enhancement”,IJCSCE, vol. 4,no. 2,pp. Aug.
2015.
6. Priyanka patil, Nilesh Marathe, and Vimala Jethani, “Survey of Privacy preservation in VANET,” IRACST, vol.
6, No.1,Jan-Feb 2016.
7. S. Zeadally et al., “Vehicular Ad Hoc Networks (VANETS): Status, Results, and Challenges,” Telecomm.
Systems, vol. 50, no. 4, pp. 217-241, 2012.
8. A. Studer et al., “Flexible, Extensible, and Efficient VANET Authentication,” J. Comm. and Networks, vol. 11,
no. 6, pp. 574-588, 2009..
9. Y. Sun et al., “An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular
Communications,” IEEE Trans. Vehicular Technology, vol. 59, no. 7, pp. 3589-3603, Sept. 2010.
10. P. Kamat, A. Baliga, and W. Trappe, “An Identity-Based Security Framework for VANETs,” Proc. Third Int’l
Workshop Vehicular Ad Hoc Networks (VANET), pp. 94-95, 2006.
Akshay Gaikwad*et al. /International Journal of Pharmacy & Technology
IJPT| Sep-2016 | Vol. 8 | Issue No.3 | 15620-15632 Page 15632
11. Y. Zhang et al., “Securing Mobile Ad Hoc Networks with Certificate less Public Keys,” IEEE Trans. Dependable
and Secure Computing, vol. 3, no. 4, pp. 386-399, Oct.-Dec. 2006.
12. N. Gura et al., “Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs,” Proc. Sixth Int’l Workshop
Cryptographic Hardware and Embedded Systems (CHES), pp. 925-943, 2004.
13. F. Hess, “Efficient Identity Based Signature Schemes Based on Pairings,” Proc. Ninth Ann. Int’l Workshop
Selected Areas in Cryptography (SAC), pp. 310-324, 2003.
14. A. Shamir and Y. Tauman, “Improved Online/Offline Signature Schemes,” Proc. CRYPTO, pp. 355-367, 2001.
15. D. Boneh and M. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proc. CRYPTO, pp. 213-229,
2001.
16. R.A. Mollin, “RSA and Public-Key Cryptography,” Discrete Math. and Its Applications. Chapman and Hall/CRC,
2002.
17. M. Riley, K. Akkaya, and K. Fong, “A Survey of Authentication Schemes for Vehicular Ad Hoc Networks,”
Security Comm. Networks, vol. 4, no. 10, pp. 1137-1152, 2011.
18. J. Sun, C. Zhang, and Y. Fang, “An ID-Based Framework Achieving Privacy and Non-Repudiation in Vehicular
Ad Hoc Networks,” Proc. IEEE Military Comm. Conf. (MILCOM), pp. 1-7, 2007. [23] B. Hoh et al., “Preserving
Privacy in GPS Traces via Uncertainty-Aware Path Cloaking,” Proc. 14th ACM Conf. Computer and Comm.
Security (CCS), pp. 161-171, 2009.
19. J.Choi and S. Jung, “A Security Framework with Strong Non- Repudiation and Privacy in VANETs,” Proc. IEEE
Sixth Consumer Comm. and Networking Conf. (CCNC), 2009.
20. F.Armknecht et al., “Cross-Layer Privacy Enhancement and Non- Repudiation in Vehicular Communication,”
Proc. ITG-GI Conf. Comm. in Distributed Systems (KiVS), pp. 1-12, 2007.
21. S. Bharath Bhushan, Pradeep Reddy, Dhenesh V Subramanian, X. Z. Gao (in press).Systematic Survey on
Evolution of Cloud Architectures, International Journal of Autonomous and Adaptive Communications Systems,
Inderscience.
Corresponding Author:
Akshay Gaikwad*,
Email: [email protected]