IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
Scopus/Elsevier
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 9 - Issue 1, January 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



C2MTCR: Cluster-Based Communication And Merkle Hash Tree Certificate Revocation Model For Vehicular Adhoc Networks

[Full Text]

 

AUTHOR(S)

Jeevitha.R, Dr.N.Sudha Bhuvaneswari

 

KEYWORDS

CA, CRL, C2MTCR, MHT, revocation, VANET.

 

ABSTRACT

Vehicular Ad-hoc Networks (VANET) has been focused on driving safety, driving efficiency and entertainment in road networks. Vehicular networks are the subset of Mobile Ad-hoc Networks (MANET). Each and every vehicle is considered as a node. One node can directly communicate with another node within its transmission range. When the nodes communicate, there is a chance of malicious attackers to intrude and degrade the performance of the entire vehicular network. Malicious node detection is a vital security issue for safety-related applications. The malicious vehicle should be detected and revoked to the smooth functioning of the vehicular communication system. The malicious nodes are revoked to avoid flooding of any wrong message from these may lead to adverse effects like traffic jam and accidents. A defense technique such as certificate revocation is devised to eradicate and provide protection against the malicious nodes that behaves like a legitimate node. The revoked information of the non-legitimate node should be disseminated to the nodes in the vehicular network. In this paper, a new model for Certificate revocation scheme for VANET is proposed to overcome the flaws of Certificate Revocation List (CRL). Cluster-based communication and Merkle Hash Tree Certificate Revocation model (C2MTCR) is based on clustering and construction of Merkle Hash Tree to revoke the malicious certificates from the vehicular networks. The proposed work is simulated using Network Simulator (NS2) and Power BI tool and the results are compared with the existing works.

 

REFERENCES

[1] Al Falasi, H. and Barka, E. (2011). Revocation in VANETs: A survey. International Conference on Innovations in Information Technology. pp.214-219.
[2] BrijilalRuban and B.Paramasivan. (2019). Cluster-based Secure Communication and Certificate Revocation Scheme for VANET. The Computer Journal. 62(2): 263–275.
[3] Dinesh Singh and Ranvijay. (2018). A state-of-art approach to misbehaviour detection and revocation in VANET: survey. International Journal of Ad Hoc and Ubiquitous Computing. 28 (2):77-93.
[4] Eckhoff, D., Dressler, F. and Sommer (2013). Smartrevoc: an efficient and privacy preserving revocation system using parked vehicles. 2013 IEEE 38th Conference on Local Computer Networks (LCN), IEEE, Sydney, NSW.pp.827–834.
[5] Ganan, C., Munoz, J.L., Esparza, O., Mata-Diaz, J. and Alins. EPA: an efficient and privacy-aware revocation mechanism for vehicular ad hoc networks. Pervasive and Mobile Computing. 21:75–91.
[6] C. Lyu, D. Gu, Y. Zeng and P. Mohapatra. PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications. IEEE Transactions on Dependable and Secure Computing. 13(1): 71-83.
[7] Marzak, B., Toumi, Talea, M. and Benlahmar (2015) Cluster head selection algorithm in vehicular Ad Hoc networks. 2015 International Conference on Cloud Technologies and Applications (CloudTech).
[8] Muthumari.L, Sharmasthvali Y and Sivakumar S. (2018). Trust based malicious node detection and certificate revocation based on cluster head for MANET. International Journal of Pure and Applied Mathematics.119 (15):385- 390
[9] Sun and Fang. (2009).Defense against misbehavior in anonymous vehicular ad hoc networks. Ad Hoc Networks. 7(8):1515-1525.
[10] Tahani Gazdar, Abderrahim Benslimane, Abdelfettah Belghith and Abderrezak Rachedi. (2014).
[11] A secure cluster-based architecture for certificate management in vehicular networks”, Security and Communication networks. 7: 665-683.
[12] Tao Jing, Yu Pei, Bowu Zhang, Chunqiang Hu, Yan Huo, Hui Li and Yanfei Lu. (2018). An efficient anonymous batch authentication scheme based on priority and cooperation for VANETs. EURASIP Journal on Wireless Communications and Networking. 5-13.
[13] Thamarai Selvan M, Maheshwari M and Roselin Mary. (2013). A Cluster-based Highway Vehicle Communication in VANET. International Journal of Computer Applications. 0975 – 8887.
[14] Tianhan Gao, Yanqiang Li, Nan Guo and Ilsun You. (2018). An anonymous access authentication for vehicular Adhoc networks under edge computing. International Journal of Distributed Sensor networks. 14 (2): 1-15.
[15] Wasef, A. and Shen, X. (2013). Emap: Expedite message authentication protocol for vehicular ad hoc networks. IEEE Transactions on Mobile Computing. 12(1): 78–89.
[16] Zhang, Q., Almulla, M., Ren, Y. and Boukerche. (2012). An efficient certificate revocation validation scheme with k-means clustering for vehicular ad hoc networks. 2012 IEEE Symposium on Computers and Communications (ISCC), IEEE, Cappadocia, Turkey. 000862–000867.
[17] Daeinabi, A. and Rahbar, A. G. (2014). An advanced security scheme based on clustering and key distribution in vehicular ad-hoc networks. Computers & Electrical Engineering, 40(2): 517–529.
[18] Ganan, C., Munoz, J. L., Esparza, O., Mata-Diaz, J., and Alins, J. (2014). PPREM: Privacy Preserving REvocation Mechanism for Vehicular Ad Hoc Networks. Computer Standards & Interfaces, 36(3): 513–523.