0% Complete
English
صفحه اصلی
/
چهاردهمین کنفرانس بین المللی فناوری اطلاعات و دانش
SecVanet: provably secure authentication protocol for sending emergency events in VANET
نویسندگان :
Seyed Amir Mousavi
1
Mohammad Sadeq Sirjani
2
Seyyed Javad Bozorg zadeh Razavi
3
Morteza Nikooghadam
4
1- دانشگاه فردوسی مشهد
2- دانشگاه فردوسی مشهد
3- دانشگاه فردوسی مشهد
4- دانشگاه امام رضا (ع)
کلمات کلیدی :
Authentication،Privacy،Key agreement،VANET،Scyther Tool
چکیده :
Recently, the number of accidents resulting in irreparable damages like death has risen due to the increased number of vehicles worldwide. Vehicular ad hoc network (VANET) is a new technology for enhancing road safety, reducing traffic load, and providing emergency services. Vehicles can send warnings in a network to announce accidents and seek help from emergency vehicles. Security and privacy are now significant concerns in developing vehicular ad hoc networks despite the many advantages of VANET. The communication channel in this network is public and insecure, so there is concern about eavesdropping, message manipulation, and impersonation, which creates significant risks. For this reason, a safe and efficient protocol is proposed in this article to ensure data security in VANET. The security of the proposed protocol has been proven by Scyther tool. The security analysis performed on the protocol also shows that the proposed protocol is resistant to many attacks and meets various security requirements. We also evaluated the performance of the proposed protocol in terms of computational complexity and showed that the proposed scheme has less computational complexity than similar schemes.
لیست مقالات
لیست مقالات بایگانی شده
Binary water stream algorithm: a new meta-heuristic optimization technique
Faezeh Rahimi Sebdani - Mehdi Nasri
بررسی تأثیر استقرار استاندارد COBIT در افزایش بهره وری سازمانها (مطالعه موردی: شعب نمایندگیهای همراه اول، ایرانسل، رایتل)
دکتر محمد ابراهیم سمیع - ساره رحمانیان محمد ابراهیم سمیع - ساره رحمانیان -
IT-based and Non-IT-based methods to separate and collect waste
Hoda Harati - Farzad Haghighi-Rad - Reza Yousefi Zenouz
AOV-IDS: Arithmetic Optimizer with Voting classifier for Intrusion Detection System
Amir Soltany Mahboob - Mohammad Reza Ostadi Moghaddam - Shima Yousefi
Revert Propagation: Who are responsible for a contagion initialization in a Diffusion Network?
Arman Sepehr - Mohammadzaman Zamani - Hamid Beigy - Shabnam Behzad
Real-Time EEG-Based Analysis Of Stress-Inducing Stimuli
Mohsen Mahmoudi - Fattaneh Taghiyareh - Yasamin Akhavein - Elnaz Ghorbani
Enhancing Software Effort Estimation with an Integrated Approach of Particle Swarm Optimization and Genetic Algorithms in Analogy-based Method
Ehsan Nasr - Keyvan Mohebbi
A Deep Neural Network-based Method for MmWave Time-varying Channel Estimation
Amirhossein Molazadeh - Zahra Maroufi - Mehrdad Ardebilipour
AI-based Message Spam Classification Framework for Secure Autonomous Vehicles Communication
Riya Upadhyay - Mili Virani - Lakshit Pathak - Rajesh Gupta - Sudeep Tanwar - Hossein Shahinzadeh
A parallel approach to the fractional time delay model for predicting the spread of COVID-19
Mahdi Movahedian Moghaddam - Kourosh Parand
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 41.3.1