0% Complete
English
صفحه اصلی
/
چهاردهمین کنفرانس بین المللی فناوری اطلاعات و دانش
SecVanet: provably secure authentication protocol for sending emergency events in VANET
نویسندگان :
Seyed Amir Mousavi
1
Mohammad Sadeq Sirjani
2
Seyyed Javad Bozorg zadeh Razavi
3
Morteza Nikooghadam
4
1- دانشگاه فردوسی مشهد
2- دانشگاه فردوسی مشهد
3- دانشگاه فردوسی مشهد
4- دانشگاه امام رضا (ع)
کلمات کلیدی :
Authentication،Privacy،Key agreement،VANET،Scyther Tool
چکیده :
Recently, the number of accidents resulting in irreparable damages like death has risen due to the increased number of vehicles worldwide. Vehicular ad hoc network (VANET) is a new technology for enhancing road safety, reducing traffic load, and providing emergency services. Vehicles can send warnings in a network to announce accidents and seek help from emergency vehicles. Security and privacy are now significant concerns in developing vehicular ad hoc networks despite the many advantages of VANET. The communication channel in this network is public and insecure, so there is concern about eavesdropping, message manipulation, and impersonation, which creates significant risks. For this reason, a safe and efficient protocol is proposed in this article to ensure data security in VANET. The security of the proposed protocol has been proven by Scyther tool. The security analysis performed on the protocol also shows that the proposed protocol is resistant to many attacks and meets various security requirements. We also evaluated the performance of the proposed protocol in terms of computational complexity and showed that the proposed scheme has less computational complexity than similar schemes.
لیست مقالات
لیست مقالات بایگانی شده
Dealing with Black-hole Attacks in Inter-vehicle Networks Using the Packet Delivery Rate Algorithm
Marzieh Sedighi - Mehdi Hamidkhani - Mostafa Sadeghi
Benchmarking Embedding Models for Persian-Language Semantic Information Retrieval
Mahmood Kalantari - Mehdi Feghhi - Nasser Mozayani
مکانیابی خطاهای کاربردها و خدمات نرمافزاری با کمک تولید داده آزمون با نامتغیرهای محتمل
محمد نصرتی مقدم - حسن حقیقی - مجتبی وحیدی اصل
استخراج ویژگی مجموعه دادههای پزشکی دارای ابعاد بالا با استفاده از برنامه نویسی ژنتیک چند منظوره
سحر فقیهی راد - دکتر سیده نفیسه آل محمد سحر فقیهی راد - سیده نفیسه آل محمد -
Stock Market Prediction Using Hard and Soft Data Fusion
Saeed Mohammadi Dashtaki - Masoud Alizadeh - Behzad Moshiri
A Swarm Intelligence Approach to Design Optimal Repeaters in Multilayer Graphene Nanoribbon Interconnects
Majid Sanaeepur - Maryam Momeni
Persian deaf sign language recognition system using deep learning
Mohammad Ebrahimi
Establishing security using cryptography and biometric authentication to counter cyber-attacks
Mohammed ADIL AKABR - Mehdi Hamidkhani - Mostafa Sadeghi
Optimal control of robotic hand for rehabilitation using fractional order systems and EEG signal processing
Mehran Safari Dehnavi - Vahid Safari Dehnavi - Masoud Shafiee
طراحی و کنترل تطبیقی اورتز رباتیک پایین تنه با استفاده کنترلر منطقی قابل برنامه ریزی و رابط انسان با ماشین
فرهاد عظیمی فر - ستایش کرمی - نیایش امینی
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.0.3