0% Complete
English
صفحه اصلی
/
چهاردهمین کنفرانس بین المللی فناوری اطلاعات و دانش
SecVanet: provably secure authentication protocol for sending emergency events in VANET
نویسندگان :
Seyed Amir Mousavi
1
Mohammad Sadeq Sirjani
2
Seyyed Javad Bozorg zadeh Razavi
3
Morteza Nikooghadam
4
1- دانشگاه فردوسی مشهد
2- دانشگاه فردوسی مشهد
3- دانشگاه فردوسی مشهد
4- دانشگاه امام رضا (ع)
کلمات کلیدی :
Authentication،Privacy،Key agreement،VANET،Scyther Tool
چکیده :
Recently, the number of accidents resulting in irreparable damages like death has risen due to the increased number of vehicles worldwide. Vehicular ad hoc network (VANET) is a new technology for enhancing road safety, reducing traffic load, and providing emergency services. Vehicles can send warnings in a network to announce accidents and seek help from emergency vehicles. Security and privacy are now significant concerns in developing vehicular ad hoc networks despite the many advantages of VANET. The communication channel in this network is public and insecure, so there is concern about eavesdropping, message manipulation, and impersonation, which creates significant risks. For this reason, a safe and efficient protocol is proposed in this article to ensure data security in VANET. The security of the proposed protocol has been proven by Scyther tool. The security analysis performed on the protocol also shows that the proposed protocol is resistant to many attacks and meets various security requirements. We also evaluated the performance of the proposed protocol in terms of computational complexity and showed that the proposed scheme has less computational complexity than similar schemes.
لیست مقالات
لیست مقالات بایگانی شده
طراحی نرم افزاری مبتنی بر واقعیت افزوده با کاربرد فروش عینک
مینا علیانژاد - نسترن زنجانی - زهرا عسکری نژاد امیری
Improving Personalized Federated Learning-based QoE Assessment using Clustering
Skokufe Motaharipour - Behrouz Shahgholi Ghahfarokhi - Saeid Afshari
Establishing security using cryptography and biometric authentication to counter cyber-attacks
Mohammed ADIL AKABR - Mehdi Hamidkhani - Mostafa Sadeghi
امنیت در اینترنت اشیا؛ معماری، کاربردها، چالشها و راهکارها
مهدی موسی وند - دکتر پیام محمودی نصر مهدی موسی وند - پیام محمودی نصر -
Distributed Learning Automata-based Algorithm for Finding K-Clique in Complex Social Networks
Mohammad Mehdi Daliri Khomami - Alireza Rezvanian - Ali Mohammad Saghiri - Mohammad Reza Meybodi
Revert Propagation: Who are responsible for a contagion initialization in a Diffusion Network?
Arman Sepehr - Mohammadzaman Zamani - Hamid Beigy - Shabnam Behzad
Open-domain question classification and completion in conversational information search
Omid Mohammadi Kia - Mahmood Neshati - Mahsa Soudi Alamdari
BMPA- DSL: Binary Marine Predators Algorithm to Identify Driver's Different Levels of Stress
Mahtab Vaezi - Mehdi Nasri - Farhad Azimifar - Mahdi Mosleh
A novel approach audio watermarking based on (GBT,DCT,SVD)
Mahdi Mosleh
شناسایی جایگاه مالونیلاسیون در پروتئینها با بهرهگیری از استخراج ویژگی و تکنیکهای پردازش زبان طبیعی
حنانه رجبیون - محمد قاسم زاده - وحید رنجبر بافقی
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 40.3.1