IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278 -2834,p - ISSN: 2278 -8735.Volume 9, Issue 6, Ver. IV (Nov - Dec. 2014) , PP 44 -50 www.iosrjournals.org
www.iosrjournals.org 44 | Page
An Efficient Authentication Scheme for Rfid in Vanet By Using
Ikev2
Ms.T.Durga1, Mr.V.Vijayakumar2 (Communication Systems, Dhanalakshmi Srinivasan Engineering College/ Anna University, India)
2 ( Assistant Professor, Department of ECE, Dhanalakshmi srinivasan Engineering college/ Anna University, India)
Abstract: The aim of Vehicular Adhoc networks(VANETS) is to control the road traffic. This paper address an improved authentication scheme for Radio Frequency Identification (RFID) applied in VANETs. In earlier the authors used symmetric key cryptography with EKA2,for that authentication delay will occur. To overcome this we proposed an group based authentication asymmetric key cryptography with IKEV2 key management. This improves the authentication of RFID and provide the better computation efficiency in VANETs and reduced the complexity of symmetric key management system. Keywords: RFID, VANETs, key management, Authentication
I. Introduction Road user applications. In order to perform the trusted vehicular communications, we need to ensure
peer vehicle Vehicular adhoc network plays an important role in credibility by means of IKEV2 authentication scheme. Due to the high mobility rate of VANETs, the unsuccessful delivery of information between the vehicles. To overcome this loss of information by speeding up the process of certificate validation In previous approach they are capable of utilizing the single key for both the prover and verifier. Due to this single key usage, the symmetric key approach could not hide the RF channel between the prover and verifier and also the verifier can do the lot of trails to select the decrypted key from the key database. Hence the authentication delay gets increased for symmetric key cryptography. So as to overcome this challenges include the authentication delay and security issues, we propose the novel RFID authentication protocol based on ELLIPTIC CURVE CRYPTOSYSTEM with asymmetric key cryptography. In this approach the certificate authority for authentication scheme is namely IKEV2.Besides two goals are set: to overcome the authentication delay and improving the security issue The rest of the paper is organized as follows. section II describes the overview of VANETs section III describes the privacy issues in RFID systems; section IV describes the concept of symmetric key management; section V describes the group based management section VI describes the performance analysis;
II. Review Of Vehicular Ad Hoc Networks
The following description of Vehicular Ad Hoc Networks and their security and privacy properties. The interested reader can get a broader view and deeper understanding on VANETs by reading the cited papers instead of only relying on this short introduction The main motivation to use VANETs is to enhance traffic safety, traffic efficiency, give assistance to drivers, and the possibility of infotainment applications. A VANET consist of vehicles equipped with On Board Units (OBUs) and wireless communication equipment, Road Side Units (RSUs), and backend infrastructure. The vehicles exchange messages regularly with each other and with the infrastructure using wireless communication to achieve the main goals such as safer roads. sample illustration of general structure of the VANETs is shown in Figure. 1 The main vulnerabilities in VANETs come from the wireless nature of the communication, and Figure1.An example of general structure of VANETs. the sensitive information, such as location of users, used by the network. One major vulnerability comes from the wireless nature of the system: the communication can be jammed easily, the messages can be forged. Another problem related to the wireless communication is that while the nodes are relaying messages, they can modify them. This is called In-Transit Traffic Tampering. Another kind of problem, that the vehicles can impersonate other vehicles with higher privileges such as emergency vehicles to gain extra privileges.
An Efficient Authentication Scheme for Rfid in Vanet By Using Ikev2
www.iosrjournals.org 50 | Page
[3] G. Calandriello, P. Papadimitratos, A. Lioy, and J.-P. Hubaux, “Efficient and robust pseudonymous authentication in vanet,” in
ACM International Workshop on VehiculAr Inter-NETworking (VANET), 2007. [4] LO N., TSA H.: „Illusion attack on VANET K. Zeng, K. Govindan, and P. Mohapatra, “Non-cryptographic authentication and
identification in wireless networks [Security and privacy in emerging wireless networks],” Wireless Communications, IEEE, vol.
17, pp. 56–62, Oct. 2010. [5] L. Zhang, Q. Wu, A. Solanas, and J. Domingo- Ferrer, “A scalable robustauthentication protocol for secure vehicular
communications,” IEEE Trans. Veh. Technol., vol. 59, no. 4, pp. 1606–1617, May 2010. [6] W. B. Jaballah, M. Mosbah, and H. Youssef,“Performance evaluation of key disclosure delay based schemes in wireless sensor
networks,” in Proc.IEEE PERCOM/PERSENS, Mar. 2013, pp. 566–571.
Figure 3.Summary of cross-links and other constraints used in modeling.Cross-links obtained in this study are indicated by red lines; conserved tertiary interactions areindicated by Greek letters and green lines; cross-links from a previous study with unsplicedLl.LtrB intron are shown by dark blue lines (Noah and Lambowitz, 2003); cross-links mappedto the active site of unspliced aI5γ are indicated by light blue lines (de Lencastre et al., 2005).
Dai et al. Page 17
Mol Cell. Author manuscript; available in PMC 2009 August 11.
NIH
-PA Author Manuscript
NIH
-PA Author Manuscript
NIH
-PA Author Manuscript
Figure 4.Three-dimensional model of Ll.LtrB-ΔORF lariat RNA and ligated exons.A, B. Stereoviews of the exon-binding face and opposite face, respectively, with cylindersrepresenting helices and black tubes depicting the phosphate backbone of ligated exons.Domains are colored as in Panel C. Single-stranded regions are shown in stick representation,and in light gray to emphasize the limited experimental data available for modeling theseregions.C. Color coding of RNA domains. Boxed nucleotides indicate single-strands for which specificconformations could be predicted based on crystal structures of tetraloop-receptor interactions.
Dai et al. Page 18
Mol Cell. Author manuscript; available in PMC 2009 August 11.
NIH
-PA Author Manuscript
NIH
-PA Author Manuscript
NIH
-PA Author Manuscript
Several base pairs at the ends of helices were unpaired during modeling to allow connectionof strands (indicated by the absence of a dot).D. Schematic showing the arrangement of domains in the ribozyme model.
Dai et al. Page 19
Mol Cell. Author manuscript; available in PMC 2009 August 11.
NIH
-PA Author Manuscript
NIH
-PA Author Manuscript
NIH
-PA Author Manuscript
Figure 5.Consistency of the model with known phylogenetic variations of group II introns.A, B. Semitransparent helices depict substructures in Ll.LtrB that are absent in other intronsubclasses, while CPK representations indicate sites of insertions.C. Secondary structure of Ll.LtrB showing helices absent in other subclasses (gray) or sites ofinsertions (numbered arrowheads). See Supplementary Table 6 for additional details.D. Geometry of the group II intron structures having potential analogs in the spliceosome. DVis potentially analogous to U6-ISL, DVI to the U2/UACUAAC box pairing, ε-ε′ to theACAGAGA box/intron pairing, and IBS1-EBS1 and δ-δ′ to the exon/U5 pairings. CPK atomsdepict the branch A in DVI, and the AC bulge and AGC triad in DV.
Dai et al. Page 20
Mol Cell. Author manuscript; available in PMC 2009 August 11.
NIH
-PA Author Manuscript
NIH
-PA Author Manuscript
NIH
-PA Author Manuscript
Figure 6.Fluorescence quenching and cross-linking assays for IEP-ribozyme interactions.A. Representative fluorescence quenching data. CP RNAs with fluorescein conjugated to their5′ ends were titrated for quenching by 0-200 nM LtrA protein (Experimental Procedures). Datafor all constructs tested are summarized in Supplementary Table 5.B. Representative cross-linking data. CP RNAs with 35S and azidophenacyl at their 5′ endswere incubated with LtrA protein. The complexes were UV-irradiated to induce cross-linking,and digested with RNase T1 to leave a single 35S-labeled nucleotide attached to LtrA(Experimental Procedures). Samples were resolved on a 0.1%SDS/7% polyacrylamide gel,which was dried and analyzed by phosphorimaging. CYT-18 was substituted for LtrA as aspecificity control, as was BSA for some experiments (not shown). Data for all positive cross-linking signals are shown in Suppl. Fig. 2, and a summary of all constructs assayed is inSupplementary Table 5.
Dai et al. Page 21
Mol Cell. Author manuscript; available in PMC 2009 August 11.
NIH
-PA Author Manuscript
NIH
-PA Author Manuscript
NIH
-PA Author Manuscript
Figure 7.Interaction sites between the IEP and intron RNA.A, D. Surface representation of the ribozyme model, color-coded as in Figures 4 and 5. Exonsare black.B, E. Gray surface representation of the RNA model, with putative protein contact sites color-coded according to the method of detection. Nucleotide positions identified by cross-linkingand fluorescence quenching are specified with residue numbers; a few residues are not visiblefrom the angle shown.C, F. Alternative view of the model with putative protein contacts shown as spheres.G. Summary of protein contact data, and definition of the color-coding scheme for panels B,C, E and F. Backbone and base protections are from Matsuura et al. (2001), and include allstrong protections in Figures 3 and 4 of that work, as well as moderate protections in regionsdeemed to be sites of protein contacts as discussed in that manuscript. For residues that gave
Dai et al. Page 22
Mol Cell. Author manuscript; available in PMC 2009 August 11.
NIH
-PA Author Manuscript
NIH
-PA Author Manuscript
NIH
-PA Author Manuscript
data by more than one method, the color was determined by the priority of red > orange > green> yellow. The red open circle indicate the nearest exposed residue to G99.
Dai et al. Page 23
Mol Cell. Author manuscript; available in PMC 2009 August 11.
NIH
-PA Author Manuscript
NIH
-PA Author Manuscript
NIH
-PA Author Manuscript
NIH
-PA Author Manuscript
NIH
-PA Author Manuscript
NIH
-PA Author Manuscript
Dai et al. Page 24
Table 1New cross-links for use in structure modeling.
APA position Mapped Crosslink Splicing-dependence
G5 C469/G470 No
G14 A76 No
G14 A110 No
G37 G374 Yes
G38 A110 Yes
A64 G117 No
G126 A493/G494/C500 No
G126 G520/G521/A523 No
G151 U222 Yes
G347 G192 Yes
G374 G38 No
G410 A454 Yes
G501 A523 No
G2417 G279 Yes
G2453 U416 Yes
G2475 A446 Yes
Mol Cell. Author manuscript; available in PMC 2009 August 11.