Top Banner
24

A three-dimensional model of a group II intron RNA and its interaction with the intron-encoded reverse transcriptase

Apr 02, 2023

Download

Documents

Lindsey Ives
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: A three-dimensional model of a group II intron RNA and its interaction with the intron-encoded reverse transcriptase

IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278 -2834,p - ISSN: 2278 -8735.Volume 9, Issue 6, Ver. IV (Nov - Dec. 2014) , PP 44 -50 www.iosrjournals.org

www.iosrjournals.org 44 | Page

An Efficient Authentication Scheme for Rfid in Vanet By Using

Ikev2

Ms.T.Durga1, Mr.V.Vijayakumar2 (Communication Systems, Dhanalakshmi Srinivasan Engineering College/ Anna University, India)

2 ( Assistant Professor, Department of ECE, Dhanalakshmi srinivasan Engineering college/ Anna University, India)

Abstract: The aim of Vehicular Adhoc networks(VANETS) is to control the road traffic. This paper address an improved authentication scheme for Radio Frequency Identification (RFID) applied in VANETs. In earlier the authors used symmetric key cryptography with EKA2,for that authentication delay will occur. To overcome this we proposed an group based authentication asymmetric key cryptography with IKEV2 key management. This improves the authentication of RFID and provide the better computation efficiency in VANETs and reduced the complexity of symmetric key management system. Keywords: RFID, VANETs, key management, Authentication

I. Introduction Road user applications. In order to perform the trusted vehicular communications, we need to ensure

peer vehicle Vehicular adhoc network plays an important role in credibility by means of IKEV2 authentication scheme. Due to the high mobility rate of VANETs, the unsuccessful delivery of information between the vehicles. To overcome this loss of information by speeding up the process of certificate validation In previous approach they are capable of utilizing the single key for both the prover and verifier. Due to this single key usage, the symmetric key approach could not hide the RF channel between the prover and verifier and also the verifier can do the lot of trails to select the decrypted key from the key database. Hence the authentication delay gets increased for symmetric key cryptography. So as to overcome this challenges include the authentication delay and security issues, we propose the novel RFID authentication protocol based on ELLIPTIC CURVE CRYPTOSYSTEM with asymmetric key cryptography. In this approach the certificate authority for authentication scheme is namely IKEV2.Besides two goals are set: to overcome the authentication delay and improving the security issue The rest of the paper is organized as follows. section II describes the overview of VANETs section III describes the privacy issues in RFID systems; section IV describes the concept of symmetric key management; section V describes the group based management section VI describes the performance analysis;

II. Review Of Vehicular Ad Hoc Networks

The following description of Vehicular Ad Hoc Networks and their security and privacy properties. The interested reader can get a broader view and deeper understanding on VANETs by reading the cited papers instead of only relying on this short introduction The main motivation to use VANETs is to enhance traffic safety, traffic efficiency, give assistance to drivers, and the possibility of infotainment applications. A VANET consist of vehicles equipped with On Board Units (OBUs) and wireless communication equipment, Road Side Units (RSUs), and backend infrastructure. The vehicles exchange messages regularly with each other and with the infrastructure using wireless communication to achieve the main goals such as safer roads. sample illustration of general structure of the VANETs is shown in Figure. 1 The main vulnerabilities in VANETs come from the wireless nature of the communication, and Figure1.An example of general structure of VANETs. the sensitive information, such as location of users, used by the network. One major vulnerability comes from the wireless nature of the system: the communication can be jammed easily, the messages can be forged. Another problem related to the wireless communication is that while the nodes are relaying messages, they can modify them. This is called In-Transit Traffic Tampering. Another kind of problem, that the vehicles can impersonate other vehicles with higher privileges such as emergency vehicles to gain extra privileges.

Page 2: A three-dimensional model of a group II intron RNA and its interaction with the intron-encoded reverse transcriptase

An Efficient Authentication Scheme for Rfid in Vanet By Using Ikev2

www.iosrjournals.org 50 | Page

[3] G. Calandriello, P. Papadimitratos, A. Lioy, and J.-P. Hubaux, “Efficient and robust pseudonymous authentication in vanet,” in

ACM International Workshop on VehiculAr Inter-NETworking (VANET), 2007. [4] LO N., TSA H.: „Illusion attack on VANET K. Zeng, K. Govindan, and P. Mohapatra, “Non-cryptographic authentication and

identification in wireless networks [Security and privacy in emerging wireless networks],” Wireless Communications, IEEE, vol.

17, pp. 56–62, Oct. 2010. [5] L. Zhang, Q. Wu, A. Solanas, and J. Domingo- Ferrer, “A scalable robustauthentication protocol for secure vehicular

communications,” IEEE Trans. Veh. Technol., vol. 59, no. 4, pp. 1606–1617, May 2010. [6] W. B. Jaballah, M. Mosbah, and H. Youssef,“Performance evaluation of key disclosure delay based schemes in wireless sensor

networks,” in Proc.IEEE PERCOM/PERSENS, Mar. 2013, pp. 566–571.

Page 3: A three-dimensional model of a group II intron RNA and its interaction with the intron-encoded reverse transcriptase

Figure 3.Summary of cross-links and other constraints used in modeling.Cross-links obtained in this study are indicated by red lines; conserved tertiary interactions areindicated by Greek letters and green lines; cross-links from a previous study with unsplicedLl.LtrB intron are shown by dark blue lines (Noah and Lambowitz, 2003); cross-links mappedto the active site of unspliced aI5γ are indicated by light blue lines (de Lencastre et al., 2005).

Dai et al. Page 17

Mol Cell. Author manuscript; available in PMC 2009 August 11.

NIH

-PA Author Manuscript

NIH

-PA Author Manuscript

NIH

-PA Author Manuscript

Page 4: A three-dimensional model of a group II intron RNA and its interaction with the intron-encoded reverse transcriptase

Figure 4.Three-dimensional model of Ll.LtrB-ΔORF lariat RNA and ligated exons.A, B. Stereoviews of the exon-binding face and opposite face, respectively, with cylindersrepresenting helices and black tubes depicting the phosphate backbone of ligated exons.Domains are colored as in Panel C. Single-stranded regions are shown in stick representation,and in light gray to emphasize the limited experimental data available for modeling theseregions.C. Color coding of RNA domains. Boxed nucleotides indicate single-strands for which specificconformations could be predicted based on crystal structures of tetraloop-receptor interactions.

Dai et al. Page 18

Mol Cell. Author manuscript; available in PMC 2009 August 11.

NIH

-PA Author Manuscript

NIH

-PA Author Manuscript

NIH

-PA Author Manuscript

Page 5: A three-dimensional model of a group II intron RNA and its interaction with the intron-encoded reverse transcriptase

Several base pairs at the ends of helices were unpaired during modeling to allow connectionof strands (indicated by the absence of a dot).D. Schematic showing the arrangement of domains in the ribozyme model.

Dai et al. Page 19

Mol Cell. Author manuscript; available in PMC 2009 August 11.

NIH

-PA Author Manuscript

NIH

-PA Author Manuscript

NIH

-PA Author Manuscript

Page 6: A three-dimensional model of a group II intron RNA and its interaction with the intron-encoded reverse transcriptase

Figure 5.Consistency of the model with known phylogenetic variations of group II introns.A, B. Semitransparent helices depict substructures in Ll.LtrB that are absent in other intronsubclasses, while CPK representations indicate sites of insertions.C. Secondary structure of Ll.LtrB showing helices absent in other subclasses (gray) or sites ofinsertions (numbered arrowheads). See Supplementary Table 6 for additional details.D. Geometry of the group II intron structures having potential analogs in the spliceosome. DVis potentially analogous to U6-ISL, DVI to the U2/UACUAAC box pairing, ε-ε′ to theACAGAGA box/intron pairing, and IBS1-EBS1 and δ-δ′ to the exon/U5 pairings. CPK atomsdepict the branch A in DVI, and the AC bulge and AGC triad in DV.

Dai et al. Page 20

Mol Cell. Author manuscript; available in PMC 2009 August 11.

NIH

-PA Author Manuscript

NIH

-PA Author Manuscript

NIH

-PA Author Manuscript

Page 7: A three-dimensional model of a group II intron RNA and its interaction with the intron-encoded reverse transcriptase

Figure 6.Fluorescence quenching and cross-linking assays for IEP-ribozyme interactions.A. Representative fluorescence quenching data. CP RNAs with fluorescein conjugated to their5′ ends were titrated for quenching by 0-200 nM LtrA protein (Experimental Procedures). Datafor all constructs tested are summarized in Supplementary Table 5.B. Representative cross-linking data. CP RNAs with 35S and azidophenacyl at their 5′ endswere incubated with LtrA protein. The complexes were UV-irradiated to induce cross-linking,and digested with RNase T1 to leave a single 35S-labeled nucleotide attached to LtrA(Experimental Procedures). Samples were resolved on a 0.1%SDS/7% polyacrylamide gel,which was dried and analyzed by phosphorimaging. CYT-18 was substituted for LtrA as aspecificity control, as was BSA for some experiments (not shown). Data for all positive cross-linking signals are shown in Suppl. Fig. 2, and a summary of all constructs assayed is inSupplementary Table 5.

Dai et al. Page 21

Mol Cell. Author manuscript; available in PMC 2009 August 11.

NIH

-PA Author Manuscript

NIH

-PA Author Manuscript

NIH

-PA Author Manuscript

Page 8: A three-dimensional model of a group II intron RNA and its interaction with the intron-encoded reverse transcriptase

Figure 7.Interaction sites between the IEP and intron RNA.A, D. Surface representation of the ribozyme model, color-coded as in Figures 4 and 5. Exonsare black.B, E. Gray surface representation of the RNA model, with putative protein contact sites color-coded according to the method of detection. Nucleotide positions identified by cross-linkingand fluorescence quenching are specified with residue numbers; a few residues are not visiblefrom the angle shown.C, F. Alternative view of the model with putative protein contacts shown as spheres.G. Summary of protein contact data, and definition of the color-coding scheme for panels B,C, E and F. Backbone and base protections are from Matsuura et al. (2001), and include allstrong protections in Figures 3 and 4 of that work, as well as moderate protections in regionsdeemed to be sites of protein contacts as discussed in that manuscript. For residues that gave

Dai et al. Page 22

Mol Cell. Author manuscript; available in PMC 2009 August 11.

NIH

-PA Author Manuscript

NIH

-PA Author Manuscript

NIH

-PA Author Manuscript

Page 9: A three-dimensional model of a group II intron RNA and its interaction with the intron-encoded reverse transcriptase

data by more than one method, the color was determined by the priority of red > orange > green> yellow. The red open circle indicate the nearest exposed residue to G99.

Dai et al. Page 23

Mol Cell. Author manuscript; available in PMC 2009 August 11.

NIH

-PA Author Manuscript

NIH

-PA Author Manuscript

NIH

-PA Author Manuscript

Page 10: A three-dimensional model of a group II intron RNA and its interaction with the intron-encoded reverse transcriptase

NIH

-PA Author Manuscript

NIH

-PA Author Manuscript

NIH

-PA Author Manuscript

Dai et al. Page 24

Table 1New cross-links for use in structure modeling.

APA position Mapped Crosslink Splicing-dependence

G5 C469/G470 No

G14 A76 No

G14 A110 No

G37 G374 Yes

G38 A110 Yes

A64 G117 No

G126 A493/G494/C500 No

G126 G520/G521/A523 No

G151 U222 Yes

G347 G192 Yes

G374 G38 No

G410 A454 Yes

G501 A523 No

G2417 G279 Yes

G2453 U416 Yes

G2475 A446 Yes

Mol Cell. Author manuscript; available in PMC 2009 August 11.