Int
ern
at
i
onal
Journ
al of Ele
ctrical
an
d
Co
mput
er
En
gin
eeri
n
g (IJ
E
C
E)
Vo
l.
8
,
No.
6
,
D
ece
m
ber
201
8
, pp.
5268
~
52
77
IS
S
N: 20
88
-
8708
,
DOI: 10
.11
591/
ijece
.
v8
i
6
.
pp
5268
-
52
77
5268
Journ
al h
om
e
page
:
http:
//
ia
es
core
.c
om/
journa
ls
/i
ndex.
ph
p/IJECE
A Compu
tatio
n
al Anal
ysis of EC
C
Based
Novel
Aut
henticati
on
Scheme
in VANET
Sa
chin
P.
G
odse
,
P
arikshit
N.
M
ahall
e
Depa
rtment
o
f
C
om
pute
r
Engi
n
e
eri
ng,
Sinhgad
I
nstit
ute
s,
Sm
t.
K
ashiba
i
Nava
l
e Coll
ege of
Enginee
ring
,
Sav
it
rib
ai
Phul
e
Pune
Univer
sit
y
,
India
Art
ic
le
In
f
o
ABSTR
A
CT
Art
ic
le
history:
Re
cei
ved
Ma
r
13
, 201
8
Re
vised
Jun
4
,
201
8
Accepte
d
J
ul
4
, 201
8
A
rec
en
t
dev
el
o
pm
ent
in
th
e
ad
hoc
net
work
is
a
vehicul
ar
ne
t
work
ca
l
le
d
VA
NET
(Vehi
c
ula
r
Adhoc
N
etw
ork).
Intelli
g
e
nt
Tra
nsport
atio
n
S
y
stem
is
the
Int
el
l
ige
nt
appl
i
ca
t
ion
of
VA
NET
.
Due
t
o
open
nat
ur
e
of
VA
NET
at
t
ac
ker
c
an
l
au
nch
var
ious
kin
d
of
a
tt
a
ck.
As
VA
NET
m
essage
s
are
de
al
with
ver
y
cru
c
i
al
informati
on’s
which
m
a
y
sav
e
th
e
li
f
e
of
pa
ss
enge
rs
b
y
avoi
ding
acci
d
e
nts,
save
th
e
t
i
m
e
of
peop
le
o
n
a
tri
p
,
ex
cha
n
ge
of
se
cret
informati
on
etc.,
bec
ause
of
this
sec
urity
is
m
ust
be
in
the
VA
NET.
To
ensure
th
e
high
e
st l
evel
of
se
cur
i
t
y
the ne
twork
s
hould
be
fr
ee fro
m
at
tacke
rs,
the
re
b
y
all
info
rm
at
ion
pass
am
ong
nodes
in
the
net
work
m
ust
be
rel
i
abl
e
i.
e
.
should
be
or
igi
nated
b
y
an
a
uthe
ntica
te
d
nod
e.
Authen
ticatio
n
is
the
first
li
ne
of
sec
ur
ity
in
VA
NET;
it
a
voids
nonre
gistered
vehi
c
le
in
t
he
net
work.
Previous
rese
ar
c
h
come
up
with
som
e
Cr
y
ptogr
a
phic
,
Trust
b
ase
d,
Id
b
ase
d,
Group
signat
ure
base
d
aut
h
ent
i
cation
sche
m
es.
A
spee
d
of
aut
hen
t
ic
a
ti
on
and
priva
c
y
pr
ese
rva
ti
on
is
important
par
amete
rs
in
V
AN
ET
aut
hen
ti
c
at
ion
.
This
pape
r
addr
esses
the
computa
ti
on
al
an
aly
sis
of
au
the
ntica
ti
on
sch
emes
base
d
on
ECC.
W
e
sta
rte
d
an
aly
s
is
from
compari
ng
pla
in
ECC
with
o
ur
proposed
AECC
(Adapt
ive
El
li
p
ti
c
Cur
v
e
Cr
y
ptogr
aph
y
)
and
EE
CC
(Enha
nced
El
li
p
ti
c
Curv
e
Cr
y
ptogr
aph
y
).
The
result
of
ana
l
y
s
is
shows
proposed
sche
m
es
improve
spee
d
and
se
c
urity
of
aut
h
ent
i
ca
t
ion.
In
AEC
C
ke
y
siz
e
is
ada
pt
ive
i.e.
d
if
fer
ent
size
s
of
ke
y
s
are
gene
r
a
te
d
during
ke
y
gene
ra
ti
on
phase
.
Thr
ee
ran
ges
are
spec
if
ied
for
ke
y
siz
es
sm
al
l,
la
rg
e
and
m
edi
um
.
In
EE
CC
we
adde
d
an
ext
ra
p
ara
m
e
te
r
during
tr
ansm
ission
of
infor
m
at
ion
from
the
veh
icle
to
RS
U
for
ke
y
g
ene
ra
ti
on.
Sche
m
es
of
aut
hen
tications
are
eva
lu
at
ed
b
y
co
m
par
at
ive
an
alys
is
of
ti
m
e
r
equ
ire
d
for
aut
h
ent
i
ca
t
ion
and
ke
y
bre
aki
ng
po
ss
ibi
li
ties of
k
e
ys used
in
aut
h
entication.
Ke
yw
or
d:
AECC
Au
t
hen
ti
cat
io
n
ECC
EECC
VANET
sec
ur
i
ty
Copyright
©
201
8
Instit
ut
e
o
f Ad
vanc
ed
Engi
n
ee
r
ing
and
S
cienc
e
.
Al
l
rights re
serv
ed
.
Corres
pond
in
g
Aut
h
or
:
Sachin
P. G
ods
e
,
Dep
a
rtm
ent o
f C
om
pu
te
r
E
ng
i
neer
i
ng, S
i
nhga
d In
sti
tutes,
Sm
t. Kas
hib
ai
Nav
al
e C
olleg
e of E
ng
i
neer
i
ng,
Savitribai
Phul
e Pune
U
niv
e
rs
it
y, Pu
ne
41
1041
, In
dia
.
Em
a
il
:
sachin.gd
s
@
gm
ail.co
m
1.
INTROD
U
CTION
The
ve
hicular
ad
hoc
netw
ork
(VA
NET
)
is
a
s
ub
ty
pe
of
M
AN
E
T
(Mo
bile
Adh
oc
Netw
ork
).
Mov
i
ng
veh
ic
l
es
and
sta
ti
ona
ry
RSU
act
as
nodes
in
the
netw
ork.
It
is
rising
a
rea
of
researc
h.
It
prov
i
des
intel
li
gen
t
tran
sp
ort
at
ion
m
anag
em
ent
by
i
m
pr
ov
in
g
safe
ty
in
dr
iv
in
g,
t
raffic
op
ti
m
iz
a
ti
on
,
a
nd
c
om
fo
rt
i
n
dr
i
ving to
driv
er/o
wn
e
r.
E
ach
veh
ic
le
in
the
netw
ork
can
sen
d
a
nd
r
ecei
ve
m
essages
by
O
n
Boa
r
d
U
nit
(O
B
U)
and
e
quip
ped
with
Eve
nt
D
at
a
Re
cor
de
r,
GP
S
,
Tr
us
te
d
com
po
ne
nt
et
c.
The
Roa
ds
id
e
Un
it
s
(RSU)
is
respon
si
ble
f
or
broa
dcasti
ng
s
afety
m
essages
per
i
od
ic
al
ly
.
Com
m
un
ic
at
io
n
in
V
ANET
m
ai
nly
ta
kes
pl
ace
in
th
ree
di
ff
e
ren
t
ways V
2V
(V
e
hicle
to Vehicl
e), V
2I
(Vehicl
e to infra
struct
ur
e
),
a
nd
I2I (I
nfrastr
uctu
re to I
nfrastr
uctur
e
)
.
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
& C
om
p
Eng
IS
S
N: 20
88
-
8708
A Co
mputatio
nal A
na
ly
sis
of
ECC
based No
vel
Au
the
nticat
ion
Sc
hem
e
in VAN
ET
(
Sac
hin
P
. Go
ds
e
)
5269
Du
e
to
a
n
op
e
nn
e
ss
of
VAN
ET,
outsi
der
nod
e
s
can
enter
in
to
the
network.
Secu
rity
is
a
big
ger
chall
enge
in
VANET
[
8]
.
A
at
ta
cker
no
de
can
car
ry
di
ff
ere
nt
at
ta
cks
to
disturb
the
wo
r
king
of
ne
twork
.
Con
si
der
i
ng
these
s
ecu
rity
pro
blem
s,
pa
rtic
ipate
d
no
de
i
n
the
ne
twork
m
us
t
be
tru
ste
d
by
pro
pe
r
authe
ntica
ti
on
.
Be
cause
of
dy
nam
ic
natur
e
of
net
wor
k
veh
i
cl
es
are
ver
y
le
ss
tim
e
to
est
ablish
c
omm
un
ic
at
ion
with eac
h othe
r
a
nd to
RS
U.
Ti
m
e
req
ui
red
for
c
om
m
un
icati
on
al
s
o
af
fe
ct
the
ef
fecti
ve
ness
of
c
ommun
ic
at
io
n
i
n
V
AN
E
T.
Thi
s
pap
e
r
first
a
ddr
esses
a
propos
ed
sc
hem
e
and
it
s
var
ia
ti
on
to
i
m
pr
ove
ti
m
e
and
secu
rity
of
authe
ntica
ti
on,
ove
r
tradit
ion
al
sc
hem
e
li
ke
RSA.
In
analy
sis
pa
rt,
we
im
ple
m
e
nted
plain
EC
C
in
V
ANET
and
com
par
e
with
ou
r
pro
po
se
d
s
che
m
e
i
m
pl
e
m
ent
at
ion
i.e.
A
ECC
an
d
EECC
.
In
t
his
pap
e
r
s
ect
ion
1
a
ddre
ssed
basic
of
VANET
.
Sect
ion
2
giv
es
relat
ed
wor
k
done
in th
e
A
uth
entic
at
io
n
of
VANET
. S
ect
ion
3
giv
e
s p
r
opose
d novel schem
es.
Sect
ion
4
gi
ve
s
com
pu
ta
ti
on
a
l
analy
sis
on
the
basis
of
res
ult
recorde
d
in
Vsim
(V
AN
E
T
Si
m
ulator).
Sect
io
n
5
c
on
cl
ud
e
s th
e p
a
per
.
VANET
sce
na
rio
is
as
sho
w
n
in
Fig
ure
1.
It
g
ives
dif
fer
e
nt
ty
pes
of
co
m
m
un
ic
at
ion
.
As
sho
wn
i
n
the
fi
gure
ve
hicle
can
c
omm
un
ic
at
e
with
ot
her
ve
hic
le
vi
a
V
2V
com
m
un
ic
at
ion
,
veh
ic
le
can
c
omm
u
nicat
e
with
inf
rastr
uc
ture
(RS
U)
thr
ough
V
2I
com
m
un
ic
at
i
on,
ve
hicle
can
com
m
un
ic
at
e
with
ro
a
d
side
infr
a
struct
ur
e
usi
ng V2R c
omm
un
ic
at
ion
[1]. Ve
hicle
to se
ns
or c
omm
un
ic
at
ion
is
de
picte
d by V
2S.
Figure
1.
S
yst
em
arch
it
ect
ur
e
in VA
NET
’s
2.
RELATE
D
W
ORKS O
N A
UTHENTI
C
A
TION I
N V
A
NET
Table
1
s
how
the
detai
le
d
s
urvey
of
resea
rc
h
in
V
A
NET
their
st
rength
,
weakness
an
d
fu
t
ur
e
sco
pe
of
re
searc
h.
Lit
eratur
e
s
urvey
sh
ows
that
ove
r
al
l
tim
e
req
uired
f
or
d
ig
it
a
l
signat
ur
e
gene
r
at
i
on
and
ver
ifica
tion
of
m
essage
in
V2V
comm
unic
at
ion
req
uire
s
m
ore
tim
e
in
som
e
sche
m
es,
which
degr
ade
s
per
form
ance
of
net
work.
I
n
so
m
e
schem
es
securi
ty
can
ham
per
,
If
CA,
RA
or
RSU
com
pr
om
ise
.
Sp
ace
re
qu
ire
d
sto
ring
pri
vate
key
s
a
nd
certi
ficat
es
al
so
are
an
iss
ue
i
n
s
om
e
sche
m
e
.
Ti
m
e
r
equi
r
ed
for
waiting,
p
ac
k
et
ac
c
essing
and
dec
ision
ta
k
ing
i
s
al
so
aff
ect
on
per
for
m
anc
e.
W
e
f
ou
nd
that,
the
re
i
s
nee
d
of
m
or
e
resea
rch
in
au
thentic
at
ion
of
V
ANET
t
o
i
m
pr
ov
e
authe
ntica
ti
on
sp
ee
d
a
nd secu
rity
in
V
A
NET
.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
20
88
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
8
, N
o.
6
,
Dece
m
ber
2
01
8
:
5268
-
5277
5270
Table
1.
C
om
par
at
ive
An
al
ysi
s
of
E
xisti
ng Authe
ntica
ti
on
S
chem
e
in V
A
N
ET
Ref
erence
Sch
e
m
e
Streng
th
W
eakn
ess
Fu
tu
re
Sco
p
e
[
9
]
2016
A Hie
rar
ch
ical
Pr
i
v
acy
Preservin
g
Pseu
d
o
n
y
m
o
u
s
Au
th
en
ticatio
n
Pr
o
to
co
l f
o
r
VANE
T
1
.
No
need
of
sto
rage f
o
r
s
to
ring
a
lar
g
e
p
o
o
l o
f
ps
eu
d
o
n
y
m
s
.
2
.
Certif
icate Revo
catio
n
L
ist (CR
L)
i
s n
o
t
requ
ired.
3
.
Inf
o
r
m
atio
n
is s
ecured
as co
m
p
a
re
d
to
serv
er.
1
.
CA, RA
or RS
U
can
co
m
p
ro
m
ise
wh
ich
can
re
su
lt in sch
e
m
e
f
ailu
re.
1
.
Au
th
en
ticatio
n
pro
cess
sp
eed can
i
m
p
rov
e
.
2
.
Tr
u
st v
alu
e of
CA,
RA
an
d
RSU can
be u
sed
t
o
f
in
d
co
m
p
ro
m
ise n
o
d
e.
[
1
0
]
2016
Secu
rity Enh
an
ce
m
e
n
t in
Grou
p
Based
Auth
en
ticatio
n
f
o
r
VANE
T
1
.
Prpo
sed
f
ra
m
ew
o
rk is secu
re
an
d
p
reser
v
es
p
rivac
y
.
2
.
No
need
to sig
n
m
e
ss
ag
e in V2
V
co
m
m
u
n
icatio
n
w
h
ich
leads
to f
aster
au
th
en
ticatio
n
.
1
.
Sig
n
atu
re
g
en
er
atio
n
and
v
erifi
catio
n
of
m
es
sag
e
requ
ires
m
o
re
ti
m
e
which
d
eg
rades p
erfo
r
m
a
n
ce of
n
etwo
rk.
1
.
I
m
p
rov
e
m
en
t in
Dig
itial
sig
n
atu
re
p
rocess
.
2
.
Ca
n
i
m
p
rov
e pr
o
cess
of
au
th
en
ticatio
n
.
[
1
1
]
2016
Veh
icu
lar
Au
th
en
t
icatio
n
Secu
rity Sch
e
m
e (
VASS)
1
.
Req
u
ired less
co
m
p
u
tatio
n
ef
f
o
rt
as
co
m
p
a
red to
oth
er
m
e
th
o
d
s in
has
h
f
u
n
ctio
n
2
.
Secu
rit
y
is pro
v
i
d
ed
with p
rivacy,
au
th
en
ticatio
n
and
Sy
b
il atta
ck
d
etectio
n
.
1.
It
n
o
t con
sid
er
v
eh
icle to
in
f
rastructu
re
co
m
m
u
n
icatio
n
1
.
Veh
icle to
Inf
rastructu
re
au
th
en
ticatio
n
can be
p
o
ss
ib
le.
[
1
2
]
2016
Secu
re
an
d
dis
trib
u
ted
certificatio
n
sy
ste
m
architectu
re
f
o
r
saf
ety
m
e
ss
ag
e auth
en
tic
atio
n
in
VANE
T
1
.
False
p
u
b
lic
-
k
ey
cer
tif
icatio
n
is
av
o
id
ed
.
2.
D
istrib
u
ted
cer
ti
f
icatio
n
sy
ste
m
wit
h
h
ig
h
secu
rity
.
3
.
Each RC
A
dele
g
ates su
b
o
rdin
ates RSUs
f
o
r
th
e Certif
icate
m
a
n
ag
e
m
en
t
an
d
h
en
ce increasin
g
it
s av
ailab
ility
f
o
r
th
e
v
eh
icles.
1
.
Lar
g
e
sto
rage r
e
q
u
ired to
Each ve
h
icle f
o
r
k
ey
s an
d
certificate.
2
.
Hig
h
tr
an
s
m
iss
i
o
n
r
an
g
e
requ
ired to
tr
an
s
m
i
t vario
u
s
saf
ety
m
ess
ag
es.
1
.
b
y
r
ed
u
cin
g
the k
ey
sizes
sp
eed o
f
auth
en
tic
atio
n
can
in
crea
se
.
[
1
3
]
2016
A Secure
and
E
f
f
icien
t V2V
Au
th
en
ticatio
n
M
eth
o
d
in
Heavy
Tr
af
f
ic
Env
iron
m
en
t
1
.
Accele
rates
m
es
sag
e pro
cess
in
g
by
sen
d
in
g
a
lo
w data vo
lu
m
e
f
o
r
Co
m
m
u
n
icatio
n
in area
s o
f
heav
y
traff
ic.
2
.Blo
ck
s replay
att
acks
by
ch
ecki
n
g
t
i
m
e
sta
m
p
s
1
.
Veh
icle to in
f
ras
tructu
re
co
m
m
u
n
icatio
n
no
t
co
n
sid
ered.
1
.
Veh
icle to
Inf
rastructu
re
au
th
en
ticatio
n
can be
p
rov
id
ed
.
[
3
]
2014
An
adv
an
ced s
ecurity
sch
e
m
e
b
ased
on
clus
tering
and
key
d
istrib
u
tio
n
in v
eh
i
cu
lar
ad
-
h
o
c netwo
rks
1.
Ad
v
an
ced s
ecure s
ch
e
m
e bas
ed
on
Clu
sterin
g
and
Key
Dist
ribu
tio
n
(SCKD)
a
m
o
n
g
m
e
m
b
ers
an
d
clus
ter
-
h
eads
in VANE
T.
2.
Secu
re
en
d
to en
d
co
m
m
u
n
icatio
n
sch
e
m
e.
1.
Req
u
ired
m
o
re
m
e
m
o
ry to
sto
re
k
ey
s,
cer
tif
ic
ates etc.
2.
Lar
g
e t
raff
ic ov
erhead
3.
If
CA f
ail all
n
etw
o
rk will
f
ail.
1.
On
r
o
ad
sto
rage te
r
m
in
als
are
in
stalled
to sto
r
e ever
y
v
eh
icle secure data
.
2.
CA replica
which
wo
rk
wh
en
p
ri
m
a
ry CA
f
ails.
[
1
4
]
2014
Thresh
o
ld
Cry
p
to
g
raph
y
-
b
ased
Gr
o
u
p
Auth
en
ticatio
n
(T
CGA
)
1.
Allev
iates th
e eff
ect of
battery
ex
h
au
stio
n
attack
2.
Take less co
m
p
u
ta
tio
n
al ti
m
e as
co
m
p
a
re
to
GA.
3.
TCGA sch
e
m
e is
l
ig
h
t weigh
t and
scalab
le,
b
est su
ite
d
f
o
r
IoT .
1.
No
d
es
are
statio
n
a
ry
need
to
ad
ap
t as per V
AN
ET
scen
ario.
1.
Can
be adap
tin
g
f
o
r
d
y
n
a
m
ic net
wo
rk s
cenario
.
[
1
5
]
2016
Distrib
u
ted
Ac
cess
Co
n
trol
an
d
Auth
o
rization
m
o
d
el
f
o
r
IoT
1.
The lo
cal dev
ice a
ccess ti
m
e
and
re
m
o
te dev
ice
acc
e
ss
ti
m
e
requ
ires
n
early
s
a
m
e
a
m
o
u
n
t
o
f
ti
m
e
.
1.
Ho
p
by
h
o
p
co
m
m
u
n
icatio
n
is n
o
t con
sid
ered.
1.
Can
be
m
o
d
if
y
in
g
f
o
r
v
eh
icle and
RSU
Au
th
en
ticatio
n
.
[
1
6
]
2013
Iden
tity
Auth
en
tic
atio
n
and
Cap
ab
ility
b
ased
A
ccess
(I
ACAC
)
Co
n
trol f
o
r
th
e
Internet o
f
T
h
in
g
s
1.
It
p
resents
an in
teg
rated app
roach
of
au
th
en
ticatio
n
and
access co
n
trol f
o
r
IoT dev
ices.
2.
It
d
ef
en
d
attacks
like Do
S,
m
an
-
in
-
th
e
-
m
id
d
le
and
r
ep
la
y
attacks
ef
f
icien
tly
an
d
ef
f
ectiv
ely
.
1.
Co
m
p
lete
I
n
terop
e
rability
n
eed to
i
m
p
rov
e.
2.
Sch
e
m
e
co
n
sid
ered on
ly
IOT
s
cenario
f
o
r
au
th
en
ticatio
n
.
1.
Need to
adap
t as p
er
th
e
VANE
T
Req
u
ire
m
en
t.
[
4
]
2009
Secu
re
V2
V
Co
m
m
u
n
icat
io
n
W
ith
Cert
if
icate R
ev
o
catio
n
s
1.
Ad
d
resses th
e pro
b
le
m
of
acc
ess
to
revo
catio
n
inf
o
r
m
a
tio
n
us
in
g
a
co
n
ce
p
t
called f
resh
n
ess
.
2.
Red
u
ces th
e sto
rage r
eq
u
ire
m
en
t at
the
OBU an
d
pro
v
id
es a con
stan
t
ti
m
e
alg
o
rith
m
.
1.
If
the cer
tif
icate
of
the CA is
co
m
p
ro
m
ised
then
f
resh
n
ess
ch
ecks
sh
all no
t work
2.
The Co
S decreas
es as th
e
rate
o
f
r
ev
o
catio
n
i
n
crea
se.
1.
Private an
d
Pub
lic
k
ey
is
g
en
erate
d
by
in
d
iv
id
u
al
n
o
d
e and
jus
t get v
erifi
ed
b
y
tr
u
sted
serve
r.
2.
Dy
n
a
m
i
c
f
resh
n
ess
check
th
resh
o
ld
[
5
]
2013
A Categ
o
rized
Tr
u
st
-
Bas
ed
Messag
e Rep
o
rting
Sche
m
e
f
o
r
VANE
Ts
1.
A cate
g
o
rized dec
e
n
tralized trust
m
a
n
ag
e
m
en
t
an
d
e
v
alu
atio
n
sch
e
m
e
f
o
r
n
o
d
es
2.
Ro
le
-
b
ased
tr
u
st a
n
d
exp
erience
-
b
ased
trus
t is integ
rated,
3.
Deter
m
in
e the d
eg
ree
o
f
tr
u
stwo
rthin
ess
o
f
a
n
o
d
e’s.
1.
It
o
n
ly
con
sid
ers c
u
rr
en
t
m
e
ss
ag
e details
no
t his
to
ry
2.
Pig
g
y
b
acki
n
g
no
t
au
th
en
ticated
1.
Pig
g
y
b
ack,
m
ess
ag
es an
d
n
o
d
es h
isto
ry
can be u
sed
f
o
r
p
en
alty
or tr
u
st
bu
ild
in
g
2.
Ded
icated task
to
RSU.
[
6
]
2014
A
so
cial netwo
rk a
p
p
roach
to
trus
t
m
an
ag
e
m
en
t i
n
VANE
Ts
1.
No
v
el vo
tin
g
sch
e
m
e
,
eac
h
veh
icle h
as
d
if
f
erent vo
ti
n
g
weigh
t accordin
g
to its
d
istan
ce fro
m
the e
v
en
t.
2.
The v
eh
icle which
is clo
ser to th
e eve
n
t
p
o
ss
ess
es h
ig
h
er
w
eig
h
t.
1.
Ti
m
e
is issu
e in w
aitin
g
f
o
r
p
acket access
in
g
or decisi
o
n
tak
in
g
.
2.
Pig
g
y
b
acki
n
g
delay
o
r
f
o
rgery
so
u
rce
1.
Au
th
en
ticate so
u
rce
o
f
p
ig
g
y
b
acki
n
g
2.
Alg
o
rith
m
to selec
t ti
m
e
d
elay
f
o
r
p
acket ac
cess
in
g
o
r
d
ecisio
n
takin
g
.
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
& C
om
p
Eng
IS
S
N: 20
88
-
8708
A Co
mputatio
nal A
na
ly
sis
of
ECC
based No
vel
Au
the
nticat
ion
Sc
hem
e
in VAN
ET
(
Sac
hin
P
. Go
ds
e
)
5271
3.
PR
O
P
OSE
D WOR
K
Ob
se
r
vation
m
ade
from
p
rev
i
ou
s
r
es
earc
h
a
bout ECC
base
d
a
uth
e
ntica
ti
on
.
3.1.
ECC
Dis
advantages
:
a.
ECC
incr
eases
the size
of
t
he e
ncr
y
pted
m
essage si
gn
i
fican
tl
y
m
or
e than
RSA e
ncr
y
ptio
n.
b.
Most
ECDS
A
i
m
ple
m
entat
io
ns
re
quire
a
se
cur
e
rand
om
gen
erat
or
-
if
th
e
sam
e
ran
dom
value
is
re
use
d
(for dif
fer
e
nt
pl
ai
ntext)
the
n
t
he pri
vate k
ey
par
am
et
er can
si
m
ply be calcula
te
d;
c.
ECC
is
m
uch
m
or
e
eff
ic
ie
nt
than
RS
A
f
or
s
ign
at
ure
ge
ne
r
at
ion
an
d
dec
r
ypti
on
,
bu
t
it
'
s
sti
ll
m
uch
slow
er
than sy
m
m
et
ri
c algori
thm
s;
d.
Ty
pe of
c
urve
and cu
r
ve para
m
et
er ag
reem
ent is re
quire
d
i
n
ECC
al
gorith
Fr
om
p
re
vious
researc
h
s
urve
y, we f
ound th
at
, th
ere
is ne
e
d of m
or
e rese
arch
a.
To pro
vid
e
fast
er a
uth
e
ntica
tio
n i
n V
ANET
with
pr
ese
r
ving sec
ur
it
y re
qu
irem
ents.
3.2.
Prop
os
ed
Fr
am
ew
ork:
Figure
2
s
how
s
the
fr
am
ework
for
pro
pose
d
w
ork.
It
sho
ws
th
ree
dif
fere
nt
authe
ntica
ti
on
sc
hem
es
for
V
ANET
fir
st
on
e
is
plain
ECC
/
Ba
sic
E
CC
al
go
rithm
.
The
sec
ond
bl
ock
s
hows
A
da
ptive
ECC
al
gorithm
,
and
t
he
thir
d
blo
c
k
s
hows
En
han
ce
d
EC
C
al
go
rit
hm
.
Table
2
gi
ves
te
rm
s
us
ed
f
or
AECC
a
nd
EEC
C
al
gorithm
.
Figure
2. Fr
am
ewor
k
f
or
propose
d
a
uth
e
ntica
ti
on
wor
k
Table
2.
T
erm
s U
se
d for
Algo
rithm
Ter
m
s/No
tatio
n
s
Meanin
g
P
Key
po
o
l
Ts
Ti
m
e
slo
t.(
R
e
-
g
en
erate
ke
y
s af
ter
every Ts
seco
n
d
s)
G
Key
Gen
erator
m
,
a
,b
Un
iq
u
e para
m
ete
rs
K
Key
s
Pu
Pu
b
lic key
Pr
Private k
ey
Vc
Cu
rr
en
t veh
icles
NR
n
eig
h
b
o
r
RSU
Ks
Key
si
ze
Kx
n
ew Ke
y
Us
Pu
b
lic key
serv
e
r
Re
Verify
–
S
y
b
il att
a
ck
,
replica
attack
3.3.
ECC
B
as
ed
Authen
tica
tio
n:
Authen
tica
tio
n U
sin
g
El
li
pti
c C
ur
ve Cry
p
togr
ap
h
y
3.3.1.
El
li
pt
ic
Cu
r
v
e
Crypt
ogra
phic
Algor
ithm
(EC
C)
ECC
is
an
al
te
rn
at
ive
m
echan
ism
fo
r
im
plem
enting
public
-
key
c
rypto
gra
ph
y.
Fig
ure
3
sh
ows
el
li
ptic
curve
wh
ic
h
is c
onsidere
d for ECC
al
gorithm
.
The
e
quat
ion o
f
a
n
el
li
ptic cu
r
ve
is
giv
e
n
as
,
y2
=
x3 +a
x
+
b
[
7]
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
20
88
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
8
, N
o.
6
,
Dece
m
ber
2
01
8
:
5268
-
5277
52
72
Term
s that will
b
e
us
e
d
i
n
Cry
ptogra
phy usi
ng ECC
,
E
-
>
Ell
ipti
c Cu
rv
e
P
-
>
P
oin
t
on th
e cu
rv
e
n
-
>
Ma
xim
u
m
l
i
m
i
t (
This s
houl
d
be
a
pr
im
e n
um
ber
)
F
i
gu
r
e
3.
E
l
l
i
pt
i
c
c
ur
ve
3.3.2. Ke
y Ge
nera
tion
It
is
fr
st
sta
ge
wh
e
re
public
and
pri
vate
key
is
gen
e
rated
.
The
m
essage
is
encr
y
pted
by
receive
r
pu
blic
key
and
the
recei
ve
r
is
decr
y
ptin
g
m
essage
by
it
s
own
pri
vate
key.
Ra
ndom
nu
m
ber
‘
d’
sel
e
ct
ed
wit
hin
t
he
ra
ng
e
of ‘n’
. Usin
g
t
he follo
wing e
qu
at
io
n Pu
bli
c
key w
il
l be
gen
erate
Q
=
d *
P
Wh
e
re:
d
=
the
ra
ndom
n
um
ber
t
hat h
a
s b
ee
n
sel
ect
e
d wit
hin t
he ra
nge
of (1 to
n
-
1).
P
=
the
po
i
nt on
the c
urve.
‘Q’ is t
he publi
c k
ey
a
nd‘
d’
is
the
pr
i
vate k
e
y.
3.3.3. E
ncry
pti
on
Let
‘
m
’
be
the
m
essage which
w
a
nt to sen
d.
Ths
m
essage is
r
e
pr
ese
nted
on
the c
urve.
Th
i
s h
as
in
-
de
pth
i
m
ple
m
entat
io
n detai
ls.
Con
si
der ‘m
’
ha
s the
point ‘M
’ on t
he
c
urve
‘
E’.
Ra
ndom
ly
sele
ct
‘
k’
from
[
1
–
(n
-
1)]
.
Tw
o
ci
pher
tex
ts wil
l be
ge
nerat
ed
le
t i
t be C
1
a
nd C2
.
C1
=
k*P
C2
=
M +
k*Q
C1 a
nd C
2 wil
l be
sen
d.
3.3.4.
Decr
ypt
ion:
We
hav
e
to get
b
ac
k
the
m
ess
age
‘m
’
that w
as send t
o us,
M
=
C2
–
d*
C
1
M i
s the
or
i
gina
l
m
essage that
w
e
ha
ve
se
nd.
3.4
.
AEC
C (
A
da
p
tive
El
li
pt
ic
C
ur
ve Cr
yptogr
ap
h
y)
Bas
ed Authe
nt
ic
ati
on
AECC
is
var
ia
ti
on
in
ECC
.
I
n
this
us
i
ng
a
n
ada
ptive
key
s
iz
e
al
gorithm
var
yi
ng
keys
ar
e
ge
ner
at
e
d.
This
al
go
rithm
us
es
the
ra
ndom
key
siz
e
w
her
e
no
at
ta
ck
er
ca
n
gu
es
s,
t
he
key
siz
e
at
the
cu
rr
e
nt
ti
m
e,
a
nd
fail
s to
br
eak it. In
this k
ey
sizes are v
ary afte
r
ever
y de
fine
d t
i
m
esl
ot.
Wh
e
n
an
at
ta
cker
tr
ie
s to
gu
ess the
k
ey
to
br
ea
k
the
syst
e
m
,
as
the
E
CC
is
stron
g
e
nough
this
do
e
s
no
t
ha
ppen
e
asi
ly
.
But
wh
en
an
at
ta
cker
s
uccee
ds
to do so
, becau
se of the
ad
a
pti
ve key
size (
A
KS
)
alg
or
it
hm
, th
e
key is
no longe
r
r
el
e
van
t
to that att
acke
r
.
Algori
th
m/
Ps
eudo co
de
fo
r
AEC
C
b
as
e
d
au
t
hen
tica
tio
n [2]:
Inpu
t:
G,
{
Ts}, {
Ks,
P}, {
V}
Out
p
ut:
Ra
ndom
_K
ey
s,
Acce
ss
Gr
a
nt
ed/Re
j
ect
ed
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
& C
om
p
Eng
IS
S
N: 20
88
-
8708
A Co
mputatio
nal A
na
ly
sis
of
ECC
based No
vel
Au
the
nticat
ion
Sc
hem
e
in VAN
ET
(
Sac
hin
P
. Go
ds
e
)
5273
3.
5
. EE
CC (E
nhanced El
li
p
tic C
urve
C
r
yptogr
ap
h
y)
B
as
ed
Authe
nt
i
cat
i
on
En
han
ce
d
EC
C
al
go
rithm
is
extend
e
d
ve
rs
ion
of
AECC.
In
this
an
e
xtr
a
par
am
et
er
is
add
e
d
du
rin
g
the
transm
issi
on
of
inf
or
m
at
ion
from
the
vehi
cl
e
to
the
RS
U
f
or
key
ge
ne
rati
on.
These
a
dd
it
io
nal
par
a
m
et
ers
giv
e
t
he
i
nform
at
ion
ab
out
the
veh
ic
le
I
D,
an
d
t
he
lo
cat
ion
of
the
vehi
cl
e
from
the
RSU,
an
d
t
he
othe
r
veh
ic
le
. T
his
algorit
hm
p
rovid
es r
e
plica
and
Sybil
att
ack
de
te
ct
ion
alo
ng
with a
uth
e
ntica
ti
on
.
Algori
th
m/
Ps
eudo co
de
fo
r
EE
CC
B
as
ed
Au
t
hen
tica
tio
n [2]:
Inpu
t:
G,
{
V}, {Ts}
,
{Ks,
P}
Out
p
ut:
Detect
A
tt
ack
,
Access
Grante
d/Reject
ed
4.
COMP
U
TAT
IONAL
ANA
LYSIS
OF
E
CC &
AEC
C
The
a
naly
sis
is
carrie
d
ou
t
by
i
m
ple
m
enting
ECC
an
d
A
ECC
in
V
sim
(V
AN
E
T
Sim
ulato
r
).
Vsim
is
j
ava
ba
sed
sim
ulator
f
or
Test
ing,
An
al
yz
in
g,
an
d
im
ple
m
enting
diff
e
re
nt
prot
oco
ls
i
n
VANET.
W
e
can
add,
create
,
m
od
ify
scenari
o
in
sim
ulator
.
Vsim
pr
ov
i
de
diff
e
re
nt
pac
kag
e
s
f
or
c
reati
ng
V
A
NE
T
en
vir
on
m
ent.
We
can
loa
d
m
ap
of
dif
fer
e
nt
ci
ti
es.
W
e
ca
n
load
dif
fer
e
nt
s
cenari
os
f
or
s
a
m
e
m
ap.
Figu
re
4
s
hows
m
ap
of
NewY
ork_n
oT
S.x
m
l
is
load
on
the
VANE
T
Si
m
ulator.
S
i
m
i
la
rly
we
ca
n
load
a
m
ap
of
Be
rlin_n
oTS
.
xm
l
or
Pu
e
bla_
noTS.
xm
l on
the
sim
ulator.
Or g
e
ne
r
at
e n
ew
m
ap
as p
e
r
re
qu
i
rem
e
nt.
Figure
5
sho
w
s
uploa
ding
of
Ne
w
Y
ork
road
sce
na
rio
wi
th
2500
slo
w
a
nd
25
00
fa
st
ve
hicle
s
with
100m
co
m
m
u
nicat
ion
r
an
ge.
Road
side
un
it
s
are
within
500m
rad
ius
c
omm
un
ic
at
ion
range.
Veh
ic
l
es
are
sh
ow
n
by
sm
a
ll
black
do
ts
a
nd
gr
ay
col
or
ci
rcle
is
us
ed
for
RSU.
Fig
ure
6
sho
ws
ve
hicle
com
m
un
i
cat
ion
distance.
Ve
hicle
s
are
sho
wn
by
blu
e
dots
and
blu
e
ci
rcle
show
t
he
com
m
un
ic
at
ion
range
of
veh
ic
le
.
Eac
h
veh
ic
le
eq
uipp
ed
with
on
-
board
unit
,
an
d
ever
y
ve
hicle
ha
s
W
i
-
Fi
or
int
ern
et
.
Veh
ic
le
s
hav
e
com
m
un
ic
at
ion
range
of
100m
.
So
ve
hicle
c
an
c
omm
un
ic
a
te
with
each
ot
her
a
nd
with
RSU.
Fig
ur
e
7
shows
inf
orm
at
ion
about
ve
hicle
s
on
t
he
m
ark
ed
path.
I
nfor
m
ation
c
on
ta
in
s
th
e
Nam
e,
le
ng
th,
Ma
x
sp
ee
d,
Lane/dir
ect
ion,
sta
rt
locat
ion
,
destinat
ion
loc
at
ion,
current
s
peed,
Trav
el
ti
m
e,
Trav
el
dista
nc
e,
known
veh
i
cl
es,
known
m
essages
,
fail
ed
f
orwa
rd
m
essages, k
nown p
e
nalti
es etc
.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
20
88
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
8
, N
o.
6
,
Dece
m
ber
2
01
8
:
5268
-
5277
5274
Figure
4.
Ma
p l
oa
ding
on
VANET
sim
ulator
Figure
5.
Sce
na
rio u
plo
a
ding
in
m
ap
Figure
6.
Ve
hi
cl
e
com
m
un
ic
at
ion
range
Figure
7.
Ve
hi
cl
e’s
in
form
at
i
on on m
ark
e
d
s
treet
Figure
8
s
how
s
gr
a
ph
ic
al
ly
analy
sis
of
tim
e
required
for
ECC
and
AEC
C
fo
r
a
uth
e
ntica
ti
on
wit
h
resp
ect
ive
it
er
at
ion
.
I
n
case
of
ECC
sam
e
key
is
us
ed
f
or
each
it
erati
on,
an
d
for
a
da
ptive
key
sel
ect
e
d
fr
o
m
sm
a
ll
,
la
rg
e
or
m
edium
gr
ou
p
of
key
siz
es.
Gr
a
ph
shows
t
hat
as
com
par
e
to
ECC
,
AECC
req
uir
ed
le
ss
tim
e.
So
AECC
is
fa
ste
r
tha
n
ECC
.
Fig
ur
e
9
sho
w
s
that
nu
m
ber
of
ve
hicle
aut
he
ntica
te
d
by
A
ECC
per
sec
ond
a
re
m
or
e
than
EC
C.
Table
3
s
ho
ws
ECC
a
nd
AECC
tim
e
req
ui
red
f
or
a
uthe
ntica
ti
on
.
Tab
le
4
s
hows
nu
m
ber
of
veh
ic
le
a
uth
e
nt
ic
at
ed
us
i
ng E
CC
an
d A
ECC
.
Figure
8.
Tim
e
r
e
qu
ire
d f
or
A
uth
e
ntica
ti
on
Figure
9.
N
umber
of
veh
ic
le
s
authe
ntica
te
d p
er s
ec
ond
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
& C
om
p
Eng
IS
S
N: 20
88
-
8708
A Co
mputatio
nal A
na
ly
sis
of
ECC
based No
vel
Au
the
nticat
ion
Sc
hem
e
in VAN
ET
(
Sac
hin
P
. Go
ds
e
)
5275
Table
3.
ECC
and AE
CC
Ti
m
e
Re
qu
ire
d
f
or
A
uth
e
ntica
ti
on
ECC
AECC
Iter
atio
n
Alg
o
rith
m
Ti
m
e
Iter
atio
n
Alg
o
rith
m
Ti
m
e
1
ECC
1924
1
AECC
1007
2
ECC
1925
2
AECC
1009
3
ECC
1854
3
AECC
1020
4
ECC
1800
4
AECC
1110
5
ECC
1688
5
AECC
1054
6
ECC
1869
6
AECC
1089
7
ECC
1846
7
AECC
1245
8
ECC
1789
8
AECC
1072
9
ECC
1966
9
AECC
1100
10
ECC
1854
10
AECC
1054
Table
4.
N
um
ber
of
Ve
hicle
A
ut
hen
ti
cat
ed
Using
ECC
a
nd
AECC
ECC
AECC
Iter
atio
n
Alg
o
rith
m
Veh
icle
Au
th
en
tic
ated
Iter
atio
n
Alg
o
rith
m
Veh
icle Auth
en
tic
ated
1
ECC
1
0
.39
5
0
1
0
4
1
AECC
1
9
.86
0
9
7
3
1
9
2
ECC
1
0
.38
9
6
1
0
3
9
2
AECC
1
9
.82
1
6
0
5
5
5
3
ECC
1
0
.78
7
4
8
6
5
2
3
AECC
1
9
.60
7
8
4
3
1
4
4
ECC
1
1
.11
1
1
1
1
1
1
4
AECC
1
8
.01
8
0
1
8
0
2
5
ECC
1
1
.84
8
3
4
1
2
3
5
AECC
1
8
.97
5
3
3
2
0
7
6
ECC
1
0
.70
0
9
0
9
5
8
6
AECC
1
8
.36
5
4
7
2
9
1
7
ECC
1
0
.83
4
2
3
6
1
9
7
AECC
1
6
.06
4
2
5
7
0
3
8
ECC
1
1
.17
9
4
2
9
8
5
8
AECC
1
8
.65
6
7
1
6
4
2
9
ECC
1
0
.17
2
9
3
9
9
8
9
AECC
1
8
.18
1
8
1
8
1
8
10
ECC
1
0
.78
7
4
8
6
5
2
10
AECC
1
8
.97
5
3
3
2
0
7
Secu
rity
of
authen
ti
cat
io
n
is
check
e
d
by
it
s
pr
iv
at
e
key
breaki
ng
po
s
sib
il
ities.
Table
5
sh
ows
key
br
ea
king
po
s
sibil
it
ie
s
.
Figure
10
s
how
s
that
key
breaki
ng
possibil
it
y
of
A
ECC
is
le
ss
as
it
ta
kes
m
or
e
tur
n
f
or
br
ea
king
key t
han ECC
. So
AECC i
s m
or
e
secur
e
tha
n
EC
C.
Figure
10.
Key
breaki
ng possi
bili
ti
es
Table
5.
Key
breaki
ng possi
bili
ti
es
Iter
atio
n
Alg
o
rith
m
Breaki
n
g
Po
ss
ib
ilities
Key
size
1
ECC
1
.07
3
7
4
E+39
256
2
ECC
1
.34
2
1
8
E+38
512
3
ECC
1
.67
7
7
2
E+37
1024
1
AECC
3
.62
3
8
8
E+39
120
2
AECC
4
.52
9
8
5
E+38
256
3
AECC
7
.00
2
2
7
E+38
512
Fr
om
abov
e
ana
ly
sis we can l
ist
out f
ollow
i
ng a
dv
a
ntage
s
of AEC
C
Adapt
i
ve
k
ey
siz
e a
lgo
ri
thm
it’
s
a
d
van
tag
es:
a.
Her
e
we
us
in
g
secur
e
ke
y
sel
ect
or
-
if
the
s
a
m
e
ran
dom
v
al
ue
is
reu
se
d
(for
diff
e
ren
t
pl
ai
ntext)
then
t
he
pr
i
vate k
ey
pa
r
a
m
et
er can
not
be
cal
culat
e
d b
ecause
of d
i
ff
e
ren
t
key
siz
e.
b.
By
u
sin
g
le
ss
ke
y si
zes we
ca
n faste
r
t
he
a
uth
entic
at
io
n
s
pe
ed.
c.
Her
e
alo
ng w
it
h
c
urve a
gr
ee
m
ent, this alg
ori
thm
also r
eq
ui
red
key a
gr
ee
m
ents.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
20
88
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
8
, N
o.
6
,
Dece
m
ber
2
01
8
:
5268
-
5277
5276
5.
CONCL
US
I
O
N
Secu
rity
is
an
i
m
po
rtant
iss
ue
in
VANE
T.
A
uth
e
ntica
ti
on
s
pro
hib
it
entry
of
the
un
a
utho
rize
d
m
al
ic
iou
s
us
e
r
.
It
help
s
to
a
vo
i
d
var
i
ous
s
ecur
it
y
at
ta
cks
.
T
his
pap
e
r
a
ddresses
issue
s
in
a
uth
e
ntica
ti
on
f
or
i
m
pr
ovin
g
the
sp
eed
of
a
ut
hen
ti
cat
io
n.
It
al
so
ta
kes
c
a
re
to
m
ai
ntain
sa
m
e
or
rath
er
m
or
e
securi
ty
,
as
com
par
ed
to
previ
ou
s
a
uth
e
nt
ic
at
ion
schem
es
li
ke
RSA
an
d
ECC
.
Her
e
we
giv
e
n
the
c
om
pu
ta
ti
on
al
analy
sis
of
res
ult
obta
in
in
V
ANET
Si
m
ulator.
T
he
tim
e
req
uire
d
f
or
aut
he
ntica
ti
on
is
ver
ifie
d
by
ta
king
m
ulti
ple
it
erati
on
rea
di
ng,
w
hic
h
pr
oves
that
AEC
C
require
d
le
s
s
tim
e
as
com
par
e
d
to
ECC
.
A
nu
m
ber
of
veh
ic
le
s
authe
ntica
te
d
by
RSU
pe
r
sec
ond
a
re
m
or
e
in
case
of
AEC
C
than
ECC
;
a
t
the
end
secu
r
it
y
of
the
sch
e
m
e
i
s
check
e
d
by
ke
y
br
eakin
g
pos
sibil
it
y.
Ou
r
ne
eds
f
o
r
faste
r
authe
ntica
ti
on
r
eflect
in
i
m
pr
ov
in
g
the
perf
orm
ance
of
RS
U
by
ser
ving
m
or
e
nu
m
ber
of
veh
ic
l
es.
I
n
f
uture
w
ork,
we
a
re
go
i
ng
t
o
a
dd
m
or
e
secu
rity
par
a
m
et
er
in
EECC
(Enha
nc
e
Ell
ipti
c
Curv
e
Crypt
ogra
phy)
sc
hem
e.
We
ga
ve
a
n
al
gorithm
fo
r
sa
m
e
in
this
paper
but
a
n
i
m
ple
m
entat
io
n
is
in
process
.
Its
im
ple
m
en
ta
ti
on
an
d
c
om
pu
ta
ti
on
al
an
al
ysi
s
will
be
the
pa
rt
of
our
fu
t
ure
sco
pe.
REFERE
NCE
S
[1]
Sachi
n
Gods
e
a
nd
Parikshit
Ma
hal
l
e,
“
Rising
I
ss
ues
in
VA
NE
T
Com
m
unic
at
i
on
and
Secur
i
t
y:
A
Stat
e
of
Ar
t
Surve
y
”
,
Int
erna
ti
onal
Journal
of
Adv
anc
ed
Computer
Scienc
e
an
d
Appl
i
cat
ions
(
IJA
CSA)
,
Vol.
8
,
No.
9,
2017,
PP
245
-
252.
[2]
Sachi
n
Gods
e
a
nd
Parikshit
Ma
hal
l
e,
“
Ti
m
e
-
Eff
ic
i
ent
and
Att
ack
Resista
nt
Aut
hent
i
ca
t
ion
Sche
m
es
in
VA
NET”
,
Proce
ed
ings o
f
2
nd
Inte
rnat
ional
Confe
renc
e, I
CI
CC
,
PP
579
-
589
2017
.
[3]
Am
ene
h
Dae
i
na
bi,
Akbar
Gha
f
far
pour
Rahb
ar,
“
An
adva
nce
d
sec
urity
s
che
m
e
base
d
on
cl
u
steri
ng
and
k
e
y
distri
buti
on
in
v
ehi
cu
la
r
ad
-
ho
c
net
works
”
.
In
:
E
LSEVIE
R
Computers
and
El
ec
tr
ic
al
Engi
n
ee
ring
40
P
P
517
–
529
,
2014
.
[4]
As
hw
in
Rao,
A
shish
Sangwan
et
.
al.,
“
Secur
e
V2V
Com
m
un
ic
a
ti
on
wi
th
Ce
rti
fi
ca
t
e
Revo
cations
”
.
In:
I
EEE
(2007).
[5]
Merri
han
Monir
,
A
y
m
an
Abd
el
-
Ham
id,
Moham
m
ed
Abd
El
Az
i
z,
“
A
Ca
te
gori
zed
Trust
-
Based
Mess
age
Reporti
ng
Scheme
for
VA
NETs
”
.
In:
Sprin
ger
CCIS
381
,
P
P.
6
5
–
83,
2013.
[6]
Zhe
n
Huang,
Su
shm
it
a
Ruj
et
al.
“
A
socia
l
net
wo
rk
appr
oac
h
to
tr
ust
m
ana
gement
in
VA
NETs
”
.
In:
Springer
Pe
er
-
to
-
Peer Ne
tw
.
A
ppl
.
(2014)
7
PP
.
229
–
242
.
[7]
Kristin
La
ut
er,
“
The
Advanta
g
es
of
el
li
p
ti
c
C
urve
Cr
y
p
tograph
y
For
W
ire
les
s
Secur
ity
”
.
In
:
IEE
E
W
irel
es
s
Comm
unic
ati
ons
2004.
[8]
Shidrokh
Goudarz
i,
Abdul
Hana
n
Abdulla
h,
“
A
S
y
stematic
Review
of
Secur
ity
i
n
Vehic
ula
r
Ad
Hoc
Network
”
.
In:
the
2nd
Symposi
um on
Wireless
Sensors
and
Cel
l
ular Ne
tworks
(
WSCN'13)
2013.
[9]
Ubaidul
l
ah
Raj
p
ut,
Fiz
za
Abbas,
Hee
ku
ck
Oh,
“
A
Hier
arc
hi
cal
Privacy
Preservi
ng
Ps
eudon
y
m
ous
Authent
icati
o
n
Protocol
for
VA
NET
”
.
In
: IEE
E Ac
c
ess
,
Octob
er 25,
2016
.
[10]
Raj
kum
ar
W
ag
hm
ode,
Rupali
Gons
al
ves,
D
a
y
ana
nd
Am
bawa
de,
“
Secur
ity
Enha
nc
ement
in
Group
Base
d
Authent
i
ca
t
ion
f
or
VA
NET
”
.
I
n
:
IEEE
I
n
te
rnat
ional
Conf
ere
nc
e
on
R
ecent
Tr
ends
in
E
lectro
nic
s
Informatio
n
Comm
unic
ati
on
Technol
ogy
,
Ma
y
20
-
21,
2016,
I
ndia
.
[11]
Yongcha
n
Kim
,
Jongkun L
ee
,
“
A sec
ure
anal
y
s
is of
vehi
cular
aut
h
ent
i
ca
t
ion
sec
uri
t
y
sch
eme
of
RS
Us
in
V
AN
ET
”
.
In:
Springer
-
V
erlag
Franc
e
20
16
.
[12]
Ti
ziri
Oulha
ci,
Mawloud
Omar
,
Fat
iha
H
arzine
,
In
es
Harfi
,
:
“
Secur
e
and
distri
bute
d
ce
r
tification
s
y
s
te
m
arc
hi
te
c
ture for
s
afe
t
y
m
essag
e a
uthe
ntica
ti
on
in V
AN
ET
”
.
In
:
Sp
ringer
Scienc
e+B
usiness Me
dia
New Y
ork
2016
[13]
M
y
oung
-
Seok
Han,
Sang
Jun
Lee,
W
oo
-
Sik
Ba
e,
“
A
Secur
e
and
Eff
icient
V2V
Authent
i
ca
t
ion
Method
in
Hea
v
y
Tra
ffi
c Envi
ron
m
ent
”
.
In:
Sprin
ger
Scienc
e+B
usiness Me
dia
Ne
w
Y
ork
2016.
[14]
Parikshit
N.
M
aha
l
le
,
Nee
li
R
.
Prasad
and
Ramjee
Prasad
,
“
Novel
Thre
s
hold
Cr
y
ptograph
y
-
bas
ed
Grou
p
Authent
i
ca
t
ion
(
TCGA)
Scheme
for
the
Int
ern
e
t
of
Thi
ngs
(Io
T)
”
,
In
:
proce
e
dings
of
IEEE
3rd
Inte
rnation
al
Confe
renc
e
on
Wirel
ess
Comm
unic
ati
ons
,
Ve
hi
cul
ar
Technol
og
y,
Information
Theory
and
Ae
ros
pace
&
El
ec
troni
c
Syste
ms
Technology
(
Wirel
ess V
i
TAE
2014)
.
Aalb
org
-
Denm
ark
,
Ma
y
11
-
14
2014
.
[15]
Parikshit
N.
Ma
hal
l
e,
Sandesh
Maha
m
ure
,
Poonam
N.
Rai
lka
r
,
Pankaj
r.
Ch
andr
e,
“
Distribut
ed
Acc
ess
Control
and
Authoriz
a
ti
on
(
DA
CA)
for
Int
ern
et
of
Thi
ngs
”
,
In:
In
te
rnatio
nal
Journal
on
Eme
rging
Tr
ends
in
Technol
og
y
(
IJE
TT)
(ISS
N (
Print):
2350
-
0
80
8)
,
Volum
e
3
,
Is
sue
3,
Septe
m
be
r
2016.
[16]
Parikshit
N.
M
aha
l
le
,
B
a
y
u
A
nggoroja
ti,
Ne
eli
R.
Prasad
an
d
Ramjee
Prasa
d,
“
Ide
nti
t
y
Au
the
ntica
ti
on
and
Capa
bilit
y
b
ase
d
Acc
ess
(IACA
C)
Control
for
t
he
Inte
rn
et
of
T
hings
”
,
In:
Journal
of
Cyb
er
Secur
it
y
and
Mobi
lity
,
Rive
r
Publ
ishers,
Volum
e: 1, Iss
ue:
4
,
pp
:
309
-
3
48,
Mar
ch
2013
.
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
& C
om
p
Eng
IS
S
N: 20
88
-
8708
A Co
mputatio
nal A
na
ly
sis
of
ECC
based No
vel
Au
the
nticat
ion
Sc
hem
e
in VAN
ET
(
Sac
hin
P
. Go
ds
e
)
5277
BIOGR
AP
H
I
ES
OF
A
UTH
ORS
Mr.
S.
P.
Gods
e
has
obt
ai
ned
hi
s
B.
E
degr
ee
in
Copute
r
Engi
n
e
eri
ng
from
AV
COE,
Savi
tri
ba
i
Phule
Pune
Uni
ver
sit
y
,
Pun
e,
In
dia
and
M.E
.
de
gre
e
in
Com
puter
Scie
nc
e
and
E
ngine
er
ing
from
Savit
ribai
Phule
Pune
Univer
si
t
y
,
Pune
,
Indi
a.
His
are
as
of
i
nte
rest
are
Veh
ic
ul
ar
Adhoc
Network,
Mobile
Adhoc
Net
work,
Natur
al
la
nguage
Pro
ce
ss
ing,
and
Objec
t
Orien
ted
Program
m
ing,
Objec
t
Ori
ent
ed
Modeli
ng,
Soft
ware
Engi
n
ee
rin
g.
He
has
au
tho
red
3
books
on
subjec
t
li
k
e:
Pri
nci
pl
e
of
Progra
m
m
ing
La
nguag
es,
Software
Modeli
ng
and
Desi
gn,
Embedde
d
s
y
stem
and
Int
er
net
of
Th
ing.
Cu
rre
ntly
h
e
is
pur
suing
his
Ph.
D
in
Com
pute
r
Eng
ine
er
ing
from
Sm
t.
Kashibai Nava
l
e
Col
le
g
e
of
Engi
ne
eri
ng,
SP
PU
,
Pune,
Ind
ia.
Dr.
Parikshit
N. M
aha
lle
has
obt
ai
ned
h
is B.
E
d
e
gre
e
in
Com
puter Sci
ence
and En
gine
er
ing
from
Sant
Gadge
Ba
ba
Am
rav
at
i
Univer
sit
y
,
Am
ra
vat
i
,
India
and
M.E
.
degr
e
e
in
Com
pute
r
Engi
ne
eri
ng
fro
m
Savit
riba
i
Phule
Pune
Univ
e
rsit
y
,
Pune
,
Indi
a.
He
complete
d
his
Ph.
D
in
Com
pute
r
Scie
n
ce
and
Engi
n
eering
spec
i
alizati
on
in
W
ire
l
ess
Com
m
unic
at
ion
from
Aalbor
g
Univer
sit
y
,
Aal
borg,
Denm
ark
.
He
has
pub
li
s
hed
56
r
ese
ar
c
h
publications
at
n
at
ion
al
and
int
ern
at
ion
al
jo
urna
ls
and
conf
ere
nc
es.
He
has
aut
hor
ed
8
bo
oks
on
subje
c
ts
li
k
e:
Id
ent
i
t
y
Mana
gement
for
Inte
rn
et
of
Th
i
ngs,
Ide
nt
ity
M
ana
gement
Fra
m
ework
for
Internet
of
Th
ings,
Data
Struct
ur
es
and
Algorit
hm
s,
The
or
y
of
C
om
puta
ti
ons,
Fundam
ent
al
s
of
Program
m
in
g
La
nguag
es,
Fundam
ent
al
s
of
Pr
ogra
m
m
ing
La
nguage
s
–
II,
Des
ign
an
d
Anal
y
sis
of
Algorit
hm
s:
A
Problem
Solving
Approac
h
,
C
urre
ntly
he
is
working
as
Profes
sor
and
Hea
d
in
Depa
rtment
of
Com
pute
r
Engi
n
ee
ring
at STE
S’s
Sm
t.
Kashiba
i N
ava
le Col
l
ege
of
Engi
n
ee
rin
g,
Pune,
Indi
a.
Evaluation Warning : The document was created with Spire.PDF for Python.