0% Complete
فارسی
Home
/
چهاردهمین کنفرانس بین المللی فناوری اطلاعات و دانش
SecVanet: provably secure authentication protocol for sending emergency events in VANET
Authors :
Seyed Amir Mousavi
1
Mohammad Sadeq Sirjani
2
Seyyed Javad Bozorg zadeh Razavi
3
Morteza Nikooghadam
4
1- دانشگاه فردوسی مشهد
2- دانشگاه فردوسی مشهد
3- دانشگاه فردوسی مشهد
4- دانشگاه امام رضا (ع)
Keywords :
Authentication،Privacy،Key agreement،VANET،Scyther Tool
Abstract :
Recently, the number of accidents resulting in irreparable damages like death has risen due to the increased number of vehicles worldwide. Vehicular ad hoc network (VANET) is a new technology for enhancing road safety, reducing traffic load, and providing emergency services. Vehicles can send warnings in a network to announce accidents and seek help from emergency vehicles. Security and privacy are now significant concerns in developing vehicular ad hoc networks despite the many advantages of VANET. The communication channel in this network is public and insecure, so there is concern about eavesdropping, message manipulation, and impersonation, which creates significant risks. For this reason, a safe and efficient protocol is proposed in this article to ensure data security in VANET. The security of the proposed protocol has been proven by Scyther tool. The security analysis performed on the protocol also shows that the proposed protocol is resistant to many attacks and meets various security requirements. We also evaluated the performance of the proposed protocol in terms of computational complexity and showed that the proposed scheme has less computational complexity than similar schemes.
Papers List
List of archived papers
Advanced SMS Spam Detection using Deep Complex Models and Sine-Cosine Algorithm
Sepehr Rezaei - Mohammadreza Shams - Mohsen Alambardar Meybodi
Adaptive Stopping Criteria-based A-RANSAC algorithm in Copy Move Image Forgery detection
ZAHRA HOSEINNEJAD - Dr MEHDI NASRI
Enhancing Supervised Learning in Speech Emotion Recognition through Unsupervised Representations
Niloufar Faridani - Amirali Soltani Tehrani - Ramin Toosi
AI-based Secure Intrusion Detection Framework for Digital Twin-enabled Critical Infrastructure
Tanisha Patel - Nilesh Kumar Jadav - Tejal Rathod - Sudeep Tanwar - Deepak Garg - Hossein Shahinzadeh
A Potential Solutions-Based Parallelized GA for Application Graph Mapping in Reconfigurable Hardware
Seyed Mehdi Mohtavipour - Hadi Shahriar Shahhoseini
An Improved Image Classification Based In Feature Extraction From Convolutional Neural Network: Application To Flower Classification
Faeze Sadati - Dr Behrooz Rezaie
پیدا کردن خبره در انجمنهای پرسش و پاسخ با استفاده از الگوریتم طبقهبندی ترکیبی
مهراد قاضی پور - علیرضا رضوانیان
Investigating the impact of management information systems (MIS) on organizational transparency with an emphasis on work ethics
Sadegh Balouch - Omid mehdi Ebadati
AN EFFICIENT TASK SCHEDULING IN CLOUD COMPUTING BASED ON ACO ALGORITHM
Zahra Shafahi - Dr Alireza Yari
کشف لبه در تصاویر پزشکی با استفاده از اتوماتای سلولی سلسله مراتبی
مریم علینقی زاده - علیرضا رضوانیان
Samin Hamayesh - Version 40.3.1