Institution
University College of Engineering Tindivanam
About: University College of Engineering Tindivanam is a based out in . It is known for research contribution in the topics: Authentication & Cloud computing. The organization has 82 authors who have published 184 publications receiving 1987 citations.
Papers
More filters
••
TL;DR: The proposed scheme revokes the privacy of misbehaving vehicles to provide conditional privacy in a computationally efficient way through which the VANET entities will be anonymous to each other until they are revoked from theVANET system.
Abstract: Providing an efficient anonymous authentication scheme in vehicular ad hoc networks (VANETs) with low computational cost is a challenging issue. Even though, there are some existing schemes to provide anonymous authentication, the existing schemes suffer from high computational cost in the certificate and the signature verification process, which leads to high message loss. Therefore, they fail to meet the necessity of verifying hundreds of messages per second in VANETs. In our scheme, we propose an efficient anonymous authentication scheme to avoid malicious vehicles entering into the VANET. In addition, the proposed scheme offers a conditional tracking mechanism to trace the vehicles or roadside units that abuse the VANET. As a result, our scheme revokes the privacy of misbehaving vehicles to provide conditional privacy in a computationally efficient way through which the VANET entities will be anonymous to each other until they are revoked from the VANET system. Moreover, the proposed scheme is implemented and the performance analysis shows that our scheme is computationally efficient with respect to the certificate and the signature verification process by keeping conditional privacy in VANETs.
322 citations
••
TL;DR: A dual authentication scheme to provide a high level of security in the vehicle side to effectively prevent the unauthorized vehicles entering into the VANET and a dual group key management scheme to efficiently distribute a group key to a group of users and to update such group keys during the users' join and leave operations are presented.
Abstract: Vehicular ad hoc networks (VANETs) are an important communication paradigm in modern-day mobile computing for exchanging live messages regarding traffic congestion, weather conditions, road conditions, and targeted location-based advertisements to improve the driving comfort. In such environments, security and intelligent decision making are two important challenges needed to be addressed. In this paper, a trusted authority (TA) is designed to provide a variety of online premium services to customers through VANETs. Therefore, it is important to maintain the confidentiality and authentication of messages exchanged between the TA and the VANET nodes. Hence, we address the security problem by focusing on the scenario where the TA classifies the users into primary, secondary, and unauthorized users. In this paper, first, we present a dual authentication scheme to provide a high level of security in the vehicle side to effectively prevent the unauthorized vehicles entering into the VANET. Second, we propose a dual group key management scheme to efficiently distribute a group key to a group of users and to update such group keys during the users' join and leave operations. The major advantage of the proposed dual key management is that adding/revoking users in the VANET group can be performed in a computationally efficient manner by updating a small amount of information. The results of the proposed dual authentication and key management scheme are computationally efficient compared with all other existing schemes discussed in literature, and the results are promising.
244 citations
••
TL;DR: A computationally efficient anonymous mutual authentication scheme to validate the message source as well as to ensure the integrity of messages along with a conditional tracking mechanism to trace the real identity of misbehaving vehicles and revoke them from VANET in the case of dispute.
161 citations
••
TL;DR: This paper presents a password-based conditional privacy preserving authentication and group-key generation (PW-CPPA-GKA) protocol for VANETs, which is lightweight in terms computation and communication since it can be designed without bilinear-pairing and elliptic curve.
140 citations
••
TL;DR: This article constructs a novel secure mutual authentication system that integrates blockchain, group signature, and message authentication code to provide reliable auditing of users’ access history, anonymously authenticate group members, and efficiently authenticate home gateway, respectively.
Abstract: Increasingly, governments around the world, particularly in technologically advanced countries, are exploring or implementing smart homes, or the related smart facilities for the benefits of the society. The capability to remotely access and control Internet of Things (IoT) devices (e.g., capturing of images, audios, and other information) is convenient but risky, as vulnerable devices can be exploited to conduct surveillance or perform other nefarious activities on the users and organizations. This highlights the necessity of designing a secure and efficient remote user authentication solution. Most of the existing solutions for this problem are generally based on a single-server architecture, which has limitations in terms of privacy and anonymity (leading to users’ daily activities being predicted), and integrity and confidentiality (resulting in an unreliable behavior auditing). While blockchain-based solutions may mitigate these issues, they still face some critical challenges (e.g., providing regulation of behaviors and privacy protection of access policy). Motivated by these facts, in this article, we construct a novel secure mutual authentication system, which can be applied in smart homes and other applications. Specifically, the proposed approach integrates blockchain, group signature, and message authentication code to provide reliable auditing of users’ access history, anonymously authenticate group members, and efficiently authenticate home gateway, respectively. We also prove the security and privacy requirements, including anonymity, traceability, and confidentiality, that the proposed system satisfies, with an implementation and evaluation to demonstrate its practicality.
118 citations
Authors
Showing all 82 results
Name | H-index | Papers | Citations |
---|---|---|---|
Pandi Vijayakumar | 23 | 120 | 1829 |
Anand Ramanathan | 21 | 64 | 1251 |
S. Mercy Shalinie | 13 | 105 | 627 |
M.P. Pachamuthu | 12 | 29 | 492 |
S. Sivasubramanian | 11 | 43 | 675 |
L. Jegatha Deborah | 10 | 31 | 432 |
K. Venkatalakshmi | 9 | 21 | 208 |
Maria Azees | 8 | 21 | 659 |
N. Deepa | 7 | 36 | 124 |
Lazarus Jegatha Deborah | 5 | 9 | 329 |
Ganesabaskaran Sivaprasad | 5 | 12 | 177 |
R. Naresh | 3 | 8 | 43 |
Vijayakumar Pandi | 3 | 5 | 34 |
S. Milton Ganesh | 3 | 7 | 30 |
M. Vasanthi | 2 | 2 | 14 |