{"title":"IBC based verifiable hash chains for reliable internet access in intelligent transportation systems","authors":"Seemran Mishra, Soumyadev Maity, S. K. Jena","doi":"10.1109/ICICES.2017.8070749","DOIUrl":null,"url":null,"abstract":"This paper addresses the problem of unreliable internet access in Intelligent Transportation System through a secure acknowledgement routing protocol. Identity-Based Digital Signature scheme is preferred over traditional certificate based Digital Signature due to underlying resource constrained Vehicular Ad-Hoc Network. Verifiable hash chains paired with IBS are used in the protocol to increase the computation efficiency in comparison to the repetitive use of Digital Signatures. Our protocol helps to achieve the security objectives of authentication and non-repudiation of packet receiver during remote internet access by a vehicular node through gateway nodes. It provides immunization to impersonation and packet dropping attack in the network.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICES.2017.8070749","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper addresses the problem of unreliable internet access in Intelligent Transportation System through a secure acknowledgement routing protocol. Identity-Based Digital Signature scheme is preferred over traditional certificate based Digital Signature due to underlying resource constrained Vehicular Ad-Hoc Network. Verifiable hash chains paired with IBS are used in the protocol to increase the computation efficiency in comparison to the repetitive use of Digital Signatures. Our protocol helps to achieve the security objectives of authentication and non-repudiation of packet receiver during remote internet access by a vehicular node through gateway nodes. It provides immunization to impersonation and packet dropping attack in the network.