{"title":"基于集群证书技术的车载Ad-Hoc网络身份映射","authors":"M. Naresh, K. Srinija, N. Varsha, M. Kalpana","doi":"10.1109/ICCS45141.2019.9065402","DOIUrl":null,"url":null,"abstract":"In this paper, we introduced a secure authentication technique for VANETs called Identity-Mapping using cluster-based revocation technique. In this technique, all the nodes are split into various clusters and Cluster Head is selected accordingly. The certificate authority is responsible for retracting and issuing certificates, upon the successful transmission of messages or identification of any harmful activities by any node, to the corresponding vehicles. From the simulations and comparative analysis provided in this paper, it is verified that the recommended method shows better performance when compared with the existing works.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Identity Mapping using Cluster-based Certificate technique for Vehicular Ad-Hoc Networks\",\"authors\":\"M. Naresh, K. Srinija, N. Varsha, M. Kalpana\",\"doi\":\"10.1109/ICCS45141.2019.9065402\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we introduced a secure authentication technique for VANETs called Identity-Mapping using cluster-based revocation technique. In this technique, all the nodes are split into various clusters and Cluster Head is selected accordingly. The certificate authority is responsible for retracting and issuing certificates, upon the successful transmission of messages or identification of any harmful activities by any node, to the corresponding vehicles. From the simulations and comparative analysis provided in this paper, it is verified that the recommended method shows better performance when compared with the existing works.\",\"PeriodicalId\":433980,\"journal\":{\"name\":\"2019 International Conference on Intelligent Computing and Control Systems (ICCS)\",\"volume\":\"53 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Intelligent Computing and Control Systems (ICCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCS45141.2019.9065402\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCS45141.2019.9065402","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Identity Mapping using Cluster-based Certificate technique for Vehicular Ad-Hoc Networks
In this paper, we introduced a secure authentication technique for VANETs called Identity-Mapping using cluster-based revocation technique. In this technique, all the nodes are split into various clusters and Cluster Head is selected accordingly. The certificate authority is responsible for retracting and issuing certificates, upon the successful transmission of messages or identification of any harmful activities by any node, to the corresponding vehicles. From the simulations and comparative analysis provided in this paper, it is verified that the recommended method shows better performance when compared with the existing works.