{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T18:13:03Z","timestamp":1654107183806},"reference-count":31,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,4,1]]},"abstract":"<p>A Vehicular Ad-Hoc Network, or VANET, is a form of Mobile Ad-Hoc Network to provide communications among nearby vehicles and between vehicles and nearby fixed equipments. Security has become a prime concern in providing communication between these vehicles. Unlike wired networks, the characteristics of Vehicular Ad Hoc Networks (VANETs) pose a number of non-trivial challenges to security design. In this paper, the authors present a threshold security mechanism with a mobility based Clustering for Open Inter Vehicle Communication Networks (COIN). Nodes that have a similar moving pattern are grouped into a cluster, and unlike other clustering algorithms, it takes the moving pattern of the vehicles into consideration with the driver\u2019s intention. The stability of clusters is estimated based on relative mobility of cluster members. A threshold cryptographic scheme is employed on top of the clusters to protect routing information and data traffic. To ensure distributed trust in the clustered environment, the private key (k) is divided into n pieces in such a way that k is easily reconstructable from any p number of pieces.<\/p>","DOI":"10.4018\/jbdcn.2010040101","type":"journal-article","created":{"date-parts":[[2010,7,1]],"date-time":"2010-07-01T01:09:52Z","timestamp":1277946592000},"page":"1-18","source":"Crossref","is-referenced-by-count":2,"title":["Distributed Trust Based Authentication Scheme in a Clustered Environment Using Threshold Cryptography for Vehicular Ad Hoc Network"],"prefix":"10.4018","volume":"6","author":[{"given":"S.","family":"Sivagurunathan","sequence":"first","affiliation":[{"name":"Thiagarajar College of Engineering, India"}]},{"given":"V.","family":"Mohan","sequence":"additional","affiliation":[{"name":"Thiagarajar College of Engineering, India"}]},{"given":"P.","family":"Subathra","sequence":"additional","affiliation":[{"name":"Thiagarajar College of Engineering, India"}]}],"member":"2432","reference":[{"key":"jbdcn.2010040101-0","author":"A.Aho","year":"1974","journal-title":"The Design and Analysis of Computer AIgorithms"},{"key":"jbdcn.2010040101-1","doi-asserted-by":"crossref","unstructured":"Aslam, B., & Zou, C. (2009). Distributed Certificate and Application Architecture for Vanets.","DOI":"10.1109\/MILCOM.2009.5379867"},{"key":"jbdcn.2010040101-2","doi-asserted-by":"crossref","unstructured":"Basu, P., Khan, N., & Little, T. D. C. (2001). A mobility based metric for clustering in mobile ad hoc networks. In Proceedings of IEEE ICDCS 2001 workshop on wireless networks and mobile computing, Phoenix, AZ (pp. 13-418).","DOI":"10.1109\/CDCS.2001.918738"},{"key":"jbdcn.2010040101-3","doi-asserted-by":"crossref","unstructured":"Bellare, M., Shi, H., & Zhang, C. (2005). Foundations of Group Signatures: The Case of Dynamic Groups. In A. Menezes (Ed.), Topics in Cryptography \u2013 CT-RSA Proceedings (LNCS 3376).","DOI":"10.1007\/978-3-540-30574-3_11"},{"issue":"11","key":"jbdcn.2010040101-4","first-page":"150","article-title":"Mobility management in IVC Networks.","volume":"9","author":"J.Blum","year":"2003","journal-title":"Proceedings of the IEEE"},{"key":"jbdcn.2010040101-5","first-page":"168","article-title":"Group signatures with verifier- local revocation. In","volume":"04","author":"D.Boneh","year":"2004","journal-title":"Proceedings of CCS"},{"key":"jbdcn.2010040101-6","doi-asserted-by":"crossref","unstructured":"Calandriello, G., Papadimitratos, P., Hubaux, J.-P., & Lioy, A. (2007). Efficient and robust pseudonymous authentication in VANET. In Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks.","DOI":"10.1145\/1287748.1287752"},{"issue":"4","key":"jbdcn.2010040101-7","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1002\/ett.4460050407","article-title":"Threshold Cryptography.","volume":"5","author":"Y.Desmedt","year":"1994","journal-title":"European Transactions on Telecommunictions"},{"key":"jbdcn.2010040101-8","doi-asserted-by":"crossref","unstructured":"Desmedt, Y., & Frankel, Y. (1990). Threshold Crypto System. In Advances in Cryptology-Crypto\u201989, 9th annual International Cryptology Conference (pp. 307-315). Berlin: Springer.","DOI":"10.1007\/0-387-34805-0_28"},{"key":"jbdcn.2010040101-9","unstructured":"Fonseca, E., & Festag, A. (2006). A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS (NEC Tech. Rep. NLE-PR-2006-19). NEC Network Laboratories."},{"key":"jbdcn.2010040101-10","first-page":"354","article-title":"Robust threshold DSS signatures","author":"M.Gannaro","year":"1996","journal-title":"Advances in Cryptology-Eurococrypt\u201996"},{"key":"jbdcn.2010040101-11","unstructured":"Gerlach, M., Festag, A., Leinmuller, T., Goldacker, G., & Harsch, C. (2005). Security architecture for vehicular communications. Paper presented at WIT2005, Hamburg, Germany."},{"key":"jbdcn.2010040101-12","unstructured":"Gollan, L., & Meinel, C. (2002). Digital signatures for automobiles. In Proceedings of Systemics, Cybernetics and Informatics (SCI\u201902)."},{"key":"jbdcn.2010040101-13","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2004.26","article-title":"The security and privacy of smart vehicles.","volume":"3","author":"J. P.Hubaux","year":"2004","journal-title":"IEEE Security and Privacy Magazine"},{"key":"jbdcn.2010040101-14","doi-asserted-by":"crossref","unstructured":"Jane, Y., Peter, H. J., & Chong. (2005). A survey of clustering schemes for mobile ad hoc networks. IEEE Communications Survey & Tutorial, 7(1).","DOI":"10.1109\/COMST.2005.1423333"},{"key":"jbdcn.2010040101-15","volume":"Vol. 2","author":"D.Knuth","year":"1969","journal-title":"Semi numerical Algorithms"},{"key":"jbdcn.2010040101-16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.01.018"},{"key":"jbdcn.2010040101-17","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011478628358"},{"key":"jbdcn.2010040101-18","doi-asserted-by":"publisher","DOI":"10.1109\/49.622910"},{"key":"jbdcn.2010040101-19","doi-asserted-by":"publisher","DOI":"10.1109\/49.780353"},{"key":"jbdcn.2010040101-20","first-page":"443","article-title":"Proceedings of the 53 Internet Engineering Task Force Networks.","volume":"9","author":"J.Munoz","year":"2002","journal-title":"Wireless Networks"},{"key":"jbdcn.2010040101-21","unstructured":"Papadimitratos, P., & Haas, Z. J. (2002). Secure Routing for Mobile Ad Hoc Networks. Paper presented at the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX."},{"key":"jbdcn.2010040101-22","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1142\/9789814271097_0009","article-title":"Reliable Traffic Information Propagation in Vehicular Ad hoc Networks","author":"S.Park","year":"2009","journal-title":"Security in Ad-hoc and Sensor Networks"},{"key":"jbdcn.2010040101-23","unstructured":"Parno, B., & Perrig, A. (2005). Challenges in Securing Vehicular Networks. In Proceedings of ACM Workshop on Hot Topics in Networks (HotNets-IV)."},{"key":"jbdcn.2010040101-24","author":"K.Petty","year":"1994","journal-title":"Freeway Service Patrol (FSP) 1.1: The Analysis Software for the FSP Project (California PATH Research Rep. UCB-ITS-PRR-95-20). Berkeley, CA: Institute of Transportation Studies"},{"key":"jbdcn.2010040101-25","unstructured":"Plobi, K., Nowey, T., & Mletzko, C. (2006, April 20-22). Towards a Security Architecture for Vehicular Ad Hoc Networks. Availability, Reliability and Security. In Proceedings of the First International Conference on Availability, Reliability and Security (pp. 374-381)."},{"key":"jbdcn.2010040101-26","unstructured":"Sampigethaya, K., Huang, L., Li, M., Poovendran, R., Matsuura, K., & Sezaki, K. (2005). CARAVAN: Providing location privacy for VANET. In Proceedings of the Workshop on Embedded Security in Cars (escar\u201905)."},{"key":"jbdcn.2010040101-27","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"jbdcn.2010040101-28","unstructured":"Suzuki, C. S., & Nakada, K. (1991). An Authentication Technique Based on Distributed Security Management for the Global Mobility Network. In Proceedings of the Symposium on Security and Privacy. Washington, DC: IEEE Computer Society Press."},{"issue":"1","key":"jbdcn.2010040101-29","article-title":"Security in mobile Ad-Hoc networks- Challenges and Solutions.","volume":"11","author":"H.Yang","year":"2004","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"jbdcn.2010040101-30","doi-asserted-by":"crossref","unstructured":"Zhou, X., Yang, X., Wei, P., & Hu, Y. (2007). Dynamic Group Signature with Forward Security and Its Application. In Proceedings of the Sixth International Conference on Grid and Cooperative Computing (pp. 473-480).","DOI":"10.1109\/GCC.2007.63"}],"container-title":["International Journal of Business Data Communications and Networking"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=44999","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T17:53:11Z","timestamp":1654105991000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jbdcn.2010040101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2010,4,1]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jbdcn.2010040101","relation":{},"ISSN":["1548-0631","1548-064X"],"issn-type":[{"value":"1548-0631","type":"print"},{"value":"1548-064X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,4,1]]}}}