Vehicular hundreds of milliseconds. A vehicle or an RSU

Vehicular Adhoc NETworks (VANETs) is made of discreteroadside units (RSUs) and vehicles. The vehicles can send protection –related messages similar to speed, location of the  vehicle, hazardous road conditions to anyclose by vehicles and to the RSU and vice versa. In VANET,each vehicle broadcasts a message to nearby vehiclesand RSUs every few hundreds of milliseconds. Avehicle or an RSU may get hundreds of information in a short period.

If the communication cannot be processed in time, occurrence oftraffic jams and accidents is possible. Hence, it is critical todevise security and privacy mechanisms that never lead to an unaffordablereaction delay. As the wireless communication control is a shared medium,exchanging information without any security protection overthe air can easily leak the information that users may want tokeep private. Pseudonym based schemes have been proposed topreserve the location privacy of vehicles.

However, these schemesrequire the vehicles to store a huge amount of pseudonyms andcertifications and will not support some important securefunctionality such as authentication and integrity. Existing secure and privacy– preserving protocols in VANETs are fast and does not depend on ideal tamper –proof devices embedded in the vehicles. This is a major concern when it comesto privacy. In this work, the anticipated protocol is based on a new multipletrusted authority one-time identity based, frequency andattribute – based aggregate signature technique. A vehicle isable to verify many messages at the same instance and their signaturescan be compressed as a solitary unit.

This minimizes the storage space requiredby a vehicle or a data collector to a considerable extend. A practicalcooperative message authentication protocol is proposed to elevate theverification burden, where each vehicle just wants toverify a small quantity of messages. The particulars of likely attacks andthe equivalent solutions are also discussed. We further develop asystem methodical model for analyzing a variety of trafficinformation and carry out NS2 simulations to inspect thekey sharing delay and missed detection ratio of harmful messages,with the proposed key management framework.