Vehicular hundreds of milliseconds. A vehicle or an RSU

Vehicular Adhoc NETworks (VANETs) is made of discrete
roadside units (RSUs) and vehicles. The vehicles can send protection –
related messages similar to speed, location of the  vehicle, hazardous road conditions to any
close by vehicles and to the RSU and vice versa. In VANET,
each vehicle broadcasts a message to nearby vehicles
and RSUs every few hundreds of milliseconds. A
vehicle or an RSU may get hundreds of information in a short period.
If the communication cannot be processed in time, occurrence of
traffic jams and accidents is possible. Hence, it is critical to
devise security and privacy mechanisms that never lead to an unaffordable
reaction delay. As the wireless communication control is a shared medium,
exchanging information without any security protection over
the air can easily leak the information that users may want to
keep private. Pseudonym based schemes have been proposed to
preserve the location privacy of vehicles. However, these schemes
require the vehicles to store a huge amount of pseudonyms and
certifications and will not support some important secure
functionality such as authentication and integrity. Existing secure and privacy
– preserving protocols in VANETs are fast and does not depend on ideal tamper –
proof devices embedded in the vehicles. This is a major concern when it comes
to privacy. In this work, the anticipated protocol is based on a new multiple
trusted authority one-time identity based, frequency and
attribute – based aggregate signature technique. A vehicle is
able to verify many messages at the same instance and their signatures
can be compressed as a solitary unit. This minimizes the storage space required
by a vehicle or a data collector to a considerable extend. A practical
cooperative message authentication protocol is proposed to elevate the
verification burden, where each vehicle just wants to
verify a small quantity of messages. The particulars of likely attacks and
the equivalent solutions are also discussed. We further develop a
system methodical model for analyzing a variety of traffic
information and carry out NS2 simulations to inspect the
key sharing delay and missed detection ratio of harmful messages,
with the proposed key management framework.