Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Network

— VANET is a self-organizing communication network that is created among the moving vehicles. VANET have recently become popular for research, with attention to advance the driving experience and road protection. VANET usually incorporate Trusted Authority (TA) that is meant to source online premium service to nodes in network. It is required to keep up the authentication and confidentiality of the messages transmitted between the TA and nodes. Hence the address security issues and challenges where TA classifies the VANET nodes into primary, secondary and unauthorized users. So therefore, in this project have proposed a dual authentication scheme to produce advanced security level to effectively that stops the unauthorized vehicle entering into VANET environment using smart card. Second, we tend to propose a Batch Level Signature (BLS) group key management theme with efficiency distributing a group key to different VANET nodes. From this project, must send the messages or some safety information from the Trusted authority to the primary user and then primary user to the secondary user with full of secured process.


INTRODUCTION
ITH the increasing number of vehicles on the streets, an increasing population of vehicle manufacturers are looking for value-added services for providing their customers with increased safety and information.Toward this goal, Vehicular Communication (VC) is likely to play a major role.VC involves the use of short-range radios in each vehicle, which would allow various vehicles to communicate with each other and with road-side infrastructure.These vehicles would then form an instantiation of ad hoc networks in vehicles, popularly known as Vehicular Ad Hoc Networks (VANET).VANET are envisioned to provide safety-related information, traffic management, and infotainment services.These are the major areas in which applications are likely to develop and find commercial deployment.The first two, that is, safety and traffic management, require real-time information, and this conveyed information can affect life or death decisions.Without security, a VANET system is vulnerable to a number of attacks such as propagation of false warning messages and suppression of actual warning messages, thereby causing accidents.This makes security a factor of paramount importance in building such networks.
However, many forms of attacks against VANET have emerged recently and alarmed the unsettling situation of these networks security.Being an implementation of Mobile Adhoc network (MANET), VANET inherit all the discovered and undiscovered security and privacy vulnerabilities related to MANET.Furthermore, VANET have a number of distinctive properties that could be also vulnerabilities for attackers to exploit.Those properties include the particular nature of communication in VANET.Connections in a VANET in particular and in any Wireless Ad hoc Network in general are based on node-to-node communications: every node is able to act as either a host inquiring data or a router forwarding data.
There are two types of nodes: (i) Road Side Units (RSUs) standing for fixed nodes provisioned along the route and (ii) On Board Unit (OBU) referring to mobile nodes (i.e., vehicles) equipped with some sort of radio interface that enables connecting to other nodes in wireless manner.It is worth mentioning that the speed of mobile nodes-vehicles in VANET may be much higher than in MANET.This reason makes VANET are very dynamic in nature.A number of nodes can communicate once as a group but can then rapidly change their own structure caused by leaving of a member or joining of another node.Therefore, it is expected that nodes are continuously "keeping in touch" with other nodes in the group to maintain the survival of the network.This aspect of VANETs seems to be very vulnerable and attacks can be unconsciously or intentionally performed to damage a part of or the total network.As mentioned above, VANET provide many added applications that are safety, entertainment, or infotainment oriented.Attacks to VANET may lead to catastrophic consequences such as the losses of lives in the case of traffic accident, losses of time or financial losses.

Towards Trusted Cloud Computing
Nuno Santos, Krishna P. Gummadi and Rodrigo Rodrigues propose Cloud computing infrastructures allow companies to cut expenses by outsourcing computation on-demand.However, clients of cloud computing services now have no means of verify the privacy and honesty of their data and addition.To address this trouble to recommend the plan of a trusted cloud computing platform (TCCP).TCCP enables Infrastructure as a Service (IaaS) provider such as Amazon EC2 to supply a closed box implementation situation that guarantees private carrying out of visitor virtual machines.
Trust cloud compute platform (TCCP) for ensure the privacy and truth of computations that are outsourced to IaaS consumers VM, guarantee that no cloud source advantaged manager can study or tamper with its contented.Moreover, before request the service to open a VM, the TCCP allows a consumer to constantly and distantly determine whether the service backend is operation a trust TCCP performance.This ability extends the view of evidence to the whole service, and thus allows a consumer to confirm if its calculation will run strongly.In the planned system, show how to influence the advance of trust compute technologies to plan the TCCP.

Seeding Clouds with Trust Anchors
Joshua Schiffman and his co-authors propose the document for the consumers protection dangerous data processing requirements are opening to push back strongly next to using cloud computing.Cloud vendor run their computation upon cloud supply VM systems, but consumers are concerned such host system may not be able to defend themselves from attack, ensure separation of consumer processing, or load consumer processing properly.To provide promise of data dispensation protection in clouds to consumers, user advocates method to get better cloud clearness using hardware-based evidence mechanisms.
The central organization of cloud data center is perfect for verification frameworks; enable the improvement of a realistic approach for consumers to trust in the cloud platform.specially, recommend a cloud verifier service that generate truth proof for clients to confirm the truth and access control enforcement ability of the cloud stage that shield the integrity of consumers request VMs in IaaS clouds.Though a cloud-wide verifier service could there an important system bottleneck, make obvious that aggregate proof enables important overhead reduction.As a consequence, simplicity of data protection can be verified at cloud-scale.
The major three challenge has been discuss are that cloud provider face when generate evidence that can pacify a user concerns: First that cloud seller supply a evidence of data security protection of their hosts and consumer processing; Second evidence have a clear connotation to cloud consumers; and Third proofs can be generate efficiently and professionally in a cloud computing situation.

III. RELATED WORK
Basically, an unprepared network is a collection of independent nodes which communicate with each other, the majority obviously through using a multi-hop Communication network.Users do not predictably identify each other and come mutually to form an unprepared network, only on behalf of some particular reason.Key distribution systems perform as a trusted third party (TTP) to proceed as intermediary connecting nodes of the network.A node has straight connection by way of a set of nodes, said to exist neighboring nodes, in an unprepared network which be in its communication range.The number of nodes in the network is not basic preset.At any time the new nodes connect the network, the older nodes be considered to exist un-functional [Aslam et al.,1].Key management within the unprepared network be a main drawback, in terms of security of the group communication.The three categories used for Group key management protocols be; centralized, decentralized, and distributed [Blanchet,2].
Cloud Computing has no programmed infrastructure such the same as base stations otherwise mobile switching centers (MSC).Wireless network plays a vital role within terms of communication; Mobile nodes are able to exist communicated directly by means of a Communication network through radio waves, anywhere because those far apart rely on other nodes to act as routers toward relay its messages [Dolev & Yao,3].The nearly everyone suitable solution toward provide the services among which authentication, data integrity in addition to data confidentiality is the establishment of a key management protocol.Traffic encryption key (TEK) be used for generation along with distribution of each and every one the members in a group.This key is mainly favored through the source to encrypt multicast data and the receivers to decrypt it.so legal members be able to only receive the multicast flow which is sent by the group source and additional members are not allowed toward receive the flow [Graf,4].The key synchronism, secrecy, freshness, independence, authentication, and confirmation forward plus backward secrecy are the elemental security services provided by each key management system [Michalas et al.,7;Lalitha & Kalaiselvi,12].
Cluster is eventually assumed to be group, while ECDH Group Key is an occurrence of collecting sub groups.Local controller (LC) is used to manage all sub-group, liable for local key management surrounded by its own cluster.Energy constitutes a leading concern in unprepared environments, moreover, not many solutions for multicast group ECDH Group Key do think about the energy problem to realize an efficient key distribution process [Garfinkel et

Existing System
In Existing system a Data distribution system model, there are manifold user protection that may encrypt according to their own ways, possibly using diverse sets of cryptographic keys.Leasing each user attain keys from each owner who's their central thought discussion regarding the impracticality of completely Homomorphism Encryption (FHE) alone for VM Cloud isolation.Their categorization hierarchy of VM Cloud Computing is not typical model and has few shortcomings as we would talk about duly.The system state the protection and isolation problem from a normal VM Cloud calculate explanation and converse the challenges complicated not just for FHE but also for a lot of other techniques, but this necessitate too much trust on a solitary authority (i.e., cause the key escrow trouble) [Lalitha & Kalaiselvi,10].Elliptical Curve Cryptography is an arrangement in which the keys wanted to decrypt encrypted data are detained in ECC so that, below convinced circumstances, an official third party may grow access to individuals' keys.These third parties may contain businesses, who may want access to workers private connections, or governments, who may hope to be intelligent to vision the contents of encrypted communications.

Drawbacks of Existing System
 Key information depends on federal key server. Computational and Communication cost is more. High in Memory usage and encryption key length. Data Transmission time and execution is high.

Proposed System
In this project work we use Elliptical Curve Diffie Hellman algorithm (ECDH) as a Proposed System attempt to learning the patient centric resolve the trouble of evaluate a purpose equally by several parties on their personal inputs protected sharing of file sharing in VM Cloud stored on semi-trusted servers, and focus on addressing the difficult and challenging key organization issues.It also no suppositions are made on computational resources obtainable with the parties.All the parties would take out same amount of work which is contrary to VM Cloud Computing setting [Karthikambal & Kalaiselvi,11].
To adapt these methods for an asymmetric setting like VM Cloud Computing where the server has huge quantity of calculate power relative to the users, In sort to protect the private health data stored on a semi-trusted server, we accept Diffie Hellman is improved than ECC as the main encryption primordial.
Precise inferior limits on hard computations, but difficulty theorists have had limited achievement in establishing lesser bounds in general, so instead we reason comparatively: we show that the hard calculation are at smallest amount as hard as resolve some trouble known or unspecified (usually the latter, for reasons to be explained in due course) to be hard.
The evidence system for making assertions about the complexity of one trouble on the source of another is called decrease "Using DH, access policies are expressed based on the attributes of users or data, which allow a enduring to selectively share her file distribution amongst a set of users by encrypting the file below a set of attributes, lacking the need to know a complete list of users.The complexities per encryption, key production and decryption are only linear with the number of attributes involved.

Advantages of Proposed System
 Key information does should be depend on VM Cloud centralized key server. Computational and Communication cost is less. More safe by Boolean logic minimization because session organization done by this concept. Low Memory Usage. High Throughput.

V. SYSTEM METHODOLOGY
A complete group key agreement solution obligation handle alteration to group secrets subsequent to all membership change act in the underlying group communication system.We distinguish between single and several member operations.Single member changes include member join or leave.Leave occurs when a component wants (or is forced) to leave a group.While there strength be different reasons for member leavesuch as voluntary leave, involuntary disconnect or forced expulsionwe believe that group key agreement be required to only provide the tools to adjust the Multiple associate changes can also be preservative and subtractive.We refer to the former process as group merge, in which case two or more collection merge into a single group.We refer to the latter as group divider, whereby a group is split into lesser groups.A group divider can take place for several reasons two of which are fairly common: 1. Network failurea network event causes detachment within the group.Consequently, a group is split addicted to fragments some of which are singletons while others (those that preserve mutual connectivity) are sub-groups.2. Explicit (application-driven) partition the application choose to split the group into multiple components or exclude multiple members at once.evenly, a group merge be moreover voluntary or involuntary: 1.
Network fault heala network event causes before severed network partitions to reconnect.so, groups on all sides (and there might be more than two sides) of an erstwhile divider are merged into a single group.

2.
Explicit (application-driven) unitethe request makes a decision to merge numerous pre-existing groups into a solitary group.(The case of simultaneous multiple-member addition is not covered.)

VI. RESULTS AND DISCUSSIONS
This part engages in a simulation to evaluate the future algorithm.The research has been conducted on the platform of individual computer with 1.5 GHz CPU and 1GB RAM.
The operating system is Windows 7, and simulation programs are executed in Java with Net beans 8.0.
The major purpose of our study is to decide whether there is any gap flanked by cryptographic protocol/scheme (in term of theoretical) and its manufacturing execution.Our scheme will be integrated with the protection factors with high opinion to the fact that resolve the proposed method is very difficult, and that the shared key (i.e. the secret) is never itself broadcast over the channel [Aruna Senbagam & Kalaiselvi, 14].
Our algorithm develops basic scientific thought making implementation simpler and in addition escaping from ordinary Attacks.Protection modify is useful in light of the fact that future Algorithm is the basis of a few protection standards and services on the internet, and if the protection.Diffie Hellman key trade approach for key sharing gives off an idea of being one of the preferential systems utilized as an element of practice today.The proposed routing protocol ECDH shows significant improvement over the existing energy efficient routing protocols like RSA, DSA in terms of end-to-end delay and network life time.

Formation of Routing
To evaluate the performance of our algorithm, we do the simulation using Net Beans (Java).A heterogeneous Cloud with 100 and 200 nodes arbitrarily dispersed in a meadow with dimensions 1000m× 1000m is calculated.
For ease, to believe the Receiver is situated in the center of the network.The collision caused by random factors such as signal collision and Communication channel interface in all simulation experiments, N was varied between 10 and 100 sensor nodes.
The nodes enthused arbitrarily in all probable instructions.To calculate the presentation of our methods, we recognize weights to sensor nodes, w1 = 0.3, w2 = 0.2, w3 = 0.2, w4 = 0.2 and w5 = 0.1.To estimate the presentation of the techniques, we implemented the broadcast variety on the normal number of sensor nodes and incomplete number of groups.
Packets of 1000 bytes each, are transferred between source and destination pairs for a simulation time of 150 seconds.The acknowledgment packet size is 40 bytes.All the sensor nodes in the network are deposit with an original power of 50 Joules.The power exhausted by a sensor node in broadcast of data is most of 0.38 Joules, in getting is 0.36 Joules.The nodes consume a least amount power of 0.003 Joules, when it is in idle state.The behavior of the network is observed for average End-to-End delay, maximum End-to-End delay and network lifetime.In these 50 nodes, 9 dissimilar sources to destination pair are arbitrarily selected for one-hop, two-hop, and more than two-hop infrastructure [Kalaiselvi & Aruna Senbagam,15].

VII. CONCLUSION AND FUTURE WORK
The Cloud computing as a technology would be accepted if the area of anxiety like protection of the data will be enclosed with full proof mechanism.The force of cloud computing is the aptitude to manage danger in exacting to safety issues.Our optional representation will present an outline sketch of building to be accept by architects concerned in execute the cloud computing.Protection algorithms state for encryption and decryption and ways future to access the multimedia content can be executed in prospect to improve protection framework over the network.
In this proposed work, Elliptical Curve Diffie Hellman algorithm (ECDH) is introduced to protect the private health data stored on a semi-trusted server.The client module is executed by using Java servers and a JFrame page.The user sends the data via JFrame page which then invokes the Client servlet.By using -Hellman Key conformity algorithm and the Data Encryption Standard the shared keys are computed.The java servlet is encrypt the data by using shared key and send it over to the server.By using URL Redirection the encrypted message are send from client to head waiter.The experimental results show that the proposed system achieves high performance compared with the existing system in terms of common end-to-end delay, maximum end-to-end delay and network lifetime.
The future system discovers our work by given that algorithm implementations and producing results to justify our concepts of protection for cloud computing.In order for this approach to work as future, the cloud service source have to co-operate with the user in execute solution.Some cloud service source base their business representation on the sale of user data to advertisers.These sources probably would not be willing to agree to the user to use their function in ways that conserve user privacy.
 To provide the level of security based on the importance of data, classification of data can be done.The classification scheme should consider various aspects like access frequency, update frequency and access by various entities etc. based on the type of data.Once the data is classified and tagged, then level of security associated with this specific tagged data element can be applied.Level of security includes confidentiality, encryption, integrity and storage etc. that are selected based on the type of data. Security considerations and provisions for virtualization along with the optimum use of the cloud infrastructure also need to be focused and addressed.
al., 5; Kamara & Papamanthou, 6].Cluster beginning generates group key which communicate to other members from side to side a secure and constrained channel with the purpose of uses public key cryptography [Santos et al., 9].Clusters can be used for achieving different targets [Paladi et al., 8].Clustering for transmission management, back formation, and for routing efficiency are several of ways for achieving different target.By outsiders plus rouge members, group key management can live opposed to a broad range of attacks.

Table using Fitness Calculation SWCA
The under tables from 6.1 to 6.7 demonstrate the procedure of creating the routing table at every one node these tables are construct by exchange of hello packets at the time of initialization of the network to attach active cluster head.The simulator used in analyzing the Cloud in this project is Java.This part provides imitation setup to demonstrate performance of Energy Efficient weighted clustered Routing in the Communication sensor networks.50 Communication sensor nodes are deployed randomly in a square area of 500m by 500 m, with uniform distribution.The packet generation rate is one packet per second.