International Journal of Computer Applications® (IJCA) (0975 – 8887) National Seminar on Recent Advances in Wireless Networks and Communications, NWNC-2014 10 HAP: Hybrid Authentication Protocol for Vehicular Ad Hoc Network Manish Kumar Soni Research Scholar IET Alwar, Ashish Vashistha Dept. CSE IET Alwar, ABSTRACT In vehicular ad hoc networks clever traffic services are efficient if they are connected with method that supervise and create trust among service providers and vehicles. Consequently, the authentication of the providers of traffic condition information and the authorization of entity’s to admittance this information is crucial. Consequently it’s essential to extend a innovative security scheme for VANETs protocol. General Terms In this paper we proposed improves the security of location- based routing (LBR) protocols. This clarification can defy nearly each of the attacks, still those attacks which at present accessible security protocol can’t treaty among, such as the maliciously drop-packets-attack like black hole attack, a system is proposed to improve the security concert of LBR protocols.. This method has prove efficiency and has better security. Keywords VANETs; authentication, certificate status information, BR protocols. 1. INTRODUCTION On the other hand, intelligent traffic services are effective if they are associated with mechanisms that manage and establish trust between service providers and vehicles. In VANETs, they must be accompanied by efficient mechanisms for certificate revocation and validation. Thus it’s necessary to develop a new security scheme for VANETs protocol. Among all the routing protocols of VANETs, the protocols based on location are better than other category on network performance, and the algorism is simpler. A secure enhanced location-based protocol is proposed in this paper. It improves the security of location- based protocol. This solution can resist almost all of the attacks, even those attacks which currently existing security protocol can not deal with such maliciously drop packets attack like black hole. Furthermore, out-of-band attack like Since VANETs have great potential in improving the traffic condition and location -based protocol is popular in VANETs, a method is proposed to expand the security performances of location-based routing protocols. Like other security solutions, this scheme employs digital signature to guarantee the identity authentication, data integrity and no denial. The difference to most of other existed solutions is that an evaluation mechanism is proposed, which can detect malicious nodes that drop or tamper routing data. This mechanism has been proved efficiency and has better security and network performance by comparing with the hybrid signature routing scheme. In this paper we proposed improves the security of location-based routing (LBR) protocols. This clarification can defy nearly each of the attacks, still those attacks which at present accessible security protocol can’t treaty among, such as the maliciously drop-packets-attack like black hole attack, a system is proposed to improve the security concert of LBR protocols.. This method has prove efficiency and has better security. The paper is organized as follows. Section II reviews the related work. Section III approach authentication requirements. Section IV hybrid authentication protocol. Section V concludes the paper. II. RELATED WORK Through classify to authenticate security messages in vehicular ad hoc networks, plenty of methods have been proposed. Diminutive of the studies have addressed the problem of Subir Biswas, Jelena Misi c they present an anonymous authentication scheme for vehicular networks that provides conditional anonymity to collocated vehicles. A modified ECDSA mechanism utilizes the position information of vehicles operating together in close proximity for generation and verification of elliptic curve based signatures on safety and other application messages. This waives the requirement of a third party public-key certificate for message authentication in VANET. Their scheme provides a privacy- preserving, lightweight, secure and compatible instant authentication for vehicle-originated safety messages. Security analysis and simulation experiments justify the usefulness of our scheme .Yu-Chih Wei,Yi-Ming Chen Hwai- Ling Shan, in this paper, they propose a trust scheme which aims to thwart internal attackers in privacy enhanced VANETS. In the proposed scheme a secure broadcast authentication protocol and beacon-based trust management system are being employed to maintain the trustworthiness of vehicles. they adopt Dempster-Shafer Theory to incorporate trustworthiness of event message with vehicle trustworthiness from multiple vehicles. In order to ensure the reliability of the proposed scheme, they evaluate the performance under alteration and denial-of service attack models. The simulation results proposed system is highly resilient to adversary attacks no matter whether it is under fixed silent period (FSP) scheme or random silent period (RSP) location privacy enhancement scheme. Debasis Giri and Durbadal Chattaraj.The most important research challenge is the authentication of VANET messages with less communication as well as storage overhead. In this paper, they was introduce an infrastructure oriented (RSU-aided or road side unit aided) message authentication scheme named IOMAS with less communication and storage overhead compared to the previously published scheme. In the proposed scheme, an RSU takes the responsibility for verifying the incoming messages from vehicles and transmits the response back to the vehicles with less communication cost Raya et al. addressed the problem of conditional privacy in VANETs by using a