scholarly journals VANSec: Attack-Resistant VANET Security Algorithm in Terms of Trust Computation Error and Normalized Routing Overhead

2018 ◽  
Vol 2018 ◽  
pp. 1-17 ◽  
Author(s):  
Sheeraz Ahmed ◽  
Mujeeb Ur Rehman ◽  
Atif Ishtiaq ◽  
Sarmadullah Khan ◽  
Armughan Ali ◽  
...  

VANET is an application and subclass of MANETs, a quickly maturing, promising, and emerging technology these days. VANETs establish communication among vehicles (V2V) and roadside infrastructure (V2I). As vehicles move with high speed, hence environment and topology change with time. There is no optimum routing protocol which ensures full-pledge on-time delivery of data to destination nodes, and an absolutely optimum scheme design for flawless packet exchange is still a challenging task. In VANETs, accurate and on-time delivery of fundamental safety alert messages (FSAMs) is highly important to withstand against maliciously inserted security threats affectively. In this paper, we have presented a new security-aware routing technique called VANSec. The presented scheme is more immune and resistive against different kinds of attacks and thwarts malicious node penetration attempts to the entire network. It is basically based on trust management approach. The aim of the scheme is to identify malicious data and false nodes. The simulation results of VANSec are compared with already existing techniques called trust and LT in terms of trust computation error (TCE), end-to-end delay (EED), average link duration (ALD), and normalized routing overhead (NRO). In terms of TCE, VANSec is 11.6% and 7.3% efficient than LT and trust, respectively, while from EED comparison we found VANSec to be 57.6% more efficient than trust and 5.2% more efficient than LT. Similarly, in terms of ALD, VANSec provides 29.7% and 7.8% more stable link duration than trust and LT do, respectively, and in terms of NRO, VANSec protocol has 27.5% and 14% lesser load than that of trust and LT, respectively.

2021 ◽  
Author(s):  
Kamran Ahmad Awan ◽  
Ikram Ud Din ◽  
Ahmad Almogren ◽  
Hasan Ali Khattak ◽  
Joel J.P.C. Rodrigues

Abstract Internet of Things (IoT) is bringing revolution into today’s world where devices in our surroundings become smart and perform daily-life activities and operations with more precision. The architecture of IoT is heterogeneous as it provides autonomy to nodes that they can communicate among other nodes and can also exchange information at any period. Due to the heterogeneous environment, IoT faces numerous security and privacy challenges, and one of the most significant challenges is the identification of malicious and compromised nodes. In this article, we have proposed a Machine Learning-based trust management approach for edge nodes. The proposed approach is a lightweight process to evaluate trust because edge nodes cannot perform complex computations. To evaluate trust, the proposed mechanism utilizes the knowledge and experience component of trust where knowledge is further based on several parameters. To eliminate the triumphant execution of good and bad-mouthing attacks, the proposed approach utilizes edge clouds, i.e., local data centers, to collect recommendations to evaluate indirect and aggregated trust. The trustworthiness of nodes is ranked between a certain limit where only those that satisfy the threshold value can participate in the network. To validate the performance of a proposed approach we have performed an extensive simulation in comparison with the existing approaches and the result shows the effectiveness of the proposed approach against several potential attacks.


2010 ◽  
Vol 34-35 ◽  
pp. 1314-1318
Author(s):  
Xin Hua Wang ◽  
Shou Qiang Hu ◽  
Qian Yi Ya ◽  
Shu Wen Sun ◽  
Xiu Xia Cao

Structure and principle of a new kind of diphase opposition giant magnetostrictive self-sensing actuator (SSA for short) is introduced, for which a kind of double outputs high-precision NC stable voltage power is designed. With the method of combining with the hardware design and the software setting, the controllability and reliability of the actuator are greatly improved. And the whole design becomes more reasonable, which saves the cost and improves the practicability. In addition, based on the micro controller unit (MCU) with high-speed control, the scheme design of the real-time separation circuit for dynamic balance signal can effectively identify out and pick up the self-sensing signal which changes from foreign pressure feed back. Then the SSA real-time, dynamic and accurately control is realized. The experiment results show that the voltage power can high-speed and accurately output both output voltages with high current, and that the self-sensing signal decoupling circuit can isolate the self-sensing signals without distortion


Bauingenieur ◽  
2019 ◽  
Vol 94 (07-08) ◽  
pp. 255-265
Author(s):  
Thomas Herfs

Zusammenfassung Das britische Verkehrsministerium plant den Bau einer weiteren Hochgeschwindigkeitsstrecke mit einer Gesamtlänge von 230 km und einer möglichen Höchstgeschwindigkeit von 360 km/h. Die Phase 1 des High Speed Two (HS2) Projekts verbindet die Städte London und Birmingham und soll im Jahr 2026 betriebsbereit sein. Für die Vertragsvergabe der Hauptbauwerke ‚Main Works Civils‘ wurde die Trasse in sieben Lose eingeteilt und nach einem mehrjährigen Planfeststellungsverfahren im Jahr 2017 öffentlich ausgeschrieben. Das Design-Build-Vorhaben sieht für die Planungsphase (Stage 1) ein sogenanntes Early Contractor Involvement (ECI) vor, in dessen Rahmen Bauherr, bauausführende Firmen und Planer gemeinschaftlich einen Bauentwurf (Scheme Design) entwickeln und die Ausführung planen. HS2 beauftragte für die zwei südlichen Lose S1 und S2 mit einer Gesamtlänge von 25,8 km die Arbeitsgemeinschaft Skanska, Costain und Strabag (SCS JV). Beide Lose befinden sich im Ballungsraum von London und umfassen unter anderem den Bau von Tunneln mittels Schildvortrieb, in Spritzbeton- und Deckelbauweise sowie den Bau von Ventilationsschächten, Brücken und Kavernen. Am südlichen Ende der Eisenbahntrasse befindet sich das Vorfeld ‚Euston Approaches‘ des Londoner Bahnhofs Euston Station. Innerhalb dieses ersten Kilometers der Strecke plant HS2, eine Reihe von Ingenieurbauwerken direkt neben und unterhalb der historischen Eisenbahninfrastruktur bei laufendem Bahnbetrieb zu errichten. Dieser Artikel beschreibt die örtlichen Randbedingungen des komplexen Bauvorhabens und die daraus entstehenden Herausforderungen an den Entwurf und die Planung der oberflächennahen Kaverne, welche im Vorfeld als außergewöhnlich hohes Projektrisiko identifiziert wurde. Die Entwicklung des Scheme Designs wurde daher begleitet von Design Reviews, Design Checks und einer Technical Assurance. Das Projekt befindet sich zurzeit am Ende der Planungsphase.


Sensors ◽  
2020 ◽  
Vol 20 (21) ◽  
pp. 6174 ◽  
Author(s):  
Kamran Ahmad Awan ◽  
Ikram Ud Din ◽  
Ahmad Almogren ◽  
Hisham Almajed

Internet of Things (IoT) provides a diverse platform to automate things where smart agriculture is one of the most promising concepts in the field of Internet of Agriculture Things (IoAT). Due to the requirements of more processing power for computations and predictions, the concept of Cloud-based smart agriculture is proposed for autonomic systems. This is where digital innovation and technology helps to improve the quality of life in the area of urbanization expansion. For the integration of cloud in smart agriculture, the system is shown to have security and privacy challenges, and most significantly, the identification of malicious and compromised nodes along with a secure transmission of information between sensors, cloud, and base station (BS). The identification of malicious and compromised node among soil sensors communicating with the BS is a notable challenge in the BS to cloud communications. The trust management mechanism is proposed as one of the solutions providing a lightweight approach to identify these nodes. In this article, we have proposed a novel trust management mechanism to identify malicious and compromised nodes by utilizing trust parameters. The trust mechanism is an event-driven process that computes trust based on the pre-defined time interval and utilizes the previous trust degree to develop an absolute trust degree. The system also maintains the trust degree of a BS and cloud service providers using distinct approaches. We have also performed extensive simulations to evaluate the performance of the proposed mechanism against several potential attacks. In addition, this research helps to create friendlier environments and efficient agricultural productions for the migration of people to the cities.


2020 ◽  
Vol 137 ◽  
pp. 1-16 ◽  
Author(s):  
Mohammed Al-khafajiy ◽  
Thar Baker ◽  
Muhammad Asim ◽  
Zehua Guo ◽  
Rajiv Ranjan ◽  
...  

2014 ◽  
Vol 11 (1) ◽  
pp. 19-34
Author(s):  
Mark C. Duncan ◽  
Kenneth M. Hopkinson ◽  
Eric D. Trias ◽  
Jeffrey W. Humphries

Author(s):  
Gongjun Yan ◽  
Stephan Olariu ◽  
Shaharuddin Salleh

The key attribute that distinguishes Vehicular Ad hoc Networks (VANET) from Mobile Ad hoc Networks (MANET) is scale. While MANET networks involve up to one hundred nodes and are short lived, being deployed in support of special-purpose operations, VANET networks involve millions of vehicles on thousands of kilometers of highways and city streets. Being mission-driven, MANET mobility is inherently limited by the application at hand. In most MANET applications, mobility occurs at low speed. By contrast, VANET networks involve vehicles that move at high speed, often well beyond what is reasonable or legally stipulated. Given the scale of its mobility and number of actors involved, the topology of VANET is changing constantly and, as a result, both individual links and routing paths are inherently unstable. Motivated by this latter truism, the authors propose a probability model for link duration based on realistic vehicular dynamics and radio propagation assumptions. The paper illustrates how the proposed model can be incorporated in a routing protocol, which results in paths that are easier to construct and maintain. Extensive simulation results confirm that this probabilistic routing protocol results in more easily maintainable paths.


Sign in / Sign up

Export Citation Format

Share Document