scholarly journals Security Guarantee for Vehicular Message Transmission Based on Dynamic Social Attributes

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Lishui Chen ◽  
Jing Wang ◽  
Xing Chen ◽  
Yifu Zhang

Effective message forwarding between vehicles can reduce the occurrence of traffic accidents and improve the driving experience. Vehicle clustering can improve message utilization, but attackers in the network pose a serious threat to message forwarding. Based on vehicle clustering, we propose a message forwarding strategy for Vehicular Ad hoc Network. Specifically, the vehicles are clustered based on their directions and speeds. Besides, the friendship of vehicles is evaluated in terms of the interaction friendship and reference friendship. Based on the friendship of vehicles, the optimal vehicle can be selected as the cluster head. Thereafter, the double key technology is designed to encrypt vehicular messages such that the messages can be forwarded more safely and efficiently. The analysis results show that the proposed strategy can effectively improve the message delivery rate, reduce the message leakage rate, and improve the network performance.

Author(s):  
A. Aranganathan ◽  
C.D. Suriyakala

Mobile Ad-hoc Network is a non-secure wireless network which has no infrastructure, dynamical topology in which the nodes can move anywhere, may join or leave the network through multi-hop communication. In cluster network, all the nodes can select one Cluster Head for transmission of data to another Cluster Head through gateways which is mainly used for saving energy of each node. Intelligent agents are used for collecting secure data from neighboring nodes and inform to the trusted agent in clustered networks. Security plays major role in wireless medium. Detecting malicious node is also causing a major concern to damage the data packets. To avoid this problem of entering malicious node in networks and non-secured data, agents based trusted revocation in clustering mobile ad-hoc network for improving security with Certificate Authority to improve the network performance like high throughput, less latency time and improved certificate revocation time using ns2 simulators.


Author(s):  
A. Aranganathan ◽  
C. D. Suriyakala

Mobile Ad-hoc Network is a non-secure wireless network which has no infrastructure, dynamical topology in which the nodes can move anywhere, may join or leave the network through multi-hop communication. In cluster network, all the nodes can select one Cluster Head for transmission of data to another Cluster Head through gateways which is mainly used for saving energy of each node. Intelligent agents are used for collecting secure data from neighboring nodes and inform to the trusted agent in clustered networks. Security plays major role in wireless medium. Detecting malicious node is also causing a major concern to damage the data packets. To avoid this problem of entering malicious node in networks and non-secured data, agents based trusted revocation in clustering mobile ad-hoc network for improving security with Certificate Authority to improve the network performance like high throughput, less latency time and improved certificate revocation time using ns2 simulators.


Author(s):  
Atanu Mondal ◽  
Sulata Mitra

Background and Objective: The inter-vehicle communication is a potential issue for improving road safety, detecting traffic accidents, etc. in vehicular ad hoc network. The communication among the vehicles in VANET must be protected from the dissemination of message by unauthorized vehicles and the alteration of the message by misbehaving vehicles. Methods: In this paper, a low overhead digital watermark based vehicle revocation scheme is proposed. The sender vehicle generates a message and a random number after observing an event. It generates a deformed version of the generated message and message digest, and concatenates them. The watermark bits are generated by the sender vehicle from its unique identification and the random number. The sender vehicle embeds the watermark bits in the concatenated form of the message digest and deformed version of the generated message, and broadcasts the embedded message for its neighbours. The neighbour vehicles extract the required information from the received embedded message to verify the authentication of the sender vehicle and to identify whether the sender vehicle is an alteration attacker. It revokes unauthentic vehicles and vehicles that are identified as alteration attacker from vehicular ad-hoc network without any dependency on the trusted third party. The cracking probability and cracking time are used to measure the robustness of the scheme. The cracking probability and cracking time are measured to set the design guideline regarding the size of the watermark. The qualitative performance of the scheme is measured in terms of storage, communication and computation overhead. The significant reduction of all such overheads is observed by comparing the qualitative performance of the proposed scheme with two existing schemes. Conclusion and Results: Thus, the proposed scheme is a low overhead solution of securing vehicular ad hoc network. Performance of the scheme is also studied quantitatively in terms of the time of verifying vehicle authentication at the receiving end, delay in message dissemination at the sending end and delay in message reception at the receiving end. The quantitative performance is also compared with two of the existing schemes.


2013 ◽  
Vol 660 ◽  
pp. 184-189 ◽  
Author(s):  
Yan Zhai ◽  
Xing Wei ◽  
Lei Liu ◽  
Liao Yuan Wu

In order to tackle the data transmission bottlenecks of the gateway node in clustering Ad hoc Networks, the paper proposes a communication method. Firstly, DMAC (Distributed and Mobility-Adaptive Clustering) algorithm and Omni-directional antenna is well introduced and discussed. Then the ICMMDA (The Inter-cluster Communication Method based on Directional Antennas) policy building virtual channels between two hops away cluster-head and using directional antenna is brought about. Lastly, the simulation shows that the method can reduce the end-to-end delay between two clusters and improve the network throughput.


2020 ◽  
Vol 2 (1) ◽  
pp. 1
Author(s):  
Fauzan Prasetyo ◽  
Moh. Nazir Arifin ◽  
Agus Irmawan

The e-learning induction model that is well informed by the theory and practice is a sure way of being responsive to the dynamism of educational technologies. Common problem that must be taken as consideration and must be resolved in urban areas and the organization is an efficient message delivery in (MANET) Mobile Ad hoc Network. To get good and efficient communication, an algorithm must pay attention to several aspects such as the density of neighbouring node, shape and network size, channel priority level and used of message. Some previous studies attempted to propose solutions for delivering messages, but finding the optimal problem solution that will be use is very difficult.  In our research, we sugested an optimization on MANET by using an EA. The algorithm will provide several solutions to the problem of sending messages to MANET. Our goal is able to determine the optimal communication strategy for each node in network. By using (EA) evolutionary algorithm in  (n-2) network simulator, we found that result is promising for message delivery optimization to destination for using in system Elearning model networkKeywords: MANET, evolutionary algorithm, message delivery optimization.


2021 ◽  
pp. 143-149
Author(s):  
Le Quang Minh ◽  

Network security is an important problem, which attracts more attention because recent network attacks caused huge consequences such as data lose, reduce network performance and increase routing load. In this article, we show network attack forms in MANET and propose Multiple Signature Authenticate (MSA) mechanism using digital signature based on asymmetric encryption RSA. Moreover, we describe a new security routing protocol named AODV-MSA by integrating MSA into AODV. Using NS2 simulator system, we implement and examine the efficiency of the AODV-MSA protocol with the 32-bit keys.


2021 ◽  
Vol 17 (1) ◽  
pp. 60-70
Author(s):  
Vinoth Kumar V. ◽  
Ramamoorthy S. ◽  
Dhilip Kumar V. ◽  
Prabu M. ◽  
Balajee J. M.

In recent years, WiFi offloading provides a potential solution for improving ad hoc network performance along with cellular network. This paper reviews the different offloading techniques that are implemented in various applications. In disaster management applications, the cellular network is not optimal for existing case studies because the lack of infrastructure. MANET Wi-Fi offloading (MWO) is one of the potential solutions for offloading cellular traffic. This word combines the cellular network with mobile ad hoc network by implementing the technique of Wi-Fi offloading. Based on the applications requirements the offloading techniques implemented into mobile-to-mobile (M-M), mobile-to-cellular (M-C), mobile-to-AP (M-AP). It serves more reliability, congestion eliminated, increasing data rate, and high network performance. The authors also identified the issue while implementing the offloading techniques in network. Finally, this paper achieved the better performance results compared to existing approaches implemented in disaster management.


2008 ◽  
Vol 4 (3) ◽  
pp. 219-235 ◽  
Author(s):  
Arta Doci ◽  
Fatos Xhafa

Simulation is a common approach for designing ad hoc network applications, due to the slow deployment of these networks. The main building blocks of ad hoc network applications are the routing protocols, mobility, and traffic models. Several studies, which use synthetic models, show that mobility and traffic have a significant effect on protocol performance. Synthetic models do not realistically reflect the environment where the ad hoc networks will be deployed. In addition, mobility and traffic tools are designed independently of each other, however real trace data challenge that assumption. Indeed, recent protocol performance evaluation using real testbeds show that performance evaluations under real testbeds and simulations that use synthetic models differ significantly. In this paper we consider jointly both real mobility and traffic for protocol performance evaluation. The contributions of this work are as follows: (1) demonstrates that real mobility and traffic are interconnected; (2) announces the design and implementation of WIT –Wireless Integrated Traffic–, which includes the design of a real traffic generator; (3) shows that under real mobility and integrated traffic the performance metrics need to be re-thought, thus we propose availability as a new ad hoc network protocol performance metric; and, finally, (4) evaluates protocol performance under synthetic and real mobility models with integrated traffic. We believe that the results of our work constitute a step forward toward benchmarking of ad hoc network performance evaluations.


Sign in / Sign up

Export Citation Format

Share Document