scholarly journals High-Quality in Data Authentication Dodging Massive Attack in VANETS

Author(s):  
Munish Kumar ◽  
Maninder Kaur ◽  
Inderdeep Kaur

VANET plays an important role in the Security terms. VANET network is due to their unique features like as a high dynamic network (topology) and Mobility prediction. It attracts so much attention to the industry. VANET wireless networks are rapidly increased commercial and academic interests. Mobile connectivity, Traffic congestion management and road safety are some applications that have arisen within this network model. The routing protocol is a reactive type which means if there is data to be sent then the way will create. On-demand Distance Vector routing protocol is a generally used network topology based on rules for VANET. In surveyed of the routing protocol implemented a balance AODV method used for identifying the malicious nodes in the network. A balanced AODV routing method is defined with following characteristics:- (i) Use of threshold adaptive according to the network situations and balance index i.e node nature. (ii) Detect the malicious node in the network. (iii) Detection and prevention methods in real-time and independent on each vehicle node. In research paper, implement a B-AODV routing protocol and RSA method for detection and prevention the malicious node in the vehicular network. In this proposed algorithm, each vehicle node is employing balance index for acceptable and reject able REQ information’s (Bits). The consequences of the simulation tool in MATLAB (Matrix Laboratory) indicates BAODV and RSA method is used to detect and prevent the flood attach and loss of network bandwidth. Comparison between AODV, BAODV, RSA in normal phase defines B-AODV is exactly matched with AODV in the vehicular network and performance analysis overhead, an end to end delay and packet delivery rate.

2015 ◽  
Vol 77 (18) ◽  
Author(s):  
Aznida Hayati Zakaria ◽  
Md. Yazid Mohd Saman ◽  
Ahmad Shukri M Noor ◽  
Hasni Hassan

Mobile ad hoc network (MANET) is a group of mobile nodes establishing a wireless network without using centralized and fixed infrastructure.  In MANET, nodes may function as hosts and routers. The nodes can move freely and in arbitrary ways. The network topology in MANET is dynamic because of the frequent mobility of nodes, thus routing is challenging aspects in MANET.  Routing protocol plays a role in choosing and selecting the optimal route for transferring the packets of data from the source node to the destination node efficiently. Mostly the previous routing protocols are not practical to this dynamic network topology. Therefore designing an efficient routing protocol for this dynamic network is vital issue. In this paper, the author has proposed an approach, which selects shortest route for transferring the packets of data from source node to the destination node combining firefly algorithm and queuing network analysis. Firefly algorithm can be applied to find the shortest route in this routing problem. The response times taken to send packets of data can be calculated using the suggested queuing model. The result reveals that attractiveness of node in MANET decreases with the increasing value of response time.


2019 ◽  
Vol 8 (3) ◽  
pp. 6116-6120

A Mobile Adhoc Network (MANET) is a self-organized system comprised of multiple mobile wireless nodes. They do not require the existing network infrastructure. Autonomous telescopes can change freely and inadvertently in a network that can establish a dynamic network temporarily, and these networks can often change their appearance. Due to the openness in network topology and the absence of centralized administration in management, MANET is vulnerable to attacks from malicious nodes. Therefore, security is a major issue in MANET, which drastically reduces network performance. Several trust parameters such as packet delivery ratio, packet dropping ratio, etc are used for detecting the malicious node attack in MANET. Among these, this paper uses the energy as the trust parameter for detecting the malicious node. The energy reduction ratio differs from the normal node and attacker node in MANET. Hence, the main aim of this paper is to find the Normal Energy Reduction Ratio (NERR) and Attacker Energy Reduction Ratio (AERR). These two values are used for differentiating the normal node and attacker node in MANET. For routing, this paper uses the Dynamic Source Routing (DSR) Protocol.


Author(s):  
Sajad Nosratian ◽  
Masoud Moradkhani ◽  
Mohammad Bagher Tavakoli

This study manifests a fuzzy-based trust prediction model for detecting malicious nodes in wireless sensor networks (WSN) by preventing black hole attack. Besides, a new routing protocol based on the shortest path and trust to the path nodes is presented with a fuzzy estimator, which uses the data mining methods to detect the malicious nodes (black holes). In a black hole attack, a malicious node selects the RREP (Route Replay) message as the shortest path from the source node to the destination node. After that, the packet sent to the malicious node is not received by the network. Eventually, the malicious node releases the entire data packet instead of sending it to the destination node. Optimal path selection is performed according to different algorithms on the objective function and its results are observed for route selection. After defining the objective function, different algorithms such as Genetic Algorithm (GA) and teaching–learning-based optimization (TLBO) are utilized for routing. For each algorithm, the objective function for the most secure node is evaluated and simulated based on the parameters defined in fuzzy logic. Based on the simulation results under MATLAB software, TLBO algorithm has obtained the best response for path selection with the least cost for the target performance. Significantly, the proposed method is simple and based on the exchange of control packets between the sensor node and the base station. In accession, the results show that the proposed algorithms are effective in detecting and preventing black hole attacks.


2012 ◽  
Vol 8 (4) ◽  
pp. 110 ◽  
Author(s):  
Ruki Harwahyu ◽  
Boma A. Adhi ◽  
Harris Simaremare ◽  
Abdusy Syarif ◽  
Riri F. Sari ◽  
...  

A node in Mobile Ad-hoc Network (MANET) solely depends on neighbor nodes for its connectivity to the outer networks. It is completely different with fixed network connection where a central infrastructure is providing connectivity to the outside network for all mobile nodes there. This kind of situation makes MANET easier to build rather than fixed network with certain infrastructure. However, this nature of MANET makes it very vulnerable to various attacks, especially by nodes within the MANET that is called malicious nodes. This paper provides a preliminary result for MANET security enhancement based on AODV-UI routing protocol. In this work we implement an algorithm to detect and remove malicious nodes in AODV-UI routing protocol. We evaluate our work in different scenarios by varying the number of nodes, the number of malicious node, the sending rate of the node in concern, and the type of the attack i.e. route poisoning, black hole, packet spoofing. Our experiment shows that on average, an attack can be completely removed within 0.48 seconds in the worst case, with the traffic rate of 100 kbps, and 0.04 seconds in the best case, with the sending rate of 10 kbps.


A mobile ad hoc network is a dynamic network which can be established when there is no possibility or if it is practically impossible to establish a standard cellular infrastructure for communication. It is a form of decentralized wireless network where nodes are independent of each other and operate on their own. Every node is free to move in and out of the network as and when needed. This also introduces many concerns about security of data being forwarded through these nodes as there is no fixed dedicated mechanism to verify the authenticity of the nodes that join and leave the network at varied times. As MANET is a multi-hop network, data should be forwarded through many intermediate nodes, before it actually arrives at the intended destination. So data on transit through these intermediate nodes should be protected from any malicious nodes. Different protocols were proposed in literature that address the security concerns of routing considering varying parameters. This paper illustrates a hybrid routing protocol, SDSR Secure Dynamic Source Routing Protocol which takes the recommendations of neighbour nodes to judge about node’s authenticity and uses that information to calculate the trust value of a node. Using trust values of nodes, malicious nodes are identified and those nodes are excluded from data transmission path between the source and destination. The performance of SDSR is also evaluated in terms of efficiency parameters like Packet Delivery Ratio, Packet Loss, Communication Overhead, Throughput etc., and results are presented. This protocol can also be compared with existing routing protocols proposed for MANETS in terms of various quality of service parameters.


2012 ◽  
Vol 3 (2) ◽  
pp. 419-423
Author(s):  
JARUPULA RAJESHWAR ◽  
Dr G NARSIMHA

A freely moving nodes forming as group to communicate among themselves are called as Mobile AdHoc Networks (MANET). Many applications are choosing this MANET for effective commutation due to its flexible nature in forming a network. But due to its openness characteristics it is posing many security challenges. As it has highly dynamic network topology security for routing is playing a major role. We have very good routing protocols for route discovery as well as for transporting data packers but most of them lack the feature of security like AODV. In this paper we are studying the basic protocol AODV and identify how it can be made secure. We are studying a protocol S-AODV which is a security extension of AODV which is called Secure AODV (S-AODV) and we are studying enhanced version of S-AODV routing protocol a Adaptive Secure AODV (A-SAODV). Finally we have described about the parameter to be taken for performance evaluation of different secure routing protocols


2020 ◽  
Vol 53 (2) ◽  
pp. 1031-1036
Author(s):  
Guilherme A. Pimentel ◽  
Rafael de Vasconcelos ◽  
Aurélio Salton ◽  
Alexandre Bazanella

Sensors ◽  
2021 ◽  
Vol 21 (3) ◽  
pp. 955
Author(s):  
Zhiyuan Li ◽  
Ershuai Peng

With the development of smart vehicles and various vehicular applications, Vehicular Edge Computing (VEC) paradigm has attracted from academic and industry. Compared with the cloud computing platform, VEC has several new features, such as the higher network bandwidth and the lower transmission delay. Recently, vehicular computation-intensive task offloading has become a new research field for the vehicular edge computing networks. However, dynamic network topology and the bursty computation tasks offloading, which causes to the computation load unbalancing for the VEC networking. To solve this issue, this paper proposed an optimal control-based computing task scheduling algorithm. Then, we introduce software defined networking/OpenFlow framework to build a software-defined vehicular edge networking structure. The proposed algorithm can obtain global optimum results and achieve the load-balancing by the virtue of the global load status information. Besides, the proposed algorithm has strong adaptiveness in dynamic network environments by automatic parameter tuning. Experimental results show that the proposed algorithm can effectively improve the utilization of computation resources and meet the requirements of computation and transmission delay for various vehicular tasks.


Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 449
Author(s):  
Sifat Rezwan ◽  
Wooyeol Choi

Flying ad-hoc networks (FANET) are one of the most important branches of wireless ad-hoc networks, consisting of multiple unmanned air vehicles (UAVs) performing assigned tasks and communicating with each other. Nowadays FANETs are being used for commercial and civilian applications such as handling traffic congestion, remote data collection, remote sensing, network relaying, and delivering products. However, there are some major challenges, such as adaptive routing protocols, flight trajectory selection, energy limitations, charging, and autonomous deployment that need to be addressed in FANETs. Several researchers have been working for the last few years to resolve these problems. The main obstacles are the high mobility and unpredictable changes in the topology of FANETs. Hence, many researchers have introduced reinforcement learning (RL) algorithms in FANETs to overcome these shortcomings. In this study, we comprehensively surveyed and qualitatively compared the applications of RL in different scenarios of FANETs such as routing protocol, flight trajectory selection, relaying, and charging. We also discuss open research issues that can provide researchers with clear and direct insights for further research.


Sign in / Sign up

Export Citation Format

Share Document