scholarly journals Malicious node identification routing and protection mechanism for VANET against various attack

2020 ◽  
Vol 20 ◽  
pp. 110-122
Author(s):  
Er. Ritika Saini ◽  
Harish Kundra

With the help of road side unit vehicles communicate among themselves. This technique termed as VANET. This network helps us to improve the safety and efficiency of the occupants during travelling in vehicles. The basic idea of this technique is to send information about the traffic information to the road side unit or other vehicles. These vehicles get safe from attacks and misuse of their private data. The objective of this paper to secure the communication among the vehicles and the road side unit. In this technique the communication mainly dependant on the safety of the road such as vehicles tracking, emergency situations and message monitoring. There are various attacks like Sybil and Gray hole attack are vulnerable to VANET. To protect from these attacks our technique provide malicious node identification mechanism that help us to provide better facility to send data to vehicles safely. To avoid these types of attacks, our propose technique include feature like key management system to prevent the communication among the vehicles. Our proposed system mostly focus on Bandwidth, packet loss and packet delivery ratio [12].

2018 ◽  
Vol 2 (1) ◽  
pp. 17-21 ◽  
Author(s):  
Ruchin Jain

As vehicle population has been increasing on a daily basis, this leads towards increased number of accidents. To overcome this issue, Vehicular Ad Hoc Network (VANET) has come up with lot of novel ideas such as vehicular communication, navigation and traffic controlling. In this study, the main focus is on congestion control at the intersections which result from unclear ahead. For this purpose, a city lane and intersection model has been proposed to manage vehicle mobility. It shows the actual vehicle to vehicle and vehicle to traffic infrastructure communication. The experiment was conducted using Network Simulator 2 (NS 2). The implementation required modelling the road side unit, traffic control unit, and on-board unit along the roadside. In the simulation, including traffic volume, the distance between two signals, end-to-end delay, packet delivery ratio, throughput and packet lost were taken into consideration. These parameters ensure efficient communication between the traffic signals. This results in improved congestion control and road safety, since the vehicles will be signalled not to enter the junction box and information about other vehicles.


Author(s):  
Aklilu Mandefro Messele

The Ants capability of working together and their way of message transmission makes us inspired especially their cooperation for their common goal and dropping down pheromones which used as a trail for themselves and for others. We would use Ants broadcasting method for drivers‟ cooperation and message forwarding. Therefore if there were any driver who couldn‟t broadcast any emergency message related to car accident like Ants done to locate the food source, could be considered as a selfish node and couldn‟t be rewarded as cooperatives do. The previous vehicle to vehicle communication or message forwarding schemes that was tried to motivate cooperative drivers used incentive methods in which it is not motivating all participant nodes and some of them used punishment methods. These types of methods are not effective to stimulate selfish drivers. We conducted the research using embedded traffic simulation in which it includes mobility and network simulation capabilities merged together and served as multi-functional software. From the tools falling into the embedded category is National Chiao Tung University network simulator (NCTUns) which provides a full range of network stack simulation tools. Watchdog was our selfishness detection method, in which the RSU controls whether nodes are cooperative or not because the (Road Side Unit) RSU knows where the nodes were located and in which path they are drive and what messages they broadcasted. The rewarding model we used is paying per packet. The payment principle is for each successfully transmitted unit-sized packet, each of N intermediate nodes should receive λ credits, whereas the service provider (SP) would pay λ ∗ N in total. The proposed solution was evaluated by the three performance metrics which are dropped packets, selfishness detection method and delivery ratio. Based on our experiments result the number of accident increased as the number of total nodes increased in the same simulation area. As the number of nodes participated on the area increases the probability of having an accident increases and the probability of stimulating selfish nodes increased using the same incentive method and amount because there is a probability of accident commit increases and the rewarding and acknowledgement messages also increases in which it can stimulate the selfish nodes.


2022 ◽  
Vol 13 (2) ◽  
pp. 1-14
Author(s):  
Ankit Temurnikar ◽  
Pushpneel Verma ◽  
Gaurav Dhiman

VANET (Vehicle Ad-hoc Network) is an emerging technology in today’s intelligent transport system. In VANET, there are many moving nodes which are called the vehicle running on the road. They communicate with each other to provide the information to driver regarding the road condition, traffic, weather and parking. VANET is a kind of network where moving nodes talk with each other with the help of equipment. There are various other things which also make complete to VANET like OBU (onboard unit), RSU (Road Aside Unit) and CA (Certificate authority). In this paper, a new PSO enable multi-hop technique is proposed which helps in VANET to Select the best route and find the stable cluster head and remove the malicious node from the network to avoid the false messaging. The false can be occurred when there is the malicious node in a network. Clustering is a technique for making a group of the same type node. This proposed work is based on PSO enable clustering and its importance in VANET. While using this approach in VANET, it has increased the 20% packet delivery ratio.


Electronics ◽  
2021 ◽  
Vol 10 (2) ◽  
pp. 193
Author(s):  
Mohamed Ben bezziane ◽  
Ahmed Korichi ◽  
Chaker Abdelaziz Kerrache ◽  
Mohamed el Amine Fekair

As a promising topic of research, Vehicular Cloud (VC) incorporates cloud computing and ad-hoc vehicular network (VANET). In VC, supplier vehicles provide their services to consumer vehicles in real-time. These services have a significant impact on the applications of internet access, storage and data. Due to the high-speed mobility of vehicles, users in consumer vehicles need a mechanism to discover services in their vicinity. Besides this, quality of service varies from one supplier vehicle to another; thus, consumer vehicles attempt to pick out the most appropriate services. In this paper, we propose a novel protocol named RSU-aided Cluster-based Vehicular Clouds protocol (RCVC), which constructs the VC using the Road Side Unit (RSU) directory and Cluster Head (CH) directory to make the resources of supplier vehicles more visible. While clusters of vehicles that move on the same road form a mobile cloud, the remaining vehicles form a different cloud on the road side unit. Furthermore, the consumption operation is achieved via the service selection method, which is managed by the CHs and RSUs based on a mathematical model to select the best services. Simulation results prove the effectiveness of our protocol in terms of service discovery and end-to-end delay, where we achieved service discovery and end-to-end delay of 3 × 10−3 s and 13 × 10−2 s, respectively. Moreover, we carried out an experimental comparison, revealing that the proposed method outperformed several states of the art protocols.


2021 ◽  
Vol 12 (4) ◽  
pp. 6-18
Author(s):  
Valerii Lakhno ◽  
Borys Husiev ◽  
Andrii Blozva ◽  
Andrii Sahun ◽  
Tetiana Osypova ◽  
...  

The article discusses some aspects of the design of a decision support system (DSS) module during the analysis of major accidents or emergencies in urban transport in large cities, megalopolises, as well as in Smart City. It is shown that the computational core of such a DSS can be based on the methods of cluster analysis (CA). It is shown that the implementation of even basic spacecraft algorithms in the computational core of the DSSS allows an iterative search for optimal solutions to prevent a large number of emergencies in urban transport by establishing characteristic signs of accidents and emergencies and measures of proximity between two objects. It is shown that such a toolkit as DSS can provide all interested parties with a scientifically grounded classification of multidimensional observations, which summarize the set of selected indicators and make it possible to identify internal connections between emergencies in urban transport. The DSS module for analyzing emergencies in urban transport is described. It has been found that to solve such a problem, it is possible to use the "weighted" Euclidean distance in the computational core of the DSS. It is this parameter that makes it possible to take into account the significance of each characteristic of emergency situations in urban transport, which, in turn, will contribute to obtaining reliable analysis results. It is shown that the spacecraft methods can also be in demand when, along with the analysis of emergency situations in urban transport, problems of designing and reconstructing the configurations of urban street-road networks are solved in parallel. This task, in particular, requires an analysis phase (not least using CA methods) in order to minimize unnecessary uncompensated costs in the event of errors in the road network. When solving such a problem, sections of the urban street and road network are analyzed in order to identify problem areas that need reconstruction or redevelopment. The use of CA methods in such conjugate problems is due to the absence of a priori hypotheses regarding the classes that will be obtained as a result.


Author(s):  
Yanhong Wang ◽  
Rui Jiang ◽  
Yu (Marco) Nie ◽  
Ziyou Gao

Previous studies have shown traffic oscillations can be induced by special network topology. In the simplest case, a network of two intersections connected by two parallel roads would produce oscillatory traffic, when the split of drivers between the two roads falls into certain range. To understand how traffic information may affect such oscillations, a subset of drivers is allowed to be “reactive” in this study; that is, their route choice varies according to information about prevailing traffic conditions on the roads. We show that, depending on the ratio of reactive drivers, the system displays six new decaying, periodic oscillatory, or stable patterns. All solutions are obtained analytically in closed form and validated by macroscopic traffic simulation. Of all the solutions discovered, only one both is stable and fully utilizes the road space between the two intersections, and hence it is more desirable than the other solutions. The findings reveal the link between information provision and topology-induced oscillations, which may help practitioners design strategies that contribute to mitigating the adverse impact of such oscillations.


Author(s):  
Jooin Lee ◽  
Hyeongcheol Lee

Intelligent Transportation System (ITS) is actively studied as the sensor and communication technology in the vehicle develops. The Intelligent Transportation System collects, processes, and provides information on the location, speed, and acceleration of the vehicles in the intersection. This paper proposes a fuel optimal route decision algorithm. The algorithm estimates traffic condition using information of vehicles acquired from several ITS intersections and determines the route that minimizes fuel consumption by reflecting the estimated traffic condition. Simplified fuel consumption models and road information (speed limit, average speed, etc.) are used to estimate the amount of fuel consumed when passing through the road. Dynamic Programming (DP) is used to determine the route that fuel consumption can be minimized. This algorithm has been verified in an intersection traffic model that reflects the actual traffic environment (Korea Daegu Technopolis) and the corresponding traffic model is modeled using AIMSUN.


2000 ◽  
Author(s):  
Martin Johansson ◽  
Mårten Pettersson

2016 ◽  
Vol 2016 ◽  
pp. 1-9 ◽  
Author(s):  
Jugminder Kaur ◽  
Sandeep S. Gill ◽  
Balwinder S. Dhaliwal

Security is always a major concern in wireless sensor networks (WSNs). Several trust based routing protocols are designed that play an important role in enhancing the performance of a wireless network. However they still have some disadvantages like limited energy resources, susceptibility to physical capture, and little protection against various attacks due to insecure wireless communication channels. This paper presents a secure trust based key management (STKF) routing framework that establishes a secure trustworthy route depending upon the present and past node to node interactions. This route is then updated by isolating the malicious or compromised nodes from the route, if any, and a dedicated link is created between every pair of nodes in the selected route with the help of “q” composite random key predistribution scheme (RKPS) to ensure data delivery from source to destination. The performance of trust aware secure routing framework (TSRF) is compared with the proposed routing scheme. The results indicate that STKF provides an effective mechanism for finding out a secure route with better trustworthiness than TSRF which avoids the data dropping, thereby increasing the data delivery ratio. Also the distance required to reach the destination in the proposed protocol is less hence effectively utilizing the resources.


2021 ◽  
Vol 3 (45) ◽  
pp. 20-20
Author(s):  
Alexander Saakian ◽  
◽  

Improving the efficiency of using tractor-transport units (tractor trains) in the central agricultural zone of the Amur Region is an economically important issue, especially relevant for small peasant farms. This is due to the fact that in such farms the area of fields occupied for the cultivation of agricultural crops is relatively small, while most of them belong to the category of slope lands. It was also found that during the periods of sowing and harvesting operations, traffic on agricultural roads is hampered by safety conditions due to regional climatic features, which include a large amount of precipitation. In this connection, the use of vehicles for the transportation of seed, fertilizers, plant protection products and other goods, and the export of crops in these conditions seems to be a rather complicated operation. It should be borne in mind that in many, the main energy means are wheeled tractors of class 1.4, and not cars of various cross-country ability, therefore, in order to increase the efficiency of the use of available mechanization means, it is necessary to use them for the transport of goods, and as part of multi-link tractor trains in particular. At the same time, when driving on on-farm field roads with a limited width, the turn of multi-link trains is difficult due to the failure of the second and subsequent aggregated trailers to comply with the safe transport corridor, since the second trailer, when turning, shifts to the center of the road and creates an emergency situation for oncoming traffic. In order to eliminate the identified shortcomings and create safe conditions for traffic, an automatic device was developed that allows you to shift the second trailer when turning from the center to the side of the passing traffic, thereby regulating the transport corridor and not creating emergency situations for oncoming traffic. The paper presents the results of experimental studies on the use of a transport unit consisting of a class 1.4 tractor and two 2PTS-4 trailers in the production modes of multi-link tractor trains. Keywords: TRACTOR, TURN, TURNING RADIUS, TRAILER, OFFSET, WIDTH OF THE TRANSPORT CORRIDOR, EFFICIENCY


Sign in / Sign up

Export Citation Format

Share Document