scholarly journals Security Measures with Enhanced Behavior Processing and Footprint Algorithm against Sybil and Bogus Attacks in Vehicular Ad Hoc Network

Sensors ◽  
2021 ◽  
Vol 21 (10) ◽  
pp. 3538
Author(s):  
Krzysztof Stępień ◽  
Aneta Poniszewska-Marańda

Vehicular ad hoc networks (VANETs) are created according to the principles of ad hoc mobile networks (MANETs), i.e., spontaneous creation of a wireless network for vehicle-to-vehicle (V2V) communication. Each vehicle in this network is treated as a node that is part of the mobile network. VANET turns all cooperating vehicles into a wireless router or node. This makes it possible to connect all cars within range to a stationary unit and create a wide network with a huge range. VANET is widely used for better traffic management, vehicle-to-vehicle communication, and road information provision. The VANET network is exposed to identity and information attacks, concealing or delaying data transmission, or information theft. Therefore, there are multiple types of attack, such as Sybil or bogus, that might harm the whole network infrastructure. The consequences of the mentioned two attacks could lead not only to the given infrastructure but could cause hammering people’s lives. In this paper, we analyze the ongoing methods for preserving Sybil and bogus attacks in a VANET network together with the authors’ methods: the Bogus & Sybil Trust Level & Timestamp (B&STL&T) algorithm and the Bogus & Sybil Enhanced Behavior Processing & Footprint (B&SEBP&F) algorithm. The first algorithm, the Bogus & Sybil Trust Level & Timestamp (B&STL&T) algorithm was improved into the Bogus & Sybil Enhanced Behavior Processing & Footprint (B&SEBP&F), presented in the paper. The proposed methods were tested with multiple scenarios using different variations of bogus and Sybil attack and various attacker–victim node number ratios. During analysis, it was observed that detection of all attackers in the network was reduced by approximately 30% in comparison to previous work and that of other cited authors.

Author(s):  
Mamata Rath ◽  
Bibudhendu Pati ◽  
Jhum Swain

With faster expansion of mobile networks and quicker increment of web clients, more individuals approach worldwide data and communication innovation, because of which the issues of utilizing web as a worldwide stage and empowering the savvy protests and machines to coordinate, discuss, register, and ascertain slowly develops. In mobile ad-hoc networks (MANETs) and vehicular ad-hoc networks (VANET), the mobile stations and vehicles are self-reconfigurable as per the difference in network topology. Joint action between convenient centers is more basic because of the way that they confront significant difficulties, for example, frailty to work securely while protecting its advantages and performing secure guiding among center points. In the presence of vindictive hubs, one of the rule challenges in MANET is to plot ground-breaking security course of action that can shield MANET from different routing assaults.


2013 ◽  
pp. 354-375
Author(s):  
Md. Imrul Hassan ◽  
Hai L. Vu ◽  
Taka Sakurai

It is envisaged that supporting vehicle-to-vehicle and vehicle-to-infrastructure communications with a Vehicular Ad-Hoc Network (VANET) can improve road safety and increase transportation efficiency. Among the candidate applications of VANETs, cooperative collision avoidance (CCA) has attracted considerable interest as it can significantly improve road safety. Due to the ad hoc nature of these highly dynamic networks, no central coordination or handshaking protocol can be assumed and safety applications must broadcast information of interest to many surrounding cars by sharing a single channel in a distributed manner. This gives rise to one of the key challenges in vehicle-to-vehicle communication systems, namely, the development of an efficient and reliable medium access control (MAC) protocol for CCA. In this chapter, we provide an overview of proposed MAC protocols for VANETs and describe current standardization activities. We then focus on the performance of the IEEE 802.11 carrier sense multiple access (CSMA) based MAC protocol that is being standardized by the IEEE standards body for VANET applications. In particular, we review prominent existing analytical models and study their advantages, disadvantages and their suitability for performance evaluation of the MAC protocol for VANETs. After a discussion of the shortcomings of these models, we develop a new analytical model in the second half of the chapter. Explicit expressions are derived for the mean and standard deviation of the packet delay, as well as for the packet delivery ratio (PDR) at the MAC layer in an unsaturated network formed by moving vehicles on a highway. We validate the analytical results using extensive simulations and show that good accuracy can be achieved with the proposed model for a range of topologies and traffic load conditions. More importantly, using the model, we show that hidden terminals can have a severe, detrimental impact on the PDR, which may compromise the reliability required for safety applications.


Author(s):  
Phan Cong-Vinh

In mobile environments (MEs) such as vehicular ad hoc networks (VANETs), mobile ad hoc networks (MANETs), wireless sensor networks (WSNs), and so on, formal specification of self-configuring P2P networking (SPN) emerges as a need for programming, and verifying such mobile networks. Moreover, well-specified SPN in MEs becomes a requirement of developing middleware for the mobile networks. The chapter is a reference material for readers who already have a basic understanding of the MEs for their applications and are now ready to know how to specify and verify formally aspect-oriented self-configuring P2P networking (ASPN) in MEs using categorical language, assured that their computing needs are handled correctly and efficiently. ASPN in MEs is presented in a straightforward fashion by discussing in detail the necessary components and briefly touching on the more advanced components. Several explanatory notes and examples are represented throughout the chapter as a moderation of the formal descriptions. Significant properties of ASPN in MEs, which emerge from the specification, create the firm criteria for verification.


Author(s):  
Jie Zhang

An increasingly large number of cars are being equipped with GPS and Wi-Fi devices, forming vehicular ad-hoc networks (VANETs) and enabling vehicle to vehicle communication with the goal of providing increased passenger and road safety. However, dishonest peers (vehicles) in a VANET may send out false information to maximize their own utility. Given the dire consequences of acting on false information in this context, there is a serious need to establish trust among peers. This article first discusses the challenges for trust management caused by the important characteristics of VANET environments, and identifies desired properties that effective trust management should incorporate in order to address the challenges. The author then surveys and evaluates existing trust models in VANETs, and points out that none of the trust models has achieved all the properties. Finally, the author proposes some important future directions for research towards effective trust management for VANETs.


10.29007/j6h1 ◽  
2020 ◽  
Author(s):  
Aakanksha Rastogi ◽  
Kendall Nygard

Autonomous vehicles or self-driving cars emerged with a promise to deliver a driving experience that is safe, secure, law-abiding, alleviates traffic congestion and reduces traffic accidents. These self-driving cars predominantly rely on wireless technology, vehicular ad-hoc networks (VANETs) and Vehicle to Vehicle (V2V) networks, Road Side Units (RSUs), Millimeter Wave radars, light detection and ranging (LiDAR), sensors and cameras, etc. Since these vehicles are so dexterous and equipped with such advanced driver assistance technological features, their dexterity invites threats, vulnerabilities and hacking attacks. This paper aims to understand and study the technology behind these self-driving cars and explore, identify and address popular threats, vulnerabilities and hacking attacks to which these cars are prone. This paper also establishes a relationship between these threats, trust and reliability. An analysis of the alert systems in self-driving cars is also presented.


2012 ◽  
Vol 8 (2) ◽  
pp. 153-172 ◽  
Author(s):  
Hajar Mousannif ◽  
Ismail Khalil ◽  
Stephan Olariu

The past decade has witnessed the emergence of Vehicular Ad-hoc Networks (VANET), specializing from the well-known Mobile Ad Hoc Networks (MANET) to Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) wireless communications. While the original motivation for Vehicular Networks was to promote traffic safety, recently it has become increasingly obvious that Vehicular Networks open new vistas for Internet access, providing weather or road condition, parking availability, distributed gaming, and advertisement. In previous papers [27,28], we introduced Cooperation as a Service (CaaS); a new service-oriented solution which enables improved and new services for the road users and an optimized use of the road network through vehicle's cooperation and vehicle-to-vehicle communications. The current paper is an extension of the first ones; it describes an improved version of CaaS and provides its full implementation details and simulation results. CaaS structures the network into clusters, and uses Content Based Routing (CBR) for intra-cluster communications and DTN (Delay–and disruption-Tolerant Network) routing for inter-cluster communications. To show the feasibility of our approach, we implemented and tested CaaS using Opnet modeler software package. Simulation results prove the correctness of our protocol and indicate that CaaS achieves higher performance as compared to an Epidemic approach.


The Vehicular Ad-hoc network, or VANET, is for sharing of emergency and safety information among vehicles to ensure safe travelling of users in road. It is the technology that considers moving cars as nodes to create a mobile network. VANET turns every participating car into wireless router or node, allowing cars to establish communication. Vehicles can communicate within themselves (V2V) and also with the road side units (V2I). Vehicles communicating with other vehicles are likely to enhance the driving experience, awareness, situation perception and thus safety. In response to the problem of drastically increasing road accidents and climatic disasters like smoke, fog etc., we have designed and tested in various traffic scenarios of Kathipara(area in Chennai Tamilnadu), T.Nagar(area in Chennai, Tamilnadu), highway and a village . Each scenario is very different from each other; like Kathipara having moderate real time traffic, T.Nagar having extensive dense traffic, highways with irregular traffic and villages which having very few vehicles for most time. We designed the placement of RSUs(Road Side Units) in each scenario and we analyzed the delay and packet delivery ratios(PDR) in each scenario. These results would guarantee the use of VANET in real time. Yet another traffic scenario we have considered is what happens in marine environment. Unintentional International border crossing by fishermen and hardships encountered by fishermen due to extreme weather conditions are the motivation behind our conceptualizing a network for communication among boats which can be called a BANET (Boat Adhoc Vehicular Network)


Sign in / Sign up

Export Citation Format

Share Document