scholarly journals Hash Based Co-Operative Method To Handle Sybil Attack Sequences In Vehicular Ad Hoc Networks

Vehicular without any preparation arrange (VANETs) being stretched out to depict kept up for traffic control systems, stay away from misfortune oriented_ information relations, stopping and information correspondence in remote structure structures. Protection and security are generally two _concerns in vehicular _ad hoc systems. Dreadfully, _VANET have absolute best _privacy safeguarding ways to deal with oversee fragile Sybil assaults, where a malignant client can be familiar and indicate with be different vehicles. VANETs by making hallucination organized traffic deter. So that in this paper, we propose and develop Hash based Co-operative and Cryptographic Approach to handle Sybil attacks. This approach consists statistical approach to identify and verify vehicle information (id, ip address and where it is from and other details) and develop HMAC (Hash based Message Authentication Codes) encryption approach to detect Sybil attacks from forgery oriented attack sequences. Finally based on US map data available in VANET basic security web site, we generate different simulations to evaluate efficiency and feasibility of proposed approach. Our schema supports Sybil attacks detection without any support of outside positioning environment. Our experimental results show efficient result communication over detection of Sybil attacks in wireless network communication.

Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1063
Author(s):  
L. Ellen Funderburg ◽  
Im-Yeong Lee

Vehicular ad hoc networks (VANETs) face two important and conflicting challenges with regards to security: preserve the privacy of vehicles in order to prevent malicious entities from tracking users and detect and remove bad actors that attempt to game the system for their own advantage. In particular, detecting Sybil attacks, in which one node attempts to appear as many, seemingly conflicts with the goal of privacy preservation, and existing schemes fail on either one or both accounts. To fill this gap, we present a hierarchical key management system which uses short group signatures to preserve member privacy at lower levels while allowing mid-level nodes to detect Sybil attacks and highly trusted nodes at the top of the hierarchy to completely reveal the real identities of malicious nodes in order to prevent them from rejoining the system and for use by legal authorities. In addition, we present an argument for relaxing the requirement of backward secrecy in VANET groups in the case when no malicious activity has been detected.


Author(s):  
Nirbhay Kumar Chaubey ◽  
Dhananjay Yadav

Vehicular ad hoc networks (VANETs) are a class of ad hoc networks in which vehicle communicate with each other to show the traffic situation and any mishappening on the road. VANET is vulnerable to a number of attacks due to its infrastructure-less nature. One of these attacks is the Sybil attack. Security of data dissemination in VANET is very crucial, otherwise any mishappening can occur on road. Sybil attack is very difficult to be defended and detected, especially when it is launched by some conspired attackers using their legitimate identities, and this has become a growing research interest in VANETs in past few years. This chapter studies various dimension of VANETs including its structure, communication architecture, security issues, and critical review of technique to detect Sybil attacks.


Electronics ◽  
2019 ◽  
Vol 8 (12) ◽  
pp. 1402 ◽  
Author(s):  
Zhen Cai ◽  
Zizhen Deng ◽  
Jinglei Li ◽  
Jinghan Zhang ◽  
Mangui Liang

The urban intersection signal decision-making in traditional control methods are mostly based on the vehicle information within an intersection area. The far vehicles that have not reached the intersection area are not taken into account, which results in incomplete information and even incorrectness in decision-making. This paper presents an intersection signal control mechanism assisted by far vehicle information. Using the aid of real-time information collection for far vehicles through vehicular ad hoc networks (VANETs), we can consider them together and calculate the accumulative waiting time for each intersection traffic flow at a future moment to make the optimal signal decision. Simulation results show that, under three different traffic flow environments—same even traffic flows, same uneven traffic flows, and different traffic flows—the two proposed implementation schemes based on the mechanism (fixed phase and period timing improvement scheme, and dynamic phase and period control scheme) show good performances, in which the average waiting time and the ratio of long-waiting vehicles are both less than the results of the traditional signal timing scheme. Especially, in the second scheme, the waiting time was reduced by an average of 38.6% and the ratio of long-waiting vehicles was reduced by an average of 7.67%.


2018 ◽  
Vol 7 (3) ◽  
pp. 37 ◽  
Author(s):  
Ricardo Mühlbauer ◽  
João Kleinschmidt

The establishment of trust in vehicular ad hoc networks (VANETs) will require the application of non-conventional measures of information security, such as reputation of the participants. The system proposed in this paper uses the concept of certified reputation, in which vehicles communicate providing digital certificates that include their own reputation level. The vehicles periodically come in contact with certification and traffic control authorities to update their reputation levels, which are determined by the validation of their behavior on the network. Decision-making mechanisms in the receiver vehicles are responsible for evaluating whether the messages are true or false, based on the reputation of the communication nodes. The quantitative analysis of simulated scenarios showed the combination of the central reputation scheme with an appropriate vehicular decision mechanism achieved a total of correct decisions superior than without reputation systems. Considering the constraints of a high mobile network, the proposed system is a feasible way to reduce the risk of anomalous or malicious behavior in a vehicular network.


Author(s):  
Ziyuan Wang ◽  
Lars Kulik ◽  
Kotagiri Ramamohanarao

Congestion is a major challenge in today’s road traffic. The primary cause is bottlenecks such as ramps leading onto highways, or lane blockage due to obstacles. In these situations, the road capacity reduces because several traffic streams merge to fewer streams. Another important factor is the non-coordinated driving behavior resulting from the lack of information or the intention to minimize the travel time of a single car. This chapter surveys traffic control strategies for optimizing traffic flow on highways, with a focus on more adaptive and flexible strategies facilitated by current advancements in sensor-enabled cars and vehicular ad hoc networks (VANETs). The authors investigate proactive merging strategies assuming that sensor-enabled cars can detect the distance to neighboring cars and communicate their velocity and acceleration among each other. Proactive merging strategies can significantly improve traffic flow by increasing it up to 100% and reduce the overall travel delay by 30%.


2008 ◽  
Author(s):  
Shang-Yeu Chang ◽  
Lin Yang ◽  
Jinhua Guo

Sign in / Sign up

Export Citation Format

Share Document