CIAS

2018 ◽  
Vol 12 (1) ◽  
pp. 29-41 ◽  
Author(s):  
Arun Malik ◽  
Babita Pandey

Vehicular Ad hoc Network (VANET) is considered as an essential component of Intelligent Transport system. VANET has gained an ample amount of attention from the researchers and automobile industry. Security and privacy are the primary requirements in the successful deployment of vehicular communication in VANET. Lack of security and confidentiality in VANETs is the primary barricade in the successful deployment of VANET. To establish trust within the entities participating in VANET operations is the primary aim of VANET security and play a vital role in prevention of attack in VANET. This paper describes a comprehensive identity authentication scheme (CIAS) based on asymmetric encryption that facilitates the authentication for Vehicle-to-Infrastructure (V2I) and inter RSUs. The proposed scheme is validated by extensive simulations and compared with the related works on the basis of communication overhead (CO), Latency and packet delivery ratio (PDR). The result of simulations shows that proposed authentication scheme outperforms.

2021 ◽  
Author(s):  
Udayakumar Allimuthu ◽  
K Mahalakshmi

Abstract MANET (Mobile Ad-hoc Networks) are distributed or delegated away from a central server, authoritative location of wireless networks that communicate without pre-existing structure. Ad-hoc networks are compromising the many types of attacks and routing. In MANET, the routing plays a vital role in terms of packets interaction and data transmission. Due to decentralized control, the MANET data transmission becomes insecure because of dispersed routing on the mobile ad-hoc nodes. Since the efficient route on MANET only controls the packets and does not simplify the route between the source to the destination, the maintenance of route interaction becomes a crucial process. Maintain effective data transactions over the MANET network, and it is essential to improve the route and locate the attacker. Nevertheless, MANET allows for route interaction against security threads. In this research article, four processing schemes are suggested to preserve the security measures against routing protocols. Especially in node communication, the rushing attacker has a significant impact on packet-based data transmission in MANET. Also, for this research, an Attacker detection automation of the Bees Colony Optimization (ADABCP) method is used, as a result of which the desired result is brought about in the effective attacker detection on the routing process. Moreover, the proposed Hybrid Random Late Detection (HRLD) routing protocol manages the MANET routing and overcomes the MANET congestion communication. The Swift Implicit Response Round Trip Time (SIRT) mechanism is generated by the Route Finding Manipulation (RFM) to enhance the performance. This RFM scheme helps to find the optimal routing in a secured manner. The proposed (SIRT-ADABCP-HRLD) approach was compared to the existing ESCT, ZRDM-LFPM, and ENM-LAC approaches, found to have improved by routing and data transmission. Compared to the conventional method, the method mentioned above achieves a better ratio for the end-to-end delay, communication overhead, packet delivery ratio, network lifetime, and energy consumption.


2018 ◽  
Vol 8 (10) ◽  
pp. 1964 ◽  
Author(s):  
Qazi Ali ◽  
Naveed Ahmad ◽  
Abdul Malik ◽  
Gauhar Ali ◽  
Waheed Rehman

Intelligent transport system (ITS), owing to their potential to enhance road safety and improve traffic management, have attracted attention from automotive industries and academia in recent years. The underlying technology—i.e., vehicular ad-hoc networks (VANETs)—provide a means for vehicles to intelligently exchange messages regarding road and traffic conditions to enhance safety. The open nature of ITS as wireless communication technology leads to many security and privacy challenges. These challenges pertain to confidentiality, authentication, integrity, non-repudiation, location privacy, identity privacy, anonymity, certificate revocation, and certificate resolution. This article aims to propose a novel taxonomy of security and privacy issues and solutions in ITS. Furthermore, categorization of security and privacy schemes in ITS and their limitations are discussed with various parameters—scalability, privacy, computational cost, communication overhead, latency—and various types of security attacks has been analyzed. This article leverages new researchers for challenges and opportunities related to security and privacy in ITS.


2018 ◽  
Vol 2018 ◽  
pp. 1-15 ◽  
Author(s):  
Ahmer Khan Jadoon ◽  
Licheng Wang ◽  
Tong Li ◽  
Muhammad Azam Zia

A new integration of wireless communication technologies into the automobile industry has instigated a momentous research interest in the field of Vehicular Ad Hoc Network (VANET) security. Intelligent Transportation Systems (ITS) are set up, aiming to offer promising applications for efficient and safe communication for future automotive technology. Vehicular networks are unique in terms of characteristics, challenges, architecture, and applications. Consequently, security requirements related to vehicular networks are more complex as compared to mobile networks and conventional wireless networks. This article presents a survey about developments in vehicular networks from the perspective of lightweight cryptographic protocols and privacy preserving algorithms. Unique characteristics of vehicular networks are presented which make the embedded security applications computationally hard as well as memory constrained. The current study also deals with the fundamental security requirements, essential for vehicular communication. Furthermore, awareness of security threats and their cryptographic solutions in terms of future automotive industry are discussed. In addition, asymmetric, symmetric, and lightweight cryptographic solutions are summarized. These strategies can be enhanced or incorporated all in all to meet the security perquisites of future cars security.


2020 ◽  
Vol 14 ◽  
Author(s):  
S. Mahima ◽  
N. Rajendran

: Mobile ad hoc networks (MANET) hold a set of numerous mobile computing devices useful for communication with one another with no centralized control. Due to the inherent features of MANET such as dynamic topology, constrained on bandwidth, energy and computing resources, there is a need to design the routing protocols efficiently. Flooding is a directive for managing traffic since it makes use of only chosen nodes for transmitting data from one node to another. This paper intends to develop a new Cluster-Based Flooding using Fuzzy Logic Scheme (CBF2S). To construct clusters and choose proper cluster heads (CHs), thefuzzy logic approach is applied with the use of three parameters namely link quality, node mobility and node degree. The presented model considerably minimizes the number of retransmissions in the network. The presented model instructs the cluster members (CM) floods the packets inside a cluster called intra-cluster flooding and CHs floods the packets among the clusters called inter-cluster flooding. In addition, the gateway sends a packet to another gateway for minimizing unwanted data retransmissions when it comes under different CH. The presented CBF2S is simulated using NS2 tool under the presence of varying hop count. The CBF2S model exhibits maximum results over the other methods interms of overhead, communication overhead, traffic load, packet delivery ratio and the end to end delay.


2020 ◽  
Vol 17 (12) ◽  
pp. 5503-5508
Author(s):  
R. Rajasekar ◽  
P. Sivakumar

The increasing current advancement of digital technology is completely based on Internet of Things (IoT). The IoT is used to facilitate smart city traffic congestion through Vehicular Ad-Hoc Network (VANET). In the Smart city, multiplying the number of vehicles has brought focus on road safety precautions and communication between vehicles. It is a precise time to concentrate on the new advancement of modern applications and its related services towards the vehicular environments. The Manual traffic systems are not sufficient for the increasing modernization of the city. The VANET is a spontaneous Ad-Hoc network formed over vehicles wandering on the road. In this research work states that the overview of various IoT based routing methodologies and challenges towards the VANET routing through intelligent optimization. The Swarm based intelligent algorithms for Vehicular Ad-Hoc networks deals with latency, data throughput, data delivery cost and data delivery ratio of the intelligent system. Swarm intelligent algorithms are used for optimization of intelligent transport system. It is a collective behavioral system of nature inspired ant/bee activity.


Symmetry ◽  
2020 ◽  
Vol 12 (10) ◽  
pp. 1687 ◽  
Author(s):  
Mahmood A. Al-shareeda ◽  
Mohammed Anbar ◽  
Selvakumar Manickam ◽  
Iznan H. Hasbullah

The security and privacy issues in vehicular ad hoc networks (VANETs) are often addressed with schemes based on either public key infrastructure, group signature, or identity. However, none of these schemes appropriately address the efficient verification of multiple VANET messages in high-density traffic areas. Attackers could obtain sensitive information kept in a tamper-proof device (TPD) by using a side-channel attack. In this paper, we propose an identity-based conditional privacy-preserving authentication scheme that supports a batch verification process for the simultaneous verification of multiple messages by each node. Furthermore, to thwart side-channel attacks, vehicle information in the TPD is periodically and frequently updated. Finally, since the proposed scheme does not utilize the bilinear pairing operation or the Map-To-Point hash function, its performance outperforms other schemes, making it viable for large-scale VANETs deployment.


Author(s):  
S. Maharaja ◽  
R. Jeyalakshmi ◽  
A.V. Sabarish Kanna ◽  
M. Deva Priya

A Mobile Adhoc Network (MANET) is prone to attacks. Adversaries take hold of the network, thus degrading their performance. Various attacks are prevalent in MANET, out of which Byzantine attack plays a vital role. A node or group of nodes present in the routing path between the source and the destination may be compromised due to Byzantine attack. In this paper, Cohen Kappa Reliability Coefficient based Mitigation (CKRCM) mechanism is proposed to deal with these attacks. The intermediate nodes are monitored by their neighbors for a timestamp. If the monitoring node does not receive an acknowledgment, then the nodes are perceived to be attacked. The trustworthiness of the nodes is built by computing the trusts and reliabilities of the nodes. It is seen that the proposed scheme outperforms the existing scheme in terms of Throughput, Packet Delivery Ratio (PDR) and Packet Loss Ratio (PLR).


2021 ◽  
Vol 11 (2) ◽  
pp. 6979-6985
Author(s):  
A. K. Kazi ◽  
S. M. Khan

A Vehicular Ad-hoc Network (VANET) is a subclass of wireless ad-hoc networks, widely used in on-road vehicles and roadside equipment, having applications in various areas including passenger safety, smart traffic solutions, and connectivity on vehicles The VANET is the backbone of the Intelligent Transport System (ITS) that establishes connectivity between vehicles through a wireless medium. When it comes to the communication between high-speed vehicles there is the challenge of dynamic mobility. In order to provide a higher Packet Delivery Ratio (PDR) and increase the throughput, a new routing protocol called Dynamic Trilateral Enrolment (DyTE) is introduced which chooses a dynamic trilateral zone to find the destination vehicle by allowing only relevant nodes to participate in the communication process using the location coordinates of source and destination nodes. The proposed routing protocol is compared with Ad-hoc On-demand Distance Vector (AODV), Ad-hoc On-demand Multipath Distance Vector (AOMDV), and Dynamic Source Routing (DSR), and the results show remarkable improvement in reducing the Network Routing Load (NRL) and increasing the PDR and throughput of the network. DyTE has performed more efficiently in terms of PDR (23% approximately), throughput (26% approximately) and drastically minimized the NRL by a factor of almost 3.


2018 ◽  
Vol 150 ◽  
pp. 06038 ◽  
Author(s):  
Mohammed Ali Hezam Al Junaid ◽  
A.A. Syed ◽  
Mohd Nazri Mohd Warip ◽  
Ku Nurul Fazira Ku Azir ◽  
Nurul Hidayah Romli

Vehicular Ad Hoc Network (VANET) is a pillar of the envisioned Intelligent Transport System (ITS) and a subset of Mobile Ad Hoc Network that grants the communication in between the vehicles alongside with the absence of established communication infrastructure. Exposure to vulnerabilities of Vehicular Ad-Hoc Network (VANET) has been shown to be related to its nature of the environmental. For this reason, VANET security becomes a critical challenge that need to be resolved. In this paper, we assess the VANET security issues and discuss the challenges in VANET. Equally important, we comparatively review the security requirements, the type of attacks and capabilities of attackers present in VANET.


2020 ◽  
Author(s):  
Mahabaleshwar Kabbur ◽  
V. Arul Kumar

Vehicular Ad-hoc network (VANET) has gained huge attraction from research community due to their significant nature of providing the autonomous vehicular communication. The efficient communication is considered as prime concern in these networks however, several techniques have been introduced to improve the overall communication of VANETs. Security and privacy are also considered as prime aspects of VANETs. Maintaining data security and privacy is highly dynamic VANETs is a challenging task. Several techniques have been introduced recently which are based on the cryptography and key exchange. However, these techniques provide solution to limited security threats. Hence, this work introduces a novel approach for key management and distribution in VANET to provide the security to the network and its components. This approach is later incorporated with cryptography mechanism to secure data packets. Hence, the proposed approach is named as Secure Group Key Management and Cryptography (SGKC). The experimental study shows significant improvements in the network performance. This SGKC approach will help the VANET user’s fraternity to perform secured data transmission.


Sign in / Sign up

Export Citation Format

Share Document