vanet security
Recently Published Documents


TOTAL DOCUMENTS

52
(FIVE YEARS 14)

H-INDEX

12
(FIVE YEARS 2)

2021 ◽  
Author(s):  
Nitha C Velayudhan ◽  
Anitha A ◽  
Mukesh Madanan

Abstract Nowadays, Vehicular ad hoc networks (VANETs) has received interest in the research because it is used to provide the information for drivers and passengers. In the urban VANET, security and safety is a main issue in recent days because of different kinds of attacks. From the attacks, Sybil attack can be considered as a very difficult for urban VANET networks. Hence, in this paper Emperor Penguin Optimization based Routing protocol (EPORP) is developed for detecting the Sybil attack as well as increasing the system performance. The main objective of the research is detecting the Sybil attack as well as improve the security in VANETS. The initial objective is achieved with the help of Rumour riding technique which detect the Sybil attack in the urban VANET. Similarly, the security of the system is achieved with the help of Split XOR (SXOR) operation. In the SXOR operation, the optimal key is generated with the assistance of Emperor Penguin Optimization (EPO). The proposed method is implemented in NS2 platform and performances are evaluated by metrics such as delay, throughput, delay, encryption time and decryption time. The proposed method is compared with existing methods such as Whale Optimization Algorithm (WOA), Particle Swarm Optimization (PSO) and Firefly Algorithm (FA) respectively. While analyzing the delivery ratio, the proposed method has 0.96sec and the WOA, PSO and FA is 0.94, 0.92 and 0.90 respectively. From the analysis, the proposed method has the high delivery ratio value compared with the WOA, PSO and FA methods. Similarly, the other parameters are analyzed and compared with the existing methods.


Author(s):  
Sepha Siswantyo

VANET is an ad-hoc network implemented on vehicle communication to ensure traffic safety and traffic management efficiency. VANET security is a concern because of various vulnerabilities, especially from authentication criteria that the attacker can exploit. VANET is vulnerable to Sybil attack, entity impersonation, message modification, and identity falsification. Several mechanisms and protocols have been developed to address these vulnerabilities. The design of the VANET authentication protocol also needs to be proven using formal methods to ensure that the protocol meets the required security criteria.  In this research, the security of VANET authentication protocol developed by Zhao et al. was analyzed using the Datta et al. security protocol analysis method. Instead of BAN Logic, the Scyther tool was used to verify security claims and find possible attacks. Our Security analysis results show that Zhao et al.'s protocol does not meet confidentiality and entity authentication criteria. Scyther tool can find attacks on nonce confidentiality and man-in-the-middle attack. Therefore, we modify Zhao et al. protocol by adding signature and session key confirmation to improve its security. Based on analysis results, our modified Zhao et al. authentication protocol met confidentiality and entity authentication criteria. The use of signature and session key confirmation prevents man-in-the-middle attack and protects nonce confidentiality. Therefore, our research concludes that modified Zhao et al. authentication protocol more secure than the original protocol in terms of nonce and session key confidentiality, aliveness, weak agreement, non-injective agreement, and non-injective synchronization.


Author(s):  
M. Selvi ◽  
◽  
B. Ramakrishnan

Emergency Message broadcasting is an important process in VANET. Security and reliable transmission are the two major concerns in message broadcasting. VANET is open to unauthorized nodes, hackers, misbehaving vehicles, malicious attackers etc without security. Without valid confirmation of authorized vehicles, these types of attacks may occur. To enhance the reliability in message broadcasting, some existing techniques are used. They transmit the data without much delay but they didn’t provide any trusted authentication. So hackers, malicious nodes, unauthorized vehicles may easily interrupt the emergency messages. Also Brute force attack, Man in Middle attack are not identified and eliminated. In this research, a trust based secured broadcasting mechanism is developed which ensures the metrics such as security, privacy, integrity, trust etc. The major intension of this research is to reduce latency and provide high reliable, secure and efficient communication over the vehicles. The data such as vehicle position, location, speed, and other traffic information’s are generated and stored in a separate table. A network is created with varying densities. A path is generated for message broadcasting between source and destination based on the specific gateway estimated. Here, Optimal Wireless Access in Vanet (OWAV) Protocol is employed to gather vehicle related information to reduce the delay. Blowfish encryption algorithm along with Oppositional Deer Hunting Optimization (ODHO) is used to store the trusted vehicles location to avoid unauthorized tracking. The performance of the proposed research is analyzed with various metrics such as Packet delivery ratio (PDR), transmission delay, encryption time, throughput, computational overhead etc. The efficiency of the research is compared with other existing methods.


Author(s):  
Ghassan Samara

<p>Nowadays Vehicle Ad - hoc Nets (VANET) applications have become very important in our lives because VANET provides drivers with safety messages, warnings, and instructions to ensure drivers have a safe and enjoyable journey. VANET Security is one of the hottest topics in computer networks research, Falsifying VANET system information violates VANET safety objectives and may lead to hazardous situations and loss of life. In this paper, an Intelligent Reputation System (IRS) aims to identify attacking vehicles will be proposed; the proposed system will rely on opinion generation, trust value collection, traffic analysis, position based, data collection, and intelligent decision making by utilizing the multi-parameter Greedy Best First algorithm. The results of this research will enhance VANET's safety level and will facilitate the identification of misbehaving vehicles and their messages. The results of the proposed system have also proven to be superior to other reputational systems.</p>


2020 ◽  
Vol 15 (56) ◽  
pp. 810-827
Author(s):  
Manal Gamal ◽  
Abdurrahman Nasr ◽  
Sayed Nouh
Keyword(s):  

2020 ◽  
Vol 21 (1) ◽  
pp. 41-46
Author(s):  
A Karthikeyan ◽  
P G Kuppusamy ◽  
Iraj S Amiri

Vehicular specially appointed systems named as Vehicular Ad-hoc NETwork (VANET) have been raising dependent on the condition of-art advancements in remote and system communication. The message confirmations among vehicles and infrastructure are fundamental for the VANET security. The genuine personality of vehicles ought not to be uncovered, yet which is just detectable by approved nodes. Existing arrangements either depend vigorously on a carefully designed hardware or cannot fulfill the security necessity. Secured Identity Based Cryptosystem Approach (SIDBC) for intelligent routing protocol is proposed for better results since implementing a secured network for traffic forecasting and efficient routing in dynamically changing environment. Polynomial key generation is utilized for generating identity based pseudonym keys for each and every node that comes under the system. This keying process protects the node from malignant node from passing false information. The assessment output demonstrates that the planned method is more effective than past schemes since it is free pairing and it fulfills security and protection prerequisites.


2020 ◽  
Vol 08 (08) ◽  
pp. 22-35
Author(s):  
Eric Eduardo Bunese ◽  
Eduardo Todt ◽  
Luiz Carlos Pessoa Albini

Author(s):  
Sachin Pandurang Godse ◽  
Parikshit N. Mahalle

Vehicle ad hoc networks face the challenging issue of vehicle communication and its security. So, these issues become key research topics for global VANET researchers. Researcher's current solutions mostly focus on either of the problems but currently they are now heading towards finding satisfactory solutions for both of the above-mentioned problems. VANET networks should be robust and strongly dependent on their communication rapidness, message authentication, priority messaging, and security. Here, the authors discuss four VANET issues: authentication delays, fake messages, priority-based messaging, and VANET security, with respective solutions. This article presents an enhanced ECC-based algorithm to minimize authentication delays and provide secure VANET. Result analysis shows that the algorithm is effective in reducing the authentication delays and improves communication rapidness, improves the security model operation to detect Sybil and reply attack, and promotes intelligent message forwarding to block fake messages and increases message delivery performance.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 173618-173626
Author(s):  
Jian Wang ◽  
Hongyang Chen ◽  
Zemin Sun

Sign in / Sign up

Export Citation Format

Share Document