Ad hoc vehicle networks (VANET) are being established as a primary form of mobile ad hoc networks (MANET) and a critical infrastructure to provide vehicle passengers with a wide range of safety applications. VANETs are increasingly common nowadays because it is connecting to a wide range of invisible services. The security of VANETs is paramount as their future use must not jeopardize their users' safety and privacy. The security of these VANETs is essential for the benefit of secure and effective security solutions and facilities, and uncertainty remains, and research in this field remains fast increasing. We discussed the challenges in VANET in this survey. Were vehicles and communication in VANET are efficient to ensure communication between vehicles to vehicles (V2V), vehicles to infrastructures (V2I). Clarified security concerns have been discussed, including confidentiality, authentication, integrity, availableness, and non-repudiation. We have also discussed the potential attacks on security services. According to analysis and performance evaluations, this paper shows that the ACPN is both feasible and appropriate for effective authentication in the VANET. Finally, the article found that in VANETs, encryption and authentication are critical.
A Survey on Vehicle to Infrastructure Communication SystemIOSR Journals
Abstract: Vehicle-to-Infrastructure (V2I) Communications for Safety is the wireless exchange of critical safety
and operational data between vehicles and roadway infrastructure, intended primarily to avoid motor vehicle
crashes. Vehicle-to-infrastructure (V2I) communication based on wireless local area network (WLAN) IEEE
802.11 standard technology can support user in-motion to achieve preferable Internet connectivity. This
standard is created for urgent short message transmission.The IEEE 802.11 standard defines an infracture
mode with at least one central access point connected to a wired network. In this paper we present an
experimental study of IEEE802.11g using off-the-shelf devices in vehicle-to-infrastructure small scale scenario.
In order to evaluate the V2I the type of communication in large scale scenario and intelligent transportation
systems (ITS) will necessitate wireless vehicle-to-infrastructure (V2I) communica-tions. This wireless link can
be implemented by several technolo-gies, such as digital broadcasting, cellular communication, or dedicated
short range communication (DSRC) systems. Analyses of the coverage and capacity requirements are presented
when each of the three systems are used to implement the V2I link
Keywords: Short Range Vehicle Network; 802.11g; wireless network; goodput; network performance;
transport; mobile stations; auto traffic; vehicle speed
Vehicular ad-hoc networks (VANETs) technology has come out as an important research field over the last few years. VANETs are the likely an influencing approach to provide safety of driver and other applications for the traffic conditions as well as passengers. Being dynamic in nature, it establishes the network, according to the situation and need of the users and provides reliable communication among the vehicles. Due to its great benefits, it is highly vulnerable to various attacks and security in VANET should be taken into consideration. This paper presented the security attacks between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). Many research works have been done to improve the performance and security of this network. The main aim of this paper is the security using hashing and techniques to calculate the trust in VANETs.
Master Thesis on Vehicular Ad-hoc Network (VANET)Prof Ansari
In present, many people during the public died each year in vehicle accidents, therefore in almost countries some safety data i.e. traffic lights & velocity limits are applied, simply however it is not a better solution. Also government and number of automation industries regarded that vehicular safety is real challenging task [1]. Then equally result, to enhance people traffic safety of a new progressed particular technology is formulated i.e. VANET [4]. It is progress type of MANET (Mobile Ad-hoc Network). VANET manages a network within which vehicles are act nodes and applied as mobile nodes to construct a robust infrastructure-less ad-hoc network. In Figure 1 illustrates the basic components of VANET architecture. It builds the network among Inter-Vehicle, Vehicle-to-Roadside and Inter-Roadside communicating networks [4]. Moreover, apart from accidental-safety and security types, there are also broad varieties of applications in VANET are available and potential that can extend passenger comfort like predictable mobility by GPS, web browsing and information modify and so on. Vehicular Ad-hoc Network (VANET) is a novel formulated form of Mobile Ad-hoc Network (MANET), where moving nodes are vehicles same automobiles, cars, buses etc [2].
A Survey on Vehicle to Infrastructure Communication SystemIOSR Journals
Abstract: Vehicle-to-Infrastructure (V2I) Communications for Safety is the wireless exchange of critical safety
and operational data between vehicles and roadway infrastructure, intended primarily to avoid motor vehicle
crashes. Vehicle-to-infrastructure (V2I) communication based on wireless local area network (WLAN) IEEE
802.11 standard technology can support user in-motion to achieve preferable Internet connectivity. This
standard is created for urgent short message transmission.The IEEE 802.11 standard defines an infracture
mode with at least one central access point connected to a wired network. In this paper we present an
experimental study of IEEE802.11g using off-the-shelf devices in vehicle-to-infrastructure small scale scenario.
In order to evaluate the V2I the type of communication in large scale scenario and intelligent transportation
systems (ITS) will necessitate wireless vehicle-to-infrastructure (V2I) communica-tions. This wireless link can
be implemented by several technolo-gies, such as digital broadcasting, cellular communication, or dedicated
short range communication (DSRC) systems. Analyses of the coverage and capacity requirements are presented
when each of the three systems are used to implement the V2I link
Keywords: Short Range Vehicle Network; 802.11g; wireless network; goodput; network performance;
transport; mobile stations; auto traffic; vehicle speed
Vehicular ad-hoc networks (VANETs) technology has come out as an important research field over the last few years. VANETs are the likely an influencing approach to provide safety of driver and other applications for the traffic conditions as well as passengers. Being dynamic in nature, it establishes the network, according to the situation and need of the users and provides reliable communication among the vehicles. Due to its great benefits, it is highly vulnerable to various attacks and security in VANET should be taken into consideration. This paper presented the security attacks between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). Many research works have been done to improve the performance and security of this network. The main aim of this paper is the security using hashing and techniques to calculate the trust in VANETs.
Master Thesis on Vehicular Ad-hoc Network (VANET)Prof Ansari
In present, many people during the public died each year in vehicle accidents, therefore in almost countries some safety data i.e. traffic lights & velocity limits are applied, simply however it is not a better solution. Also government and number of automation industries regarded that vehicular safety is real challenging task [1]. Then equally result, to enhance people traffic safety of a new progressed particular technology is formulated i.e. VANET [4]. It is progress type of MANET (Mobile Ad-hoc Network). VANET manages a network within which vehicles are act nodes and applied as mobile nodes to construct a robust infrastructure-less ad-hoc network. In Figure 1 illustrates the basic components of VANET architecture. It builds the network among Inter-Vehicle, Vehicle-to-Roadside and Inter-Roadside communicating networks [4]. Moreover, apart from accidental-safety and security types, there are also broad varieties of applications in VANET are available and potential that can extend passenger comfort like predictable mobility by GPS, web browsing and information modify and so on. Vehicular Ad-hoc Network (VANET) is a novel formulated form of Mobile Ad-hoc Network (MANET), where moving nodes are vehicles same automobiles, cars, buses etc [2].
Vehicular Ad hoc Network (VANET) is the favorable method to enhance the safety of divers and passengers. It becomes a basic element of the Intelligent Transportation System (ITS). It has created by applying the concepts of Mobile Ad Hoc Networks (MANETs) – which is an application of a wireless network for exchanging the data – to the domain of vehicles. They become a main element of intelligent transportation systems. In existing technique drawback is the Authentication Server (AS) gives all the working to Law Executor (LE) means AS send information to RSU, RSU send this information to law executor and then login process start but if LE behave maliciously then this authentication process fail. In our propose work, we calculate the trust of each vehicle's on the basis of their behavior. Each vehicle calculates the trust of its neighbor and send this value to AS by RSU then AS update these values and then broadcast this value by RSU, now all the vehicles have a trust value of its neighboring vehicles so that send the data by using hashing technique and use trusted path to send data source to a destination so that security enhances.
Vehicular Ad hoc Network (VANET) is the furthermost remarkable and an advantageous technique for the research field for improving the security and protection of drivers and passengers. It is an interesting subclass of Mobile Ad-hoc Network, which authorizes smart communication between vehicles furthermore in the middle of the vehicle and roadside frameworks. It is an application of a wireless network for witching the data – to the domain of vehicles. For the creation of trustful surroundings, trust can be practiced to increase the safety in vehicular networks, which is a major section of security. Trust can be considered by directly observing the human actions or indirectly by getting the neighbor's opinion which produces a trusted communicating environment. They turn into a principal component of intelligent transportation systems. There is a transitivity model in the existing work in which the Authentication Server (AS) provides the authority to Law Executor (LE) for authenticating the other vehicles as a trustful vehicle. So in proposed work a new technique in which there is no vehicle in the network to provide the authority. Trust is estimated by the nodes, then this value sends to the AS where this value is calculated and updated regularly. This method enhances the security of the network. NS2 simulator is used for the overall operation of the proposed work and throughput, PDR and routing overhead show the efficiency of the network.
Security attacks and solutions in vehicular ad hoc networks a surveypijans
Vehicular Ad hoc Networks (VANETs) have emerged recently as one of the most attractive topics for
researchers and automotive industries due to their tremendous potential to improve traffic safety, efficiency
and other added services. However, VANETs are themselves vulnerable against attacks that can directly
lead to the corruption of networks and then possibly provoke big losses of time, money, and even lives. This
paper presents a survey of VANETs attacks and solutions in carefully considering other similar works as
well as updating new attacks and categorizing them into different classes.
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
Designing a protocol structure which contains the control system, VANET device and the type of communication message structures which will implement the message packets for v2v or v2I infrastructure . The different message packets contain the information required to transfer from one node to another in vehicular network for communication. Design various algorithm required for Control, Alert and Infotainment messages. Time stamping lowering data rate efficient packet delivery and proper communication of required messages. Implementation of proposed algorithms and comparison of them with existing algorithms and study of different factors affecting the working of theses algorithms. Analysis of proposed design approach and improvements in results if required.
Traffic Control and Vehicle-to-Everything (V2X) CommunicationsOfinno
As the number of vehicles increases, traffic accidents and waste of resources due to
congestion are consistently growing every year. Cellular Vehicle-to-Everything (V2X) is a
key technology improving driving safety and traffic efficiency by enabling traffic elements
such as vehicles, roadside infrastructures, networks, and pedestrians to communicate with
each other. Dynamic interactions between traffic elements ultimately facilitate intelligent
autonomous driving. The 3rd Generation Partnership Project (3GPP) Technical Specification
Group has developed a series of standards for cellular V2X features and is working on
continuous enhancements for higher reliable and low latency communication. This paper
provides an overview of cellular V2X use cases and 3GPP standardization, and summarizes
the impact of the V2X technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Towards Improving Road Safety Using Advanced Vehicular NetworksTELKOMNIKA JOURNAL
Vehicular Ad-hoc Networks (VANETs) are advanced network technologies applied to improve safety on roads and to offer suitable solutions for Intelligent Transportation Systems (ITS). The goal of VANETs is to assistdrivers and to act as a smart co-pilot that can alret about accidents and help avoiding them while prodivding high-end infotainment systems for both the driver and passengers. Consequently, VANETs can save millions of lives around the world, especially in Saudi Arabia, which has a very high rate of road accidents annualy. In this paper, we introduce and discuss VANETs, related routing protocols, challenging problems, and the existing solutions. This work is a part of a bigger project that aims to enhance VANETs technologies and to updapteITS to significantly promote road safety in general and Saudi Arabia’s roads in particular.
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
Vehicles download the data when passing through a drive through the road (RSU) and then share the data after travelling outside the coverage of RSU.A key issue of downloading
cooperative data is how effectively data is shared among them self. Developing an application layer data exchange protocol for the coordination of vehicles to exchange data according to
their geographic locations. Coordinated sharing can avoid medium access control (MAC) layer
collisions and the hidden terminal effect can be avoided in the multi-hop transmission. A salient
feature of the application layer data exchange protocol, in the voluntary services, Vehicles purchase the requested data from service provider via RSUs. In this project, we propose a
cooperative data sharing with secure framework for voluntary services in special vehicles networks (VANETs). We also concentrate on security in the process of downloading data and
sharing. Applicants to ensure exclusive access to data applied and security of the vehicles
involved in the implementation.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
Recently, vehicular ad hoc networks (VANETs) have been garnering
significant inter-est from the people involved in transportation field.
Nowadays automotive manufactur-ers have already supplying vehicles with
multitude of road sensors that provides many useful characteristics. VANET
communication not only offers the drivers and passen-gers with the various
safety related services but also provides a wide range of valuable
applications. However, the inherent openness of the wireless communication
medium used by VANETs exposes vehicles to various security and privacy
issues. Researchers have proposed many security schemes to solve the issues
mentioned above for the widespread deployment of VANETs. However,
these schemes failed to fulfill all as-pects of security and privacy
requirements. Besides, these schemes have not provided the performance
parameters such as computation and communication costs. The pri-mary
emphasis of this paper is on the taxonomy of security schemes based
conditional privacy-preserving with respect to strengths and limitations.
Besides, a comparison be-tween these schemes related to the model of
security and privacy requirements, attacks, and performance parameters is
provided. Finally, this paper critically reviews the re-lated works by taking
into consideration the design and development of all VANETs security and
privacy schemes, this paper could serve as a guide and reference.
Vehicular Ad hoc Network (VANET) is the favorable method to enhance the safety of divers and passengers. It becomes a basic element of the Intelligent Transportation System (ITS). It has created by applying the concepts of Mobile Ad Hoc Networks (MANETs) – which is an application of a wireless network for exchanging the data – to the domain of vehicles. They become a main element of intelligent transportation systems. In existing technique drawback is the Authentication Server (AS) gives all the working to Law Executor (LE) means AS send information to RSU, RSU send this information to law executor and then login process start but if LE behave maliciously then this authentication process fail. In our propose work, we calculate the trust of each vehicle's on the basis of their behavior. Each vehicle calculates the trust of its neighbor and send this value to AS by RSU then AS update these values and then broadcast this value by RSU, now all the vehicles have a trust value of its neighboring vehicles so that send the data by using hashing technique and use trusted path to send data source to a destination so that security enhances.
Vehicular Ad hoc Network (VANET) is the furthermost remarkable and an advantageous technique for the research field for improving the security and protection of drivers and passengers. It is an interesting subclass of Mobile Ad-hoc Network, which authorizes smart communication between vehicles furthermore in the middle of the vehicle and roadside frameworks. It is an application of a wireless network for witching the data – to the domain of vehicles. For the creation of trustful surroundings, trust can be practiced to increase the safety in vehicular networks, which is a major section of security. Trust can be considered by directly observing the human actions or indirectly by getting the neighbor's opinion which produces a trusted communicating environment. They turn into a principal component of intelligent transportation systems. There is a transitivity model in the existing work in which the Authentication Server (AS) provides the authority to Law Executor (LE) for authenticating the other vehicles as a trustful vehicle. So in proposed work a new technique in which there is no vehicle in the network to provide the authority. Trust is estimated by the nodes, then this value sends to the AS where this value is calculated and updated regularly. This method enhances the security of the network. NS2 simulator is used for the overall operation of the proposed work and throughput, PDR and routing overhead show the efficiency of the network.
Security attacks and solutions in vehicular ad hoc networks a surveypijans
Vehicular Ad hoc Networks (VANETs) have emerged recently as one of the most attractive topics for
researchers and automotive industries due to their tremendous potential to improve traffic safety, efficiency
and other added services. However, VANETs are themselves vulnerable against attacks that can directly
lead to the corruption of networks and then possibly provoke big losses of time, money, and even lives. This
paper presents a survey of VANETs attacks and solutions in carefully considering other similar works as
well as updating new attacks and categorizing them into different classes.
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
Designing a protocol structure which contains the control system, VANET device and the type of communication message structures which will implement the message packets for v2v or v2I infrastructure . The different message packets contain the information required to transfer from one node to another in vehicular network for communication. Design various algorithm required for Control, Alert and Infotainment messages. Time stamping lowering data rate efficient packet delivery and proper communication of required messages. Implementation of proposed algorithms and comparison of them with existing algorithms and study of different factors affecting the working of theses algorithms. Analysis of proposed design approach and improvements in results if required.
Traffic Control and Vehicle-to-Everything (V2X) CommunicationsOfinno
As the number of vehicles increases, traffic accidents and waste of resources due to
congestion are consistently growing every year. Cellular Vehicle-to-Everything (V2X) is a
key technology improving driving safety and traffic efficiency by enabling traffic elements
such as vehicles, roadside infrastructures, networks, and pedestrians to communicate with
each other. Dynamic interactions between traffic elements ultimately facilitate intelligent
autonomous driving. The 3rd Generation Partnership Project (3GPP) Technical Specification
Group has developed a series of standards for cellular V2X features and is working on
continuous enhancements for higher reliable and low latency communication. This paper
provides an overview of cellular V2X use cases and 3GPP standardization, and summarizes
the impact of the V2X technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Towards Improving Road Safety Using Advanced Vehicular NetworksTELKOMNIKA JOURNAL
Vehicular Ad-hoc Networks (VANETs) are advanced network technologies applied to improve safety on roads and to offer suitable solutions for Intelligent Transportation Systems (ITS). The goal of VANETs is to assistdrivers and to act as a smart co-pilot that can alret about accidents and help avoiding them while prodivding high-end infotainment systems for both the driver and passengers. Consequently, VANETs can save millions of lives around the world, especially in Saudi Arabia, which has a very high rate of road accidents annualy. In this paper, we introduce and discuss VANETs, related routing protocols, challenging problems, and the existing solutions. This work is a part of a bigger project that aims to enhance VANETs technologies and to updapteITS to significantly promote road safety in general and Saudi Arabia’s roads in particular.
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
Vehicles download the data when passing through a drive through the road (RSU) and then share the data after travelling outside the coverage of RSU.A key issue of downloading
cooperative data is how effectively data is shared among them self. Developing an application layer data exchange protocol for the coordination of vehicles to exchange data according to
their geographic locations. Coordinated sharing can avoid medium access control (MAC) layer
collisions and the hidden terminal effect can be avoided in the multi-hop transmission. A salient
feature of the application layer data exchange protocol, in the voluntary services, Vehicles purchase the requested data from service provider via RSUs. In this project, we propose a
cooperative data sharing with secure framework for voluntary services in special vehicles networks (VANETs). We also concentrate on security in the process of downloading data and
sharing. Applicants to ensure exclusive access to data applied and security of the vehicles
involved in the implementation.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
Recently, vehicular ad hoc networks (VANETs) have been garnering
significant inter-est from the people involved in transportation field.
Nowadays automotive manufactur-ers have already supplying vehicles with
multitude of road sensors that provides many useful characteristics. VANET
communication not only offers the drivers and passen-gers with the various
safety related services but also provides a wide range of valuable
applications. However, the inherent openness of the wireless communication
medium used by VANETs exposes vehicles to various security and privacy
issues. Researchers have proposed many security schemes to solve the issues
mentioned above for the widespread deployment of VANETs. However,
these schemes failed to fulfill all as-pects of security and privacy
requirements. Besides, these schemes have not provided the performance
parameters such as computation and communication costs. The pri-mary
emphasis of this paper is on the taxonomy of security schemes based
conditional privacy-preserving with respect to strengths and limitations.
Besides, a comparison be-tween these schemes related to the model of
security and privacy requirements, attacks, and performance parameters is
provided. Finally, this paper critically reviews the re-lated works by taking
into consideration the design and development of all VANETs security and
privacy schemes, this paper could serve as a guide and reference.
VANET SECURITY AND PRIVACY – AN OVERVIEWIJNSA Journal
Even though vehicular ad-hoc networks (VANETs) bring tremendous benefits to society, yet they raise
many challenges where the security and privacy concerns are the most critical ones. In this paper, we
provide a detailed overview of the state-of-the-art security and privacy requirements in VANET. Also, a
brief of the approachesthat are proposed in the literature to fulfil these requirements is given in this paper.
Besides that, a classification of the various VANET attacks based on the communication system
layersisprovided in this paper. In addition, the different types of VANET adversaries and attackers
arepresented here.In general, this paper aims to provide a good piece of information about VANET
security and privacy, in order to be used as a tool to help researchers in this field in developing secure
privacy-preserving approaches for VANET.
VANET SECURITY AND PRIVACY – AN OVERVIEWIJNSA Journal
Even though vehicular ad-hoc networks (VANETs) bring tremendous benefits to society, yet they raise
many challenges where the security and privacy concerns are the most critical ones. In this paper, we
provide a detailed overview of the state-of-the-art security and privacy requirements in VANET. Also, a
brief of the approachesthat are proposed in the literature to fulfil these requirements is given in this paper.
Besides that, a classification of the various VANET attacks based on the communication system
layersisprovided in this paper. In addition, the different types of VANET adversaries and attackers
arepresented here.In general, this paper aims to provide a good piece of information about VANET
security and privacy, in order to be used as a tool to help researchers in this field in developing secure
privacy-preserving approaches for VANET.
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Dr. Amarjeet Singh
Vehicles in a vehicular ad-hoc network (VANET) broadcast information about the driving environment in the road. Due to the open-access environment, this means that the VANET is susceptible to security and privacy issues. However, none of the related works satisfies all security and privacy requirements. Besides, their proposed has huge overhead in terms of computation and communication. To address the above issues, we will propose the security and privacy scheme based on Elliptic Curve Cryptography (ECC) and one secure hash function. Hence the reliability of each message being signed and checked has been improved. The main aim of this work is to satisfy all aspect requirements of security and privacy and reduce the computational complexity of the system.
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)Dr. Amarjeet Singh
Vehicles in a vehicular ad-hoc network (VANET) broadcast information about the driving environment in the road. Due to the open-access environment, this means that the VANET is susceptible to security and privacy issues. However, none of the related works satisfies all security and privacy requirements. Besides, their proposed has huge overhead in terms of computation and communication. The present paper is a provide a thorough background on VANETs and their entities; different security attacks; and all requirements of the privacy and security for VANETs. This paper may serve as a guide and reference for VANETs in the design and implementation of any new techniques for protection and privacy.
Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular...Dr. Amarjeet Singh
Vehicular Ad-Hoc Network (VANET) is an indispensable part of the Intelligent Transportation System (ITS) due to its abilities to enhance traffic management and safety. Many researchers have been focused on specific areas involving management and storage data, protocols standardization, network fragmentation, monitoring, and quality of service. The benchmarks of security of VANET are studied and figured out in this paper. VANET provides the driver and passenger with the safety application as well as entertainment service. However, the communication between nodes in VANET is susceptible to security threats in both communication modes, which indicates the main hazard. In this paper, we identified different Man-In-The-Middle (MITM) attacks with various behaviors such as message tampering, message delaying, and message dropping, according to the literature. In this study, the essential background of VANET from architectural point of view and communication types are discussed. Then, the overview of MITM attack in VANET is presented. In addition, this paper thoroughly reviews the existing prevention schemes for MITM attack in VANET. This review paper reveals that there is still a need for a better and more efficient preventive scheme to address the MITM attack in VANET. This review paper could serve as evidence and reference in the development of any new security schemes for VANETs.
MALICIOUS NODE DETECTION THROUGH AODV IN VANET ijasuc
VANET is a subset of MANET which offers communication between the nodes. VANET is a collection of
various dynamic nodes that can change it and configure itself on the network. In Vanet, various routing
protocols may be implemented to route the packet and Ad-hoc On-Demand Distance Vector (AODV) is one
of the protocol that floods the packets to discover route. In Ad hoc On Demand Vector (AODV) routing
protocol for VANET, malicious nodes may distrupt the network and make it difficult for the nodes to
communicate. In this paper, AODV Routing Protocol is analysed in vanet with and without malicious
attack. The malicious node disrupts the limit and floods the network with false packets. Malicious node will
affect the performance of the entire network as it consumes more bandwidth and drops packets which in
turn reduce the performance of AODV routing protocol and vanet.
Towards design strong emergency and COVID-19 authentication scheme in VANETnooriasukmaningtyas
The wide use of vehicular ad hoc networks (VANETs) in the last decade has led many researchers to find efficient and reliable methods to obtain the desired benefits and offer services, such as healthcare and traffic management. However, VANETs suffer from security issues represented by authentication and data integrity. In this paper, we propose a robust mutual authentication scheme based on elliptic curve cryptography (ECC), cryptography Hash Function, and a pseudonym. The proposed work was twofold in focus: first, on healthcare in emergency cars which use VANETs, and second, on overcoming security issues, such as resisting familiar attacks (e.g. insider attacks and reply attacks). Because of the serious situation generated by the worldwide outbreak of the Covid-19 epidemic, we also found this research valuable in supporting global efforts to combat the rapid spread of this virus, by finding the safest and fastest routes to epidemic treatment centres for medical staff, assistance teams in medical operations, fumigation control, and all work teams associated with disease control. This research attempts to contribute by proposing a special signal used to define epidemic teams. The best route, fast route can be chosen by using VANETs infrastructure. This scheme also deals with metric security features, such as key management, data integrity, and data privacy. In the communication and computation cost, we noticed that our proposed scheme achieved good results compared with the related works
A survey on security and privacy issues in IoV IJECEIAES
As an up-and-coming branch of the Internet of things, internet of vehicles (IoV) is imagined to fill in as a fundamental information detecting and processing platform for astute transportation frameworks. Today, vehicles are progressively being associated with the Internet of Things which empower them to give pervasive access to data to drivers and travelers while moving. Be that as it may, as the quantity of associated vehicles continues expanding, new prerequisites, (for example, consistent, secure, vigorous, versatile data trade among vehicles, people, and side of the road frameworks) of vehicular systems are developing. Right now, the unique idea of vehicular specially appointed systems is being changed into another idea called the internet of vehicles (IoV). We talk about the issues faced in implementing a secure IoV architecture. We examine the various challenges in implementing security and privacy in IoV by reviewing past papers along with pointing out research gaps and possible future work and putting forth our on inferences relating to each paper.
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...ijtsrd
VANET is the largest wireless communications research area. VANETs of rapidly moving vehicles can be inefficient or unreliable. With the passing of time, VANET technology advances via inter vehicle interaction, but many problems need to be resolved in order to strengthen the network. This paper simulates road traffic simulators in a way that ensures safe communication between different types vehicles and prevents traffic based congestion in the cities of India. Ms. Pooja Deshpande | Mrs. Vrushali Uttarwar | Ms. Ekta Choudhari "Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Network for Realistic City Scenario" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29771.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/29771/implementing-secured-and-comport-transportation-using-vehicular-ad-hoc-network-for-realistic-city-scenario/ms-pooja-deshpande
LSKA-ID: A lightweight security and key agreement protocol based on an identi...TELKOMNIKA JOURNAL
Recently, a huge effort has been pushed to the wireless broadcasting nature in the open area. However, the vehicular ad hoc network (VANET) is disposed to various kinds of attacks. Hence, keeping the security in VANET is the most critical issue because of the VANET network related to human life. Thus, we propose a robust and lightweight security and key agreement-based identity protocol LSKA-ID for vehicular communication. Our protocol utilizes the elliptic curve cryptography, Chinese reminder theorem, and identity (ID)-based cryptosystem to resolve the issues found in the previously proposed schemes, in which our protocol can resolve the key escrow issues accompanied in most ID-based schemes. Also, it does not need batch verification operations, which cause some problems to the verifier in case the batch beacons have one or more illegal beacons. Moreover, the LSKA-ID protocol addresses the dependency on the trusted authority (TA) during the high frequent handover between the groups that may cause a bottleneck problem on the TA. The security analysis proves the correctness of the LSKA-ID protocol by using the random oracle model and has shown to be effective in a performance evaluation.
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETIJNSA Journal
Vehicular Ad hoc Networks (VANETs) are the promising approach to provide safety and other applications
to the drivers as well as passengers. It becomes a key component of the intelligent transport system. A lot of
works have been done towards it but security in VANET got less attention. In this article, we have discussed
about the VANET and its technical and security challenges. We have also discussed some major attacks
and solutions that can be implemented against these attacks. We have compared the solution using different
parameters. Lastly we have discussed the mechanisms that are used in the solutions.
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETIJNSA Journal
Vehicular Ad hoc Networks (VANETs) are the promising approach to provide safety and other applications to the drivers as well as passengers. It becomes a key component of the intelligent transport system. A lot of works have been done towards it but security in VANET got less attention. In this article, we have discussed about the VANET and its technical and security challenges. We have also discussed some major attacks and solutions that can be implemented against these attacks. We have compared the solution using different parameters. Lastly we have discussed the mechanisms that are used in the solutions.
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
Deep neural networks have accomplished enormous progress in tackling many problems. More specifically, convolutional neural network (CNN) is a category of deep networks that have been a dominant technique in computer vision tasks. Despite that these deep neural networks are highly effective; the ideal structure is still an issue that needs a lot of investigation. Deep Convolutional Neural Network model is usually designed manually by trials and repeated tests which enormously constrain its application. Many hyper-parameters of the CNN can affect the model performance. These parameters are depth of the network, numbers of convolutional layers, and numbers of kernels with their sizes. Therefore, it may be a huge challenge to design an appropriate CNN model that uses optimized hyper-parameters and reduces the reliance on manual involvement and domain expertise. In this paper, a design architecture method for CNNs is proposed by utilization of particle swarm optimization (PSO) algorithm to learn the optimal CNN hyper-parameters values. In the experiment, we used Modified National Institute of Standards and Technology (MNIST) database of handwritten digit recognition. The experiments showed that our proposed approach can find an architecture that is competitive to the state-of-the-art models with a testing error of 0.87%.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
One way to prevent and reduce the spread of the covid-19 pandemic is through physical distancing program. This research aims to develop a prototype contactless transaction system using digital payment mechanisms and QR code technology that will be applied in traditional markets. The method used in the development of electronic market systems is a prototype approach. The application of QR code and digital payments are used as a solution to minimize money exchange contacts that are common in traditional markets. The results showed that the system built was able to accelerate and facilitate the buying and selling transaction process in traditional market environment. Alpha testing shows that all functional systems are running well. Meanwhile, beta testing shows that the user can very well accept the system that was built. The results of the study also show acceptance of the usefulness of the system being built, as well as the optimism of its users to be able to take advantage of this system both technologically and functionally, so its can be a part of the digital transformation of the traditional market to the electronic market and has become one of the solutions in reducing the spread of the current covid-19 pandemic.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
A double-layer loaded on the octagon microstrip yagi antenna (OMYA) at 5.8 GHz industrial, scientific and medical (ISM) Band is investigated in this paper. The double-layer consist of two double positive (DPS) substrates. The OMYA is overlaid with a double-layer configuration were simulated, fabricated and measured. A good agreement was observed between the computed and measured results of the gain for this antenna. According to comparison results, it shows that 2.5 dB improvement of the OMYA gain can be obtained by applying the double-layer on the top of the OMYA. Meanwhile, the bandwidth of the measured OMYA with the double-layer is 14.6%. It indicates that the double-layer can be used to increase the OMYA performance in term of gain and bandwidth.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
Given the massive potentials of 5G communication networks and their foreseeable evolution, what should there be in 6G that is not in 5G or its long-term evolution? 6G communication networks are estimated to integrate the terrestrial, aerial, and maritime communications into a forceful network which would be faster, more reliable, and can support a massive number of devices with ultra-low latency requirements. This article presents a complete overview of potential 6G communication networks. The major contribution of this study is to present a broad overview of key performance indicators (KPIs) of 6G networks that cover the latest manufacturing progress in the environment of the principal areas of research application, and challenges.
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
ML for identifying fraud using open blockchain data.pptx
A review on various security attacks in vehicular ad hoc networks
1. Bulletin of Electrical Engineering and Informatics
Vol. 10, No. 5, October 2021, pp. 2627~2635
ISSN: 2302-9285, DOI: 10.11591/eei.v10i5.3127 2627
Journal homepage: http://beei.org
A review on various security attacks in vehicular ad hoc
networks
Mustafa Maad Hamdi1
, Lukman Audah2
, Mohammed Salah Abood3
, Sami Abduljabbar Rashid4
,
Ahmed Shamil Mustafa5
, Hussain Mahdi6
, Ahmed Shakir Al-Hiti7
1,2,4
Faculty of Electrical and Electronic Engineering, Universiti Tun Hussein Onn Malaysia, Batu Pahat Johor, Malaysia
3
School of Information and Electronics Engineering, Beijing Institute of Technology, Beijing, China
5
Department of Computer Engineering Techniques, Al-Maarif University College, Al-Anbar, Iraq
1,6
Computer Engineering Department, Faculty of Engineering, University of Diyala, Baquba, Diyala Province, Iraq
7
Department of Electrical Engineering, Faculty of Engineering, University of Malaya, Kuala Lumpur, Malaysia
Article Info ABSTRACT
Article history:
Received Oct 27, 2020
Revised Dec 20, 2020
Accepted Jul 14, 2021
Ad hoc vehicle networks (VANET) are being established as a primary form of
mobile ad hoc networks (MANET) and a critical infrastructure to provide
vehicle passengers with a wide range of safety applications. VANETs are
increasingly common nowadays because it is connecting to a wide range of
invisible services. The security of VANETs is paramount as their future use
must not jeopardize their users' safety and privacy. The security of these
VANETs is essential for the benefit of secure and effective security solutions
and facilities, and uncertainty remains, and research in this field remains fast
increasing. We discussed the challenges in VANET in this survey. Were
vehicles and communication in VANET are efficient to ensure
communication between vehicles to vehicles (V2V), vehicles to
infrastructures (V2I). Clarified security concerns have been discussed,
including confidentiality, authentication, integrity, availableness, and non-
repudiation. We have also discussed the potential attacks on security services.
According to analysis and performance evaluations, this paper shows that the
ACPN is both feasible and appropriate for effective authentication in the
VANET. Finally, the article found that in VANETs, encryption and
authentication are critical.
Keywords:
Attacks
Threats
V2I
V2V
VANET
This is an open access article under the CC BY-SA license.
Corresponding Author:
Lukman Audah
Faculty of Electrical and Electronic Engineering
Universiti Tun Hussein Onn Malaysia
86400 Parit Raja, Batu Pahat, Johor, Malaysia
Email: hanif@uthm.edu.my
1. INTRODUCTION
Rapid wireless technology should be used to enhance the driving environment to enable road safety,
infotainment, and effective transport. Deaths worldwide are growing dramatically, with over 1 2.2 million
fatalities killing on roads globally per year, with over 50 million being wounding. Over the next five years,
such estimates would rise by nearly 60% if no measures are implementing in addition to other harm such as
loss of time generated by road delays.
VANET is a mobile ad hoc (MANET) route network designed to enhance travel security, traffic
flow, and driving experience. This consists of the registration/administration of transportation on-board units
(OBUs) and roadside units (RSUs) [1]-[3]. An OBU is constructed as a communication transmitter with other
vehicles on the road in every vehicle, while an RSU with networked equipment is installed along the road.
2. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 5, October 2021 : 2627 – 2635
2628
RSUs are used to connect to the networks and include dedicated short-range communication (DSRCs) [4],
[5]. Two categories are describing as VANET as:
a. Vehicle-to-vehicle (V2V)
Only vehicles in the V2V communication domain share some features, such as vehicles with the
same model or vehicles that share the exact location during the same time interval that share in this
communication [6].
b. Vehicle to infrastructure (V2I) communications [7]
Warning messages are transmitted from infrastructure through RSUs to every vehicle within the
road to improve traffic flow and safety. Their location, especially on curve roads, intersections, or on narrow
roads, shall be detecting where possible. As shown in Figure 1, the VANET security protocols will provide
security against unauthorized individuals being obtaining, detected, and profiled by non-authorized entities
and against driver privacy (e.g. identity and location privacy). Otherwise, it would be challenging to convince
drivers to become members of the driver. User profiling is necessary when the designated organization needs
to share essential information, such as in cases of crime) [8], [9]. One instance of this is that malicious action
identifies at VANET, which involves detection and distinction between malicious activities by legal and
privileged users (network outsiders), which is a significant challenge [10]. A requirement to meet safety and
privacy concerns, design a set of mechanisms to ensure protection and privacy in realistic VANET designs
[11] to secure them effectively against significant security threats, including but not limited to, rendition,
black hole, tunnelling, timing attack, and Sybil [12]. The VANET huge opportunity and scalability can have
catastrophic consequences and an effective attack by an adversary [13], [14]. However, VANETs have some
crucial differences with the MANETs (e.g. very high dynamic networks, capital limitations, large data supply
application requirements, access to infrastructures, central identification, technical analysis, and identification
of liability, more importantly, confidentiality in certain instances). Therefore the majority of MANET
security research cannot be application [15], [16].
Figure 1. The structure of VANET [8]
It should be noted that most previous works focused only on a few aspects of various security attacks
in vehicular ad hoc networks, such as vehicular communication [17], security attacks [18], green
communication networks [19], and security issues [20]. So in this paper summarizes the main contributions as:
a. In this survey, the challenges in VANET were discussed, particularly in V2V and V2I and clarified
security concerns, including confidentiality, authentication, integrity, availableness, and non-repudiation.
With a literature survey for each case and made a comparison with previous studies as in Table 1. As
well, security services have also has been discussed as a possible attack on the capabilities.
b. Some researchers have been working to provide VANET authentication. However, confidentiality and
availability are almost non-existent in most studies, such as in privacy and safety and so on, especially in
[16], [21], [22]. To fill this gap, this article comprehensively surveys the latest advances, focuses on
requirements, and then describes the various attack and threats examples. Furthermore, we discovered
that encryption and authentication are crucial in VANETs. This paper's novelty shows that the proposed
ACPN is feasible and adequate to UVC in the VANET for efficient privacy-preserving authentication
with non-repudiation, according to analysis and performance evaluations.
This paper's organization follows section 1, explaining the VANET and types of communication in
VANET. Section 2, presenting the most challenges in VANETs. Section 3, explaining all kinds of security
service in VANETs, section 4, show the discussion and conclusion.
3. Bulletin of Electr Eng & Inf ISSN: 2302-9285
A review on various security attacks in vehicular ad hoc networks (Mustafa Maad Hamdi)
2629
Table 1. Summary of security service in VANETs
Author/year
Description
Security
standards
Attacks
Applications
Security
Simulation
Tools
Architectures
Parameters
Communications
Paradigm
Strength
[7]/2020 Issues and challenges in
VANET
- x x x x x - V2V, V2I Design of cost-effective
VANET protocols and
applications (ITS)
[23]/2020 Existing replay attack
prevention schemes in
VANETs
- x x x - - - V2V, V2I Discussed existing replay
attack
[24]/2018 Challenges, security
requirements and attacks in
VANET
- x - x - x - V2V, V2I,
I2I
Taxonomy of Security
Concept
[17]/2019 Design and implementation x x x x - x - V2V, V2I,
V2X, V2P,
V2C,
Security solutions in 5G
[1]/2017 security challenges and
solutions
x x - x - x - V2V, V2I Security architectures,
security standards, attacks
and solutions,
[25]/2020 Security Attacks and
Challenges
x x - x - - - V2V, V2I,
V2R
General analysis of
possible challenges is
mention
[18]/2017 Security Attacks and
Challenges
- x x - x - V2V, V2I Mobility and propose a
new protocol
[19]/2019 Security Services, Attacks,
and Applications
x x x x x x - V2V, V2I,
V2X, V2P,
V2R,
Open research problems
and future directions have
been identified
[20]/2017 Mechanisms, advantages,
disadvantages, and
performance. Also, security
issues in VANET
authentication
x x - x - x x V2V, V2I Taxonomy and open
security issues
[26]/2019 Authentication and privacy
schemes have been
classifying, discussed
- x - x - - x V2V, V2I Security requirements,
Security attacks and
Performance parameters
[27]/2020 Different issues in Man-In-
The-Middle (MITM) attacks
- x - x - x - V2V, V2I Prevent MITM attacks in
VANET.
[28]/2019 Safety will be maintained and
the various protective
technologies crashed in the
VANETs
- x - x - - - V2X, V2V The relationship between
literature algorithms and
the various safety factors
[29]/2019 Current AV safety problems
and security attacks research
overview
- x - x - - - V2X The available safety and
security countermeasures
Our Survey Challenges in VANET,
security concerns, including
confidentiality, authentication,
integrity, availableness, and
non-repudiation
- x x x - - - V2V, V2I The proposed ACPN in the
VANET setting is feasible
for a UVC for effective
non-repudiation
confidentiality
authentication
x considers - non-considers
2. CHALLENGES OF VANETS
There are several issues challenges in VANETs:
a. Congestion and collision control; the unlimited size of the network is also a challenge. In rural areas, the
traffic load is low, and in urban areas, even at night. It also happens while in a rush with network
partitions. The traffic load is hefty hours, which causes network congestion and a network collision.
b. Real-time system; developing a real-time system is difficulty because it is challenging to send a warning
message in an increasingly mobile environment before the deadline is the correct time.
c. Authentication; all messages sent from one vehicle to another must be authenticating. The central
authority will authenticate each vehicle in the network [30].
d. Security and trust; security issues are sometimes dealt with in travel applications, especially in the
comfort of the traveller, and the reason is that cooperation exists between all. If security and security are
not ensuring, customers will not accept the warning systems they have received. Trust and trustworthy
4. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 5, October 2021 : 2627 – 2635
2630
software are one of the most critical protection issues in VANET. Implementing security maps for
VANET implementations can also delay the message's delivery [25].
e. Environmental impact; for communication, VANETs are using electromagnetic waves. These waves are
environmentally affected. Therefore, to deploy VANET should be considered for the environmental
impact [31].
f. MAC design; VANET typically uses the common medium to notify the design of the MAC. Several
approaches, such as TDMA, SDMA, CSMA, are taken. The CSMA based Mac for VANET was adopted
by IEEE 802.11 [18].
g. Location-based services; through beaconing, we know where other cars are situated. However, we know
the correct vehicle location by using GPS, sensors, cameras, radar.
h. Mobility; the VANET vehicles are highly dynamic, as they are free to travel and connect with other
vehicles throughout their movement, which can never be approached before. Vehicles stay attached for so
long, and then each vehicle loses its connection when it moves in a path that makes it challenging to
secure VANET [32].
3. SECURITY SERVICE IN VANETS
MANETs has recently created security problem that researchers consider to be an important security
issue, including fewer central points, insufficient mobility Wireless, and driver connectivity problems. For
VANETs, the messages' security transferred to assured that the attackers cannot inject or change them. In
fact, within a specific timeline, the driver will reliably inform traffic conditions. The VANET is more
vulnerable to attacks due to its distinguishing characteristics. Also, safety issues would now be properly
discussed. If not, certain obstacles would be generated to protect communication within VANETs. The
system's requirements should be in line with the related network service that needs to be specified in VANET
security. Such conditions could not be dealt with with possible VANET threats or attacks. This section
discusses the security services in VANET. The primary safety Requirements are divide into five main
domains, such as VANET [33]:
3.1. Availability attack
Units the availability includes bandwidth and connectivity for all node network services. A group
signature system has been implementing to prevent and detect technology [19]. The program focuses on the
availability of messages between vehicles and RSUs. If the attack causes network unavailability, the
technical solution proposed is to survive through interconnections between RSUs and the vehicles using
public and private keys [21]. At the same time, attack on availability, in the case of lack of availability
functionality which may contribute to a decrease in the efficiency of the VANETs information accessibility,
is a vital part of the VANET system. The following are its description and types:
a. Denial of service (DOS) attacks; DOS is one of the most common VANET attacks. The attacks in the
VANET network internally or externally vehicles [34]. The attacker blocks vehicle communication and
effectively prevents any possible means of behavior. Many attackers can simultaneously perform this
attack on a distributed basis, known as a distributed denial of service (DDoS) [35].
b. Jamming attack; the VANET communication channel is disrupted by a strongly driven signal of an
equivalent frequency. It is the riskiest security application attack because the valid security warning has
not been following. If a successful jamming attack has been carried out, the jammer will disrupt the useful
signal at the same time as an event [36].
c. Malware attack; malware is malicious software whose objective is to interrupt normal functioning. The
attacker is responsible for this attack. This attack is introduced to the networks by VANET systems and
roadside stations as software updates are received.
d. Black hole attack; it is one of VANET 's safety attacks. The assailant node refuses to participate in this attack or
even drop the data packet [37]. This type of attack, therefore, affects the vehicle network more severely.
e. Gray hole attack; the black hole attack variant. It happens if unsustainable vehicles want to forward some
data packets and remove the other packet without being tracked [19].
f. Greedy behavior attack; this attack mainly affects the MAC functionality when a malicious vehicle
misuses the MAC protocol to maximize the costly bandwidth for many applications. This contributed to a
traffic congestion and a collision in the broadcast channel that could delay the legitimate services of the
registered user [20].
g. Broadcast tampering; attackers include false safety messages on the network in this attack. This message
covers traffic alerts at times. The situation is critical, for example, accidents and traffic delays [38].
h. Spamming; spam attacks target bandwidth consumption and transmission latency. Spam attacks such
messages, like advertising messaging, are not of interest to users [39].
5. Bulletin of Electr Eng & Inf ISSN: 2302-9285
A review on various security attacks in vehicular ad hoc networks (Mustafa Maad Hamdi)
2631
3.2. Authentication attacks
VANET plays an essential function in authentication. It prevents VANET from attacking suspected
network entities. Based type information, including user identity and sender address, is vital. It is necessary.
Authentication can control vehicles' authorization levels and can, by allocating specific identification for
each vehicle, often prevent Sybil attacks [40]. While attack on authentication, authentication is vital in the
VANET network used to protect the system from attack due to malicious nodes. Authentication shall be
responsible for Protecting internal and external connections from VANETs. The following are its description
and types:
a. Sybil attack; this attack consists of sending more than one copy of messages to other vehicles, and every
message includes a manufactured identity, i.e. The attacker appears hundreds of vehicles with specific
IDs to other vehicles, informing them jam ahead and forcing them to take another path.
b. Tunnelling attack; this attack is like the wormhole attack. Initiating a personal chat and on a channel
called the tunnel using the same network. The attacker joined the VANETs at two distant positions. Thus,
nodes far apart can connect as neighbors [37].
c. GPS spoofing; a powerful signal transmitting an attacker, more significant than the GPS signal, causes
VANET to be jamming, and the vehicle receiver gets the wrong position.
d. Node impersonation attack; this attack occurs when an attacker determines the VANET's user ID [19].
e. Free-riding attack; this attack is viral and performed by false authentication attempts and cooperative
message authentication by an effective malicious user. During this attack, the malicious app is going to
use other users' security efforts without their own. This form of action is considered free rein. This attack
could severely threaten to authenticate the message of the cooperative.
3.3. Integrity attacks
Data integrity ensures that data obtained from nodes, RSUs, and AS areas created while exchanging
messages. The integrated digital signature with app access guarantees the validity of the message [40]. While
attack on integrity, invalid data measurements and the transmission of messages affected by managing
vehicle sensors or altering the data transmitted will compromise data integrity. This influences the network's
reliability. Therefore, some mechanisms have to be established in practice to protect the vehicle network
from these attacks [41]. The following are its description and types:
a. Masquerading; in this attack, one attacker is defined by false identification and visibility as a legitimate node
by another vehicle. The attacker behaves like a man in the central middle and spoofs them as the second
vehicle as all vehicles interact in the process. That is also a deliberate attack to change the results [23].
b. Replay attack; the attacker aims to repeat or delay fraudulent transmission by continuously providing
valid data and injecting beacon and responses received by the VANET network. In the case of an
incident, traffic authorities can find it challenging to identify vehicles [42].
c. Message tampering attack; the attack is usually carrying out when an attacker modifies or changes
recently transmitted messages as the name of the attack indicates. When the road is congested, the
attacker changes the data to clear the path and may modify the path.
d. Illusion attack; in this attack, the attacker communicates alerts based on the road conditions, which give
the vehicles an impression leading to delays, accidents, and lower overall VANET results. Unfortunately,
because of the essential control of the sensors (of his vehicle) directly and technological them for
producing and transmitting the bad traffic info, there is no authentication protocol against such an attack.
3.4. Confidentiality attacks
Confidentiality requires guarantees that unknown entities will never disclose classified information
in the network [43]. It also prevents unauthorized access to private information, including name, plate, and
location. Pseudonyms are used as the most popular technique in-vehicle networks to maintain privacy. That
node of the vehicle will be encoded with many significant pairs. Messages are authenticated or signed with
different psychographs, so this pseudo has not been connected to the vehicle's node; however, it is fixed by
the qualified authority [44]. While attack on confidentiality, confidentiality is a vital safety requirement in-
vehicle communications, guaranteeing that only authorized parties can be receiving the message [17]. In
group communications, this type of security requirement is generally present in which only group members
can read this information.
The remainder of the VANET. General information is transmitted through the remaining VANET
settings. Because VANET mobility is more important than MANET, it is more complicated than Ad hoc to
routing to guarantee security in VANET. Confidentiality of messages exchanged between vehicle network
nodes is particularly vulnerable with techniques such as illegal messaging by eavesdropping and collecting
local information available through broadcasting messages. The intruder will collect information from
existing users around them in the condition of Eavesdropping. Allow using information while the user is
6. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 5, October 2021 : 2627 – 2635
2632
unaware of the set. Security and confidentiality of the location are issues for vehicle drivers [45]. The
following are its description and types:
a. Eavesdropping attack; eavesdropping is widely used in wireless networking technologies such as
MANETs and VANETs. The aim is to obtain confidential information from the safe data. Therefore,
unrequested users can know of the hidden specifications, including user identity theft and data location
that can be used to identify vehicles.
b. Traffic analysis; an attacker analyses the traffic (collection of information/transactions) in this attack. By
involve processing the vehicle network, the attacker collects all the information. The attacker can attack
through a strategy by gathering information such as email addresses, requests, and responses from all
vehicles communicating. It is also a passive attack in which the attacker does not make the data
modifications.
c. Man-in-the-middle attack; this attack is taken from the v2v communication to tightly track and change
communications. The attacker can access and control all V2V traffic, but communications companies
believe they can communicate directly in private [46].
d. Social attack; the social attack is used to distract the focus of the driver. The attacker gives out immoral
and immorality messages to the passengers. The attackers want the drivers to accept such unethical
messages. VANET system often influences the driving actions and efficiency of the vehicle [47].
3.5. Non-repudiation attacks
The attacker may attempt to prevent the delivery of a message to escape liability after transmitting a
message. Failure to repudiate allows attackers to be detected and prevents them from denying their crimes.
All information is registered and stored on TPD to collect details from a formally authorized side [48]. While
attack on non-repudiation, unless the user has the same key, two or three repudiations are not taken out.
Therefore, two users are not differentiated and should not refuse to act. Reliable processing in different
vehicles will avoid the same key. The following description and type as; repudiation attack: this attack
happens if the attacker refuses to take action with sent messages [49].
4. DISCUSSION AND SUMMARY
Some researchers have been working to provide VANET authentication. However, confidentiality
and availability in most studies are negligent. Also, double and related studies have been conducting. The
need for more work on VANET security lies, therefore. Although no risk of immune from VANET can be
assuring. As we know, secure strategies to enhance VANET privacy security must not be introduced with
confidence. The exchange of information between the receiver and the sender must be protected from
changes to improve efficiency. Several have addressed the challenges, but we aim to highlight the most
important ones, including most small-and medium-sized networks and few significant networks. Through the
use of surveys and studies. we are showing as; a) found out that encryption and authentication play a vital
role in VANETS, b) analysis and performance evaluation showed that the proposed ACPN is feasible and
adequate to UVC in the VANET environment for efficient privacy-preserving authentication with non-
repudiation.
Due to the above information and challenges, we suggest in the future, work on; a) they are focusing
on efforts and research on developing algorithms to work with extreme accuracy on large networks and test
them on a huge data set, b) researchers must pay attention to these issues (that availability attacks have a more
significant threat level compared to integrity and authentication) before using the blockchain as a tool to solve
the rest of the problems, c) need new scenarios and simulations of hybrid cryptographic schemes to enhance the
authentication process at low costs and be decentralized before VANET is practically implementing.
In summary, availability uses a group signature technique and interruption for security attacks.
Authentication use certificate authority technique and fabrication for security attacks. Integrity uses a digital
signature with a password technique and modification for security attacks. Confidentiality use encryption and
decryption technique and interception for security attacks. At the same time, non-repudiation use sequence
number and digital signature technique. Finally, confidentiality and authentication more secure than others.
5. CONCLUSION
In an open-access system, security messages are broadcasting VANETs are vulnerable to attack.
Considerations related to VANET are covered, particularly in V2V and V2I. However, confidentiality and
availability are almost non-existent in most studies. The article reviews the latest advancements to fill this
gap and goes in-depth on the reasons and numerous dangers and risks. Furthermore, we discovered that
encryption and authentication are crucial in VANETs. This paper's effectiveness shows that the ACPN is
7. Bulletin of Electr Eng & Inf ISSN: 2302-9285
A review on various security attacks in vehicular ad hoc networks (Mustafa Maad Hamdi)
2633
both feasible and appropriate for effective authentication to UVC in the VANET, according to analysis and
performance evaluations. Also, we discussed security services and threats and attacks toward them. As future
work, we suggest improving security and privacy by including artificial intelligence algorithms.
ACKNOWLEDGEMENTS
"Communication of this research is made possible through monetary assistance by Universiti Tun
Hussein Onn Malaysia and the UTHM Publisher’s Office via Publication Fund E15216"
REFERENCES
[1] H. Hasrouny, A. E. Samhat, C. Bassil, and A. Laouiti, "VANet security challenges and solutions: A survey,"
Vehicular Communications, vol. 7, pp. 7-20, 2017, doi: https://doi.org/10.1016/j.vehcom.2017.01.002.
[2] H. F. Mahdi, M. S. Abood, and M. M. Hamdi, "Performance evaluation for vehicular ad-hoc networks based routing
protocols," Bulletin of Electrical Engineering and Informatics (BEEI), vol. 10, no. 2, pp. 1080-1091, 2021, doi:
10.11591/eei.v10i2.2943.
[3] A. S. Mustafa, M. M. Hamdi, H. F. Mahdi, and M. S. Abood, "VANET: Towards Security Issues Review," in 2020
IEEE 5th International Symposium on Telecommunication Technologies (ISTT), 2020, pp. 151-156, doi:
10.1109/ISTT50966.2020.9279375.
[4] S. N. Pathak and U. Shrawankar, "Secured communication in real time VANET," 2009 Second International
Conference on Emerging Trends in Engineering & Technology, 2009, pp. 1151-1155, doi:
10.1109/ICETET.2009.198.
[5] M. S. Abood, A. S. Mustafa, H. F. Mahdi, A.-F. A. Mohammed, M. M. Hamdi, and N. A. Hussein, "The analysis of
Teletraffic and Handover Performance in Cellular System," in 2021 3rd International Congress on Human-Computer
Interaction, Optimization and Robotic Applications (HORA), 2021, pp. 1-5, doi: 10.1109/HORA52670.2021.9461300.
[6] M. A. Al-shareeda, M. Anbar, I. H. Hasbullah, S. Manickam, N. Abdullah, and M. M. Hamdi, "Review of Prevention
schemes for Replay Attack in Vehicular Ad hoc Networks (VANETs)," in 2020 IEEE 3rd International Conference
on Information Communication and Signal Processing (ICICSP), 2020, pp. 394-398, doi:
10.1109/ICICSP50920.2020.9232047.
[7] M. Hamdi, L. Audah, S. Rashid, A. Mustafa, and M. Abood, "A survey on data dissemination and routing protocol in
VANET: Types challenges opportunistic and future role," International Journal of Advanced Science and Technology,
vol. 29, no. 5, pp. 6473-6482, 2020.
[8] M. A. Al-Shareeda et al., "NE-CPPA: A New and Efficient Conditional Privacy-Preserving Authentication Scheme
for Vehicular Ad Hoc Networks (VANETs)," Appl. Math, vol. 14, no. 6, pp. 1-10, 2020, doi: 10.18576/amis/140602.
[9] M. Noori, R. Sahbudin, M. S. Abood, and M. Hamdi, "A Performance Evaluation of Voice over IP Protocols (SIP and
H. 323) in Wireless Network," EasyChair2516-2314, 2021.
[10] J. Sun, C. Zhang, Y. Zhang, and Y. Fang, "An identity-based security system for user privacy in vehicular ad hoc
networks," IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 9, pp. 1227-1239, Sept. 2010, doi:
10.1109/TPDS.2010.14.
[11] A. Wasef, R. Lu, X. Lin, and X. Shen, "Complementing public key infrastructure to secure vehicular ad hoc networks
[security and privacy in emerging wireless networks]," IEEE Wireless Communications, vol. 17, no. 5, pp. 22-28,
October 2010, doi: 10.1109/MWC.2010.5601954.
[12] S. K. Dhurandher, M. S. Obaidat, A. Jaiswal, A. Tiwari, and A. Tyagi, "Vehicular security through reputation and
plausibility checks," IEEE Systems Journal, vol. 8, no. 2, pp. 384-394, June 2014, doi: 10.1109/JSYST.2013.2245971.
[13] M. A. Al-shareeda, M. Anbar, I. H. Hasbullah, and S. Manickam, "Survey of authentication and privacy schemes in
vehicular ad hoc networks," IEEE Sensors Journal, 15 Jan.15, 2021, doi: 10.1109/JSEN.2020.3021731.
[14] M. S. Abood, M. M. Hamdi, A. S. Mustafa, Y. A. Najem, S. A. Rashid, and I. J. Saeed, "Analysis and Simulation for
Mobile Ad Hoc Network Using QualNet Simulator," in International Conference on Intelligent Systems Design and
Applications, 2020, pp. 689-700: Springer, doi: 10.1007/978-3-030-71187-0_63.
[15] S. A. Rashid, L. Audah, M. M. Hamdi, M. S. Abood, and S. Alani, "Reliable and efficient data dissemination scheme
in VANET: a review," International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 6, pp.
6423-6434, 2020, doi: 10.11591/ijece.v10i6.pp6423-6434.
[16] M. M. Hamdi, O. A. R. Al-Dosary, O. A. S. Alrawi, A. S. Mustafa, M. S. Abood, and M. S. Noori, "An overview of
challenges for data dissemination and routing protocols in VANETs," in 2021 3rd International Congress on Human-
Computer Interaction, Optimization and Robotic Applications (HORA), 2021, pp. 1-6, doi:
10.1109/HORA52670.2021.9461396.
[17] R. Hussain, F. Hussain, and S. Zeadally, "Integration of VANET and 5G Security: A review of design and
implementation issues," Future Generation Computer Systems, vol. 101, pp. 843-864, 2019, doi:
10.1016/j.future.2019.07.006.
[18] G. Samara and Y. Al-Raba'nah, "Security issues in vehicular ad hoc networks (VANET): a survey," arXiv preprint
arXiv:1712.04263, 2017.
[19] M. S. Sheikh, J. Liang, and W. Wang, "A survey of security services, attacks, and applications for vehicular ad hoc
networks (vanets)," Sensors, vol. 19, no. 16, p. 3589, 2019.
[20] S. S. Manvi and S. Tangade, "A survey on authentication schemes in VANETs for secured communication,"
Vehicular Communications, vol. 9, pp. 19-30, 2017, doi: 10.1016/j.vehcom.2017.02.001.
8. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 5, October 2021 : 2627 – 2635
2634
[21] R. G. Engoulou, M. Bellaïche, S. Pierre, and A. Quintero, "VANET security surveys," Computer Communications,
vol. 44, pp. 1-13, 2014, doi: 10.1016/j.comcom.2014.02.020.
[22] M. M. Hamdi, Y. A. Yussen, and A. S. Mustafa, "Integrity and Authentications for service security in vehicular ad hoc
networks (VANETs): A Review," 2021 3rd International Congress on Human-Computer Interaction, Optimization
and Robotic Applications (HORA), 2021, pp. 1-7, doi: 10.1109/HORA52670.2021.9461327.
[23] M. A. Al-Shareeda, M. Anbar, S. Manickam, and I. H. Hasbullah, "Review of prevention schemes for modification
attack in vehicular ad hoc networks," International Journal of Engineering and Management Research, vol. 10, 2020,
doi: 10.2139/ssrn.3662927.
[24] M. A. H. Al Junaid, A. Syed, M. N. M. Warip, K. N. F. K. Azir, and N. H. Romli, "Classification of security attacks in
VANET: A review of requirements and perspectives," in MATEC Web of Conferences, 2018, vol. 150, doi:
10.2139/ssrn.3662927.
[25] A. Quyoom, A. A. Mir, and A. Sarwar, "Security Attacks and Challenges of VANETs: A Literature Survey," Journal
of Multimedia Information System, vol. 7, no. 1, pp. 45-54, 2020, doi: 10.33851/JMIS.2020.7.1.45.
[26] K.-M. Kouame and H. Mcheick, "Architectural QoS pattern to guarantee the expected quality of services at runtime
for context-aware adaptation application," SN Applied Sciences, vol. 1, no. 5, p. 405, 2019, doi: 10.1007/s42452-019-
0415-6.
[27] M. A. Al-Shareeda, M. Anbar, I. H. Hasbullah, S. Manickam, and S. M. Hanshi, "Efficient conditional privacy
preservation with mutual authentication in vehicular ad hoc networks," IEEE Access, 2020.
[28] E. Talavera, A. D. Álvarez, and J. E. Naranjo, "A review of security aspects in vehicular ad-hoc networks," in IEEE
Access, vol. 8, pp. 144957-144968, 2020, doi: 10.1109/ACCESS.2020.3014678.
[29] J. Cui, L. S. Liew, G. Sabaliauskaite, and F. Zhou, "A review on safety failures, security attacks, and available
countermeasures for autonomous vehicles," Ad Hoc Networks, vol. 90, p. 101823, 2019, doi:
10.1016/j.adhoc.2018.12.006.
[30] S. K. Bhoi and P. M. Khilar, "Vehicular communication: a survey," IET networks, vol. 3, no. 3, pp. 204-217, 2013,
doi: 10.1049/iet-net.2013.0065.
[31] M. M. Hamdi, L. Audah, S. A. Rashid, and S. Alani, "VANET-based traffic monitoring and incident detection system:
A review," International Journal of Electrical & Computer Engineering (2088-8708), vol. 11, no. 4, 2021, doi:
10.11591/ijece.v11i4.pp3193-3200.
[32] M. Whaiduzzaman, M. Sookhak, A. Gani, and R. Buyya, "A survey on vehicular cloud computing," Journal of
Network and Computer applications, vol. 40, pp. 325-344, 2014, doi: 10.1016/j.jnca.2013.08.004.
[33] J. Cui, L. Wei, J. Zhang, Y. Xu, and H. Zhong, "An efficient message-authentication scheme based on edge computing
for vehicular ad hoc networks," IEEE Transactions on Intelligent Transportation Systems, vol. 20, no. 5, pp. 1621-
1632, 2018, May 2019, doi: 10.1109/TITS.2018.2827460.
[34] A. Daeinabi and A. G. Rahbar, "Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc
Networks," Multimedia tools and applications, vol. 66, no. 2, pp. 325-338, 2013, doi: 10.1007/s11042-011-0789-y.
[35] A. F. Femi, "Perception of performance appraisal and workers’ performance in Wema Bank Headquarters, Lagos,"
Global Journal of Arts, Humanities and Social Sciences, vol. 1, no. 4, pp. 89-101, 2013.
[36] A. Y. Dak, S. Yahya, and M. Kassim, "A literature survey on security challenges in VANETs," International Journal
of Computer Theory and Engineering, vol. 4, no. 6, p. 1007, 2012.
[37] S. Zeadally, R. Hunt, Y.-S. Chen, A. Irwin, and A. Hassan, "Vehicular ad hoc networks (VANETS): status, results,
and challenges," Telecommunication Systems, vol. 50, no. 4, pp. 217-241, 2012, doi: 10.1007/s11235-010-9400-5.
[38] S. Benkerdagh and C. Duvallet, "Cluster‐ based emergency message dissemination strategy for VANET using V2V
communication," International Journal of Communication Systems, vol. 32, no. 5, p. e3897, 2019, doi:
10.1002/dac.3897.
[39] C. Sun, J. Liu, X. Xu, and J. Ma, "A privacy-preserving mutual authentication resisting DoS attacks in VANETs,"
IEEE Access, vol. 5, pp. 24012-24022, 2017, doi: 10.1109/ACCESS.2017.2768499.
[40] T. Karimireddy and A. G. A. Bakshi, "A hybrid security framework for the vehicular communications in VANET," in
2016 international conference on wireless communications, signal processing and networking (WiSPNET), 2016, pp.
1929-1934, doi: 10.1109/WiSPNET.2016.7566479.
[41] A. Festag, "Cooperative intelligent transport systems standards in Europe," in IEEE communications magazine, vol.
52, no. 12, pp. 166-172, December 2014, doi: 10.1109/MCOM.2014.6979970.
[42] B. Parno and A. Perrig, "Challenges in securing vehicular networks," in Workshop on hot topics in networks (HotNets-
IV), 2005, pp. 1-6: Maryland, USA.
[43] I. A. Sumra, I. Ahmad, and H. Hasbullah, "Classes of attacks in VANET," in 2011 Saudi International Electronics,
Communications and Photonics Conference (SIECPC), 2011, pp. 1-5, doi: 10.1109/SIECPC.2011.5876939..
[44] M. Abu Talib, S. Abbas, Q. Nasir, and M. F. Mowakeh, "Systematic literature review on Internet-of-Vehicles
communication security," International Journal of Distributed Sensor Networks, vol. 14, no. 12, 2018, doi:
10.1177/1550147718815054.
[45] J.-C. Xi, Q.-Q. Kong, and X.-G. Wang, "Spatial polarization of villages in tourist destinations: A case study from
Yesanpo, China," Journal of Mountain Science, vol. 12, no. 4, pp. 1038-1050, 2015, doi: 10.1007/s11629-014-3358-9.
[46] M. L. Das, A. Saxena, V. P. Gulati, and D. B. Phatak, "A novel remote user authentication scheme using bilinear
pairings," Computers & Security, vol. 25, no. 3, pp. 184-189, 2006, doi: 10.1016/j.cose.2005.09.002.
[47] M. Raya and J.-P. Hubaux, "Security aspects of inter-vehicle communications," in 5th Swiss Transport Research
Conference (STRC), 2005, no. CONF.
9. Bulletin of Electr Eng & Inf ISSN: 2302-9285
A review on various security attacks in vehicular ad hoc networks (Mustafa Maad Hamdi)
2635
[48] G. Samara, W. A. Al-Salihy, and R. Sures, "Security issues and challenges of vehicular ad hoc networks (VANET),"
4th International Conference on New Trends in Information Science and Service Science, 2010, pp. 393-398.
[49] M. Azees, P. Vijayakumar, and L. J. Deborah, "Comprehensive survey on security services in vehicular ad-hoc
networks," IET Intelligent Transport Systems, vol. 10, no. 6, pp. 379-388, 2016.
BIOGRAPHIES OF AUTHORS
Mustafa Maad Hamdi was born in Al-Anbar, Iraq. He received the B.Eng. degree in
Computer Engineering Technology from Al-Maarif University College, Iraq. and the M.Sc.
degree in Communication and Computer Engineering from University Kebangsaan Malaysia
(UKM), Malaysia. He is currently pursuing the Ph.D. degree in the department of
communication engineering, University Tun Hussein Onn Malaysia (UTHM), Malaysia. His
research interests include Wireless and Mobile Communications, VANET, MANET and
Satellite Communication, and Cryptographic.
Lukman Audah was born in Kuala Lumpur, Malaysia. He received the B.Eng. degree in
telecommunications from Universiti Teknologi Malaysia, in 2005, and the M.Sc. degree in
communication networks and software and the Ph.D. degree in electronic engineering from the
university of Surrey, U.K. He is currently a lecturer with the communication engineering
Department, University Tun Hussein Onn Malaysia. His research interests include wireless and
mobile communications, Internet traffic engineering, network system management, data
security, and satellite communication.
Mohammed Salah Abood was born in Baghdad, Iraq, in 1981. He received the B.Eng.
Degree in computer engineering from University of Technology, Baghdad-Iraq, in 2004, and
the master's degree in communication and computer engineering, University Kebangsaan
Malaysia (UKM), Malaysia, in 2016. He is currently studying toward the PhD degree in the
field of information and communication engineering in Beijing Institute of Technology (BIT),
Beijing, China, starting on 2019. His current research interests include network function
virtualization. 5G.
Sami Abduljabbar Rashid was born in Al-Anbar, Iraq. He received the B.Eng. degree in
computer engineering technology from Al-Maarif University College, Iraq. and the M.Sc.
degree in communication and computer engineering from Universiti Kebangsaan Malaysia
(UKM), Malaysia. He is currently pursuing the Ph.D. degree in the department of
communication engineering, University Tun Hussein Onn Malaysia (UTHM), Malaysia. His
research interests include wireless and mobile communications and VANET.
Ahmed Shamil Mustafa received his Master of Communication and Computer Engineering
from Universiti Kebangsaan Malaysia (UKM), Malaysia in 2015. Currently serving as a
lecturer in the Department of Computer Engineering Techniques at Al Maarif University
College. He is highly interested in Communication, Computer Engineering, Image Signal
Processing, and Digital Signal Processing (DSP).
Hussain Mahdi is a lecturer at Computer and Software, College of Engineering, University of
Diyala, Iraq. He received the PhD from university of Kebangsaan Malaysia and Master of
Science from University of Technology, Bagdad, Iraq. He is IEEE Region 10 Humanitarian
activities committee (2017-2020), IEEE PES Young Professional Committee academic lead
(2017-2020), IEEE IAS Chapters Area Chair, R10 Southeast Asia, Australia and Pacific
(2018-2019), and IEEE Region 10 PES students Chapters Chair (2019-2020), IEEE PES Day
2019 Global Chair, and IEEE HAC Event committee member 2019-2020.
Ahmed Shakir Al-Hiti received his B.Eng in Electrical Engineering from the University of
Baghdad, Iraq in 2008, computer Engineering from Al-Maarif University College, Iraq in
2012, and received his M.Sc. in communications and networks Engineering from University
Putra Malaysia, Malaysia in 2017. He is currently working as a researcher in fiber lasers at the
University of Malaya. His research interests include networks, control systems, wireless
communications, photonics, and laser-plasma accelerators.