A vehicular ad-hoc network (VANETs) is emerging technology in wireless ad-hoc
network.VANETs are dope out to improve vehicular safety and manage the traffic in the urban areas. Adaptive
slot assignment strategy with fuzzy logic are used with multipath routing mechanism with TDMA allocation to
limit the collision rate and improve the energy and reduce stoppage in the vehicle statement. In this paper, an
interruption avoidance protocol that are integrated with digital signature and game theory approach with Road
side unit control to enhance the security and protecting the VANET environment. Using this intrusion
prevention protocol is implemented to examine the various parameter values to provide the Quality of Service,
inter –vehicle and intra-vehicle security in the zone with security showed with the simulated results.
Vehicular ad-hoc networks (VANETs) technology has come out as an important research field over the last few years. VANETs are the likely an influencing approach to provide safety of driver and other applications for the traffic conditions as well as passengers. Being dynamic in nature, it establishes the network, according to the situation and need of the users and provides reliable communication among the vehicles. Due to its great benefits, it is highly vulnerable to various attacks and security in VANET should be taken into consideration. This paper presented the security attacks between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). Many research works have been done to improve the performance and security of this network. The main aim of this paper is the security using hashing and techniques to calculate the trust in VANETs.
Vehicular Ad hoc Network (VANET) is the furthermost remarkable and an advantageous technique for the research field for improving the security and protection of drivers and passengers. It is an interesting subclass of Mobile Ad-hoc Network, which authorizes smart communication between vehicles furthermore in the middle of the vehicle and roadside frameworks. It is an application of a wireless network for witching the data – to the domain of vehicles. For the creation of trustful surroundings, trust can be practiced to increase the safety in vehicular networks, which is a major section of security. Trust can be considered by directly observing the human actions or indirectly by getting the neighbor's opinion which produces a trusted communicating environment. They turn into a principal component of intelligent transportation systems. There is a transitivity model in the existing work in which the Authentication Server (AS) provides the authority to Law Executor (LE) for authenticating the other vehicles as a trustful vehicle. So in proposed work a new technique in which there is no vehicle in the network to provide the authority. Trust is estimated by the nodes, then this value sends to the AS where this value is calculated and updated regularly. This method enhances the security of the network. NS2 simulator is used for the overall operation of the proposed work and throughput, PDR and routing overhead show the efficiency of the network.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Vehicular ad-hoc networks (VANETs) technology has come out as an important research field over the last few years. VANETs are the likely an influencing approach to provide safety of driver and other applications for the traffic conditions as well as passengers. Being dynamic in nature, it establishes the network, according to the situation and need of the users and provides reliable communication among the vehicles. Due to its great benefits, it is highly vulnerable to various attacks and security in VANET should be taken into consideration. This paper presented the security attacks between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). Many research works have been done to improve the performance and security of this network. The main aim of this paper is the security using hashing and techniques to calculate the trust in VANETs.
Vehicular Ad hoc Network (VANET) is the furthermost remarkable and an advantageous technique for the research field for improving the security and protection of drivers and passengers. It is an interesting subclass of Mobile Ad-hoc Network, which authorizes smart communication between vehicles furthermore in the middle of the vehicle and roadside frameworks. It is an application of a wireless network for witching the data – to the domain of vehicles. For the creation of trustful surroundings, trust can be practiced to increase the safety in vehicular networks, which is a major section of security. Trust can be considered by directly observing the human actions or indirectly by getting the neighbor's opinion which produces a trusted communicating environment. They turn into a principal component of intelligent transportation systems. There is a transitivity model in the existing work in which the Authentication Server (AS) provides the authority to Law Executor (LE) for authenticating the other vehicles as a trustful vehicle. So in proposed work a new technique in which there is no vehicle in the network to provide the authority. Trust is estimated by the nodes, then this value sends to the AS where this value is calculated and updated regularly. This method enhances the security of the network. NS2 simulator is used for the overall operation of the proposed work and throughput, PDR and routing overhead show the efficiency of the network.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Data Aggregation and Dissemination in Vehicular Ad-Hoc NetworksMichele Weigle
Khaled Ibrahim's PhD Defense Slides
Department of Computer Science
Old Dominion University
February 21, 2011
Note: You may need to download the file to see all of the animations.
Master Thesis on Vehicular Ad-hoc Network (VANET)Prof Ansari
In present, many people during the public died each year in vehicle accidents, therefore in almost countries some safety data i.e. traffic lights & velocity limits are applied, simply however it is not a better solution. Also government and number of automation industries regarded that vehicular safety is real challenging task [1]. Then equally result, to enhance people traffic safety of a new progressed particular technology is formulated i.e. VANET [4]. It is progress type of MANET (Mobile Ad-hoc Network). VANET manages a network within which vehicles are act nodes and applied as mobile nodes to construct a robust infrastructure-less ad-hoc network. In Figure 1 illustrates the basic components of VANET architecture. It builds the network among Inter-Vehicle, Vehicle-to-Roadside and Inter-Roadside communicating networks [4]. Moreover, apart from accidental-safety and security types, there are also broad varieties of applications in VANET are available and potential that can extend passenger comfort like predictable mobility by GPS, web browsing and information modify and so on. Vehicular Ad-hoc Network (VANET) is a novel formulated form of Mobile Ad-hoc Network (MANET), where moving nodes are vehicles same automobiles, cars, buses etc [2].
A Broadcasting Scheme for Message Dissemination in VANETIJERA Editor
Vehicular Ad hoc Networks [VANET] is one of the fastest emerging technologies for research as there are many issues and challenges to be addressed by the researchers before the technology becomes commercialized. Vehicular communication systems developed largely by the growing interest in intelligent transportation systems [ITS]. Cooperative driving can improve safety and efficiency by enabling vehicles to exchange emergency messages to each other in the neighborhood and to assist driver in making proper decision to avoid vehicle collisions and congestion. Broadcast transmission is usually used for disseminating safety related information among vehicles. Message Broadcast over wireless networks poses many challenges due to link unreliability, hidden terminal, message redundancy, and broadcast storm, etc., which greatly degrade the network performance. In most of the emergency situations, there is less time to make a handshake with other nodes in the networks, as the emergency message is to be delivered fast and efficient. Broadcasting information is usually very costly and without limiting techniques this will result in serious data redundancy, contention and collisions. This work focuses on Broadcasting Scheme for Message Dissemination.
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...pijans
Vehicular ad hoc networks (VANETS) have actually attracted a lot of attention over the last few years as
being used to improve road safety. In this paper, cluster based technique has been introduced in VANET.
As VANET is a new form of MANET, so with this cluster based technique in VANET, several handoff
problems have been removed, which were actually difficult to remove in MANET. For this traffic
infrastructure cluster based routing has been used, with two routing protocols i.e. AODV and AODV+. The
network simulator NS2 has been used for removing unpredictable movements that may arise in the network.
Master thesis on Vehicular Ad hoc Networks (VANET)Prof Ansari
The increasing demand for wireless devices and wireless communication tends to research on self-organizing, self-healing networks without the interference of any pre-established or centralized infrastructure/authority [2]. The networks with the absence of any pre-established or centralized authority are known as Ad hoc networks [4]. Ad hoc Networks are the kind of wireless networks that uses multi-hop radio relay.There are many comparative studies and surveys that compare various ad hoc routing in VANET environment. The simulations performed in these comparative studies are very basic do not incorporate with a large number of nodes in real Vehicular Ad hoc Network environment. The main aim of our dissertation work is to firstly investigate the reactive and proactive routeing protocols than examine the performance of selected reactive routing protocols i.e. Destination Sequence Distance Vector Routing (DSDV), Ad hoc On-Demand Distance Vector (AODV), Optimized Link State Routing (OLSR) and Dynamic Source Routing (DSR)by taking three performance metrics like network load, throughput and end-to-end delay with varying number of mobile nodes or vehicle node densityOPNET: Optimized Network Engineering Tool (OPNET) is a commercial network simulator environment used for simulations of both wired and wireless networks [20]. Several different OPNET versions have been released over the last few years; the latest version of OPNET is the OPNET 16.0. At present OPNET is licensed under Riverbed technologies. It allows the user to design and study the network communication devices, protocols, individual applications and also simulate the performance of routing protocol. It supports many wireless technologies and standards such as, IEEE 802.11, IEEE 802.15.1, IEEE 802.16, IEEE 802.20 and satellite networks. OPNET IT Guru Academic Edition is available for free to the academic research and teaching community.
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
Vehicular ad-hoc networks (VANETs) technology has turned out as a vital research field throughout the most recent couple of years. VANETs are the likely an impacting way to deal with giving security of driver and different applications for the activity conditions and additionally travelers. Being dynamic in nature, it created the network, according to the condition and requirement of the users and provides consistent communication between the vehicles. Due to its excessive advantages, it is highly susceptible to numerous attacks and security in VANET should be taken into consideration. This paper presented the security issues such as authenticity, integrity, availability, confidentiality, anonymity and non-repudiation to provide the secure communication between Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I). Numerous research works have been done to recover the performance and security of this network. The fundamental point of this paper is the several security challenges and the applications of VANETs.
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...University of Piraeus
Fifth generation (5G) vehicular systems support multiple services with strict Quality of Service (QoS) constraints. To fulfill the increased communication needs, 5G Vehicular Cloud Computing (5G-VCC) architectures with dense deployments of the access network infrastructures have been proposed. In such systems, the network resources manipulation is a critical task that could be addressed by the Medium Access Control (MAC) layer. MAC schemes that have been proposed for vehicular networks, can be applied to 5G-VCC systems in order optimal manipulation of communication resources to be accomplished. This paper makes an overview of available MAC schemes, while a comprehensive discussion about their implementation in 5G-VCC systems is performed leading to useful conclusions.
Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocolijsrd.com
Vehicular Ad Hoc Networks (VANET) belong to a subclass of Mobile ad hoc networks . VANET provides a distinguished approach for Intelligent Transport System (ITS). VANET has become an active area of research and development since it has tremendous potential to improve vehicle and road safety, traffic efficiency, and convenience as well as comfort to both drivers and passengers. In this paper we discuss the characteristics and architecture of VANET. Further we provide an overview of Greedy Perimeter Stateless Routing Protocol. Efficient routing protocols are essential for smart ITS.
The main aim of this dissertation is to evaluate the performance of Four routing protocols i.e. Destination Sequence Distance Vector Routing (DSDV), Ad hoc On Demand Distance Vector (AODV),survey over vanet routing protocols for vehicle to vehicle communication
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Dr. Amarjeet Singh
Vehicular Ad-hoc Network (VANET) technology is the basis of Intelligent Transportation System (ITS) connectivity that enables the delivery of useful information to and fro between vehicles in vehicle-to-vehicle communication mode; or between vehicle and infrastructure in vehicle-to-infrastructure mode for safety and comfort. However, due to the openness of the wireless medium used by VANET, the technology is vulnerable to security threats in both communication modes. In this study, the essential background of VANET from architectural point of view and communication types are discussed. Then, the overview of modification attack in VANET is presented. In addition, this paper thoroughly reviews the existing prevention schemes for modification attack in VANET. This review paper reveals that there is still a need for a better and more efficient preventive scheme to address the modification attack in VANET.
vehicular Ad-Hoc Network:
this report contains a brief description on the VANET which can be considered as an application of MANET...
The report contains a basic overview, ITS, and routing algorithms.
This PowerPoint covers VANET in general and illustrates its Components, standards, applications,Types of communications
Fleet Management Systems, Routing protocols, Challenges, and the deployment of VANET in Real Scenarios
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
Designing a protocol structure which contains the control system, VANET device and the type of communication message structures which will implement the message packets for v2v or v2I infrastructure . The different message packets contain the information required to transfer from one node to another in vehicular network for communication. Design various algorithm required for Control, Alert and Infotainment messages. Time stamping lowering data rate efficient packet delivery and proper communication of required messages. Implementation of proposed algorithms and comparison of them with existing algorithms and study of different factors affecting the working of theses algorithms. Analysis of proposed design approach and improvements in results if required.
Predictive Data Dissemination in VanetDhruvMarothi
The vehicle itself is an information source that produces a large amount of various information including actual vehicle and environment sensors. The implementation of an efficient and scalable model for information dissemination in VANETs possesses major issues. In this dynamic environment, an ever-growing number of context dissemination messages are leveling up the usage of the channel which affects the network performance. This presentation tries to analyze and assess the key ideas of how to overcome the context data dissemination and how to reduce the amounts of transferred and stored data in a vehicular cooperation environment. This is one of the most prominent topics of pervasive computing.
Data Aggregation and Dissemination in Vehicular Ad-Hoc NetworksMichele Weigle
Khaled Ibrahim's PhD Defense Slides
Department of Computer Science
Old Dominion University
February 21, 2011
Note: You may need to download the file to see all of the animations.
Master Thesis on Vehicular Ad-hoc Network (VANET)Prof Ansari
In present, many people during the public died each year in vehicle accidents, therefore in almost countries some safety data i.e. traffic lights & velocity limits are applied, simply however it is not a better solution. Also government and number of automation industries regarded that vehicular safety is real challenging task [1]. Then equally result, to enhance people traffic safety of a new progressed particular technology is formulated i.e. VANET [4]. It is progress type of MANET (Mobile Ad-hoc Network). VANET manages a network within which vehicles are act nodes and applied as mobile nodes to construct a robust infrastructure-less ad-hoc network. In Figure 1 illustrates the basic components of VANET architecture. It builds the network among Inter-Vehicle, Vehicle-to-Roadside and Inter-Roadside communicating networks [4]. Moreover, apart from accidental-safety and security types, there are also broad varieties of applications in VANET are available and potential that can extend passenger comfort like predictable mobility by GPS, web browsing and information modify and so on. Vehicular Ad-hoc Network (VANET) is a novel formulated form of Mobile Ad-hoc Network (MANET), where moving nodes are vehicles same automobiles, cars, buses etc [2].
A Broadcasting Scheme for Message Dissemination in VANETIJERA Editor
Vehicular Ad hoc Networks [VANET] is one of the fastest emerging technologies for research as there are many issues and challenges to be addressed by the researchers before the technology becomes commercialized. Vehicular communication systems developed largely by the growing interest in intelligent transportation systems [ITS]. Cooperative driving can improve safety and efficiency by enabling vehicles to exchange emergency messages to each other in the neighborhood and to assist driver in making proper decision to avoid vehicle collisions and congestion. Broadcast transmission is usually used for disseminating safety related information among vehicles. Message Broadcast over wireless networks poses many challenges due to link unreliability, hidden terminal, message redundancy, and broadcast storm, etc., which greatly degrade the network performance. In most of the emergency situations, there is less time to make a handshake with other nodes in the networks, as the emergency message is to be delivered fast and efficient. Broadcasting information is usually very costly and without limiting techniques this will result in serious data redundancy, contention and collisions. This work focuses on Broadcasting Scheme for Message Dissemination.
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...pijans
Vehicular ad hoc networks (VANETS) have actually attracted a lot of attention over the last few years as
being used to improve road safety. In this paper, cluster based technique has been introduced in VANET.
As VANET is a new form of MANET, so with this cluster based technique in VANET, several handoff
problems have been removed, which were actually difficult to remove in MANET. For this traffic
infrastructure cluster based routing has been used, with two routing protocols i.e. AODV and AODV+. The
network simulator NS2 has been used for removing unpredictable movements that may arise in the network.
Master thesis on Vehicular Ad hoc Networks (VANET)Prof Ansari
The increasing demand for wireless devices and wireless communication tends to research on self-organizing, self-healing networks without the interference of any pre-established or centralized infrastructure/authority [2]. The networks with the absence of any pre-established or centralized authority are known as Ad hoc networks [4]. Ad hoc Networks are the kind of wireless networks that uses multi-hop radio relay.There are many comparative studies and surveys that compare various ad hoc routing in VANET environment. The simulations performed in these comparative studies are very basic do not incorporate with a large number of nodes in real Vehicular Ad hoc Network environment. The main aim of our dissertation work is to firstly investigate the reactive and proactive routeing protocols than examine the performance of selected reactive routing protocols i.e. Destination Sequence Distance Vector Routing (DSDV), Ad hoc On-Demand Distance Vector (AODV), Optimized Link State Routing (OLSR) and Dynamic Source Routing (DSR)by taking three performance metrics like network load, throughput and end-to-end delay with varying number of mobile nodes or vehicle node densityOPNET: Optimized Network Engineering Tool (OPNET) is a commercial network simulator environment used for simulations of both wired and wireless networks [20]. Several different OPNET versions have been released over the last few years; the latest version of OPNET is the OPNET 16.0. At present OPNET is licensed under Riverbed technologies. It allows the user to design and study the network communication devices, protocols, individual applications and also simulate the performance of routing protocol. It supports many wireless technologies and standards such as, IEEE 802.11, IEEE 802.15.1, IEEE 802.16, IEEE 802.20 and satellite networks. OPNET IT Guru Academic Edition is available for free to the academic research and teaching community.
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
Vehicular ad-hoc networks (VANETs) technology has turned out as a vital research field throughout the most recent couple of years. VANETs are the likely an impacting way to deal with giving security of driver and different applications for the activity conditions and additionally travelers. Being dynamic in nature, it created the network, according to the condition and requirement of the users and provides consistent communication between the vehicles. Due to its excessive advantages, it is highly susceptible to numerous attacks and security in VANET should be taken into consideration. This paper presented the security issues such as authenticity, integrity, availability, confidentiality, anonymity and non-repudiation to provide the secure communication between Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I). Numerous research works have been done to recover the performance and security of this network. The fundamental point of this paper is the several security challenges and the applications of VANETs.
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...University of Piraeus
Fifth generation (5G) vehicular systems support multiple services with strict Quality of Service (QoS) constraints. To fulfill the increased communication needs, 5G Vehicular Cloud Computing (5G-VCC) architectures with dense deployments of the access network infrastructures have been proposed. In such systems, the network resources manipulation is a critical task that could be addressed by the Medium Access Control (MAC) layer. MAC schemes that have been proposed for vehicular networks, can be applied to 5G-VCC systems in order optimal manipulation of communication resources to be accomplished. This paper makes an overview of available MAC schemes, while a comprehensive discussion about their implementation in 5G-VCC systems is performed leading to useful conclusions.
Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocolijsrd.com
Vehicular Ad Hoc Networks (VANET) belong to a subclass of Mobile ad hoc networks . VANET provides a distinguished approach for Intelligent Transport System (ITS). VANET has become an active area of research and development since it has tremendous potential to improve vehicle and road safety, traffic efficiency, and convenience as well as comfort to both drivers and passengers. In this paper we discuss the characteristics and architecture of VANET. Further we provide an overview of Greedy Perimeter Stateless Routing Protocol. Efficient routing protocols are essential for smart ITS.
The main aim of this dissertation is to evaluate the performance of Four routing protocols i.e. Destination Sequence Distance Vector Routing (DSDV), Ad hoc On Demand Distance Vector (AODV),survey over vanet routing protocols for vehicle to vehicle communication
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Dr. Amarjeet Singh
Vehicular Ad-hoc Network (VANET) technology is the basis of Intelligent Transportation System (ITS) connectivity that enables the delivery of useful information to and fro between vehicles in vehicle-to-vehicle communication mode; or between vehicle and infrastructure in vehicle-to-infrastructure mode for safety and comfort. However, due to the openness of the wireless medium used by VANET, the technology is vulnerable to security threats in both communication modes. In this study, the essential background of VANET from architectural point of view and communication types are discussed. Then, the overview of modification attack in VANET is presented. In addition, this paper thoroughly reviews the existing prevention schemes for modification attack in VANET. This review paper reveals that there is still a need for a better and more efficient preventive scheme to address the modification attack in VANET.
vehicular Ad-Hoc Network:
this report contains a brief description on the VANET which can be considered as an application of MANET...
The report contains a basic overview, ITS, and routing algorithms.
This PowerPoint covers VANET in general and illustrates its Components, standards, applications,Types of communications
Fleet Management Systems, Routing protocols, Challenges, and the deployment of VANET in Real Scenarios
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
Designing a protocol structure which contains the control system, VANET device and the type of communication message structures which will implement the message packets for v2v or v2I infrastructure . The different message packets contain the information required to transfer from one node to another in vehicular network for communication. Design various algorithm required for Control, Alert and Infotainment messages. Time stamping lowering data rate efficient packet delivery and proper communication of required messages. Implementation of proposed algorithms and comparison of them with existing algorithms and study of different factors affecting the working of theses algorithms. Analysis of proposed design approach and improvements in results if required.
Predictive Data Dissemination in VanetDhruvMarothi
The vehicle itself is an information source that produces a large amount of various information including actual vehicle and environment sensors. The implementation of an efficient and scalable model for information dissemination in VANETs possesses major issues. In this dynamic environment, an ever-growing number of context dissemination messages are leveling up the usage of the channel which affects the network performance. This presentation tries to analyze and assess the key ideas of how to overcome the context data dissemination and how to reduce the amounts of transferred and stored data in a vehicular cooperation environment. This is one of the most prominent topics of pervasive computing.
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksIJCNCJournal
For creating a mobile network, the moving cars consider as nodes in the Vehicular Ad-Hoc Networks (VANETs). Each participating car is turned into a wireless router in the VANETs that allows the connecting and creating a network. To improve the comfort and safety of driving of automotive users, the vehicular environment system develops in the vehicular environment systems using the wireless access. The channel congestion causes the degradation of quality of service in such cases with higher vehicle density. The real-time and reliable communication is required for various safety applications of VANETs. The dense traffic network has included one of the major challenges as avoiding the communication channels’ degradation. To provide the network with efficient operation, most of the studies are recommended to use the appropriate congestion control methods. It’s important to note that many congestion control mechanisms are not implemented for event-driven real-time safety messages. Based on the congestion probability approach estimation, CFRS-CP-Congestion free route selection is introduced for minimizing the total number of data flow packets that passing through the congested nodes. At each node, the congestion probability is estimated using the proposed technique of CFRS-CP based on link quality, MAC overhead, neighbour density & vehicle velocity. Then, the estimated congestion probability is used for route assessment. The estimated probability value is appended to the control packets for comparison. All the available routes are assessed based on the estimated congestion probability which results in congestion free routing path for every round of data communication. The simulation results prove that the proposed method decreases end to end delay by 32% and improves PDR up to 30% and throughput up to 45% compared to the existing protocols.
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSIJCNCJournal
For creating a mobile network, the moving cars consider as nodes in the Vehicular Ad-Hoc Networks
(VANETs). Each participating car is turned into a wireless router in the VANETs that allows the
connecting and creating a network. To improve the comfort and safety of driving of automotive users, the
vehicular environment system develops in the vehicular environment systems using the wireless access. The
channel congestion causes the degradation of quality of service in such cases with higher vehicle density.
The real-time and reliable communication is required for various safety applications of VANETs. The
dense traffic network has included one of the major challenges as avoiding the communication channels’
degradation. To provide the network with efficient operation, most of the studies are recommended to use
the appropriate congestion control methods. It’s important to note that many congestion control
mechanisms are not implemented for event-driven real-time safety messages. Based on the congestion
probability approach estimation, CFRS-CP-Congestion free route selection is introduced for minimizing
the total number of data flow packets that passing through the congested nodes. At each node, the
congestion probability is estimated using the proposed technique of CFRS-CP based on link quality, MAC
overhead, neighbour density & vehicle velocity. Then, the estimated congestion probability is used for
route assessment. The estimated probability value is appended to the control packets for comparison. All
the available routes are assessed based on the estimated congestion probability which results in congestion
free routing path for every round of data communication. The simulation results prove that the proposed
method decreases end to end delay by 32% and improves PDR up to 30% and throughput up to 45%
compared to the existing protocols.
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...IJLT EMAS
VCN is Vehicular Cloud Network which is the combination of VANET and cloud. Vehicular ad hoc networks (VANETs) technology has been used in many of the applications such as avoiding traffic jam on roadways and airways, preventing the vehicles from accidents and so on. It serve as one of the best platform to meet with group-oriented services which comes under one of the primary application classes. Multicast routing is used to support such services. In such cases one must have to ensure better packet delivery ratio, lower delays and reduced control overheads. Thus, there is a need to design stable and reliable multicast routing protocols for VANETs. In this paper, we proposed a Receiver Based Multicast Routing Protocol that finds a best way to perform the multicast traffic. RBMulticast stores destination list inside the packet header, this destination list provides information on all multicast members to which this packet is targeted .And it stores the traced information or data in the cloud for given period of time. Thus, the multicast tree is not required for this process and therefore no tree state stored at the intermediate nodes.
A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)IAEME Publication
Since Vehicular ad hoc networks (VANETs) are vulnerable to various kinds of attacks, there is a need to fulfill the security requirements like message privacy, integrity, and authentication. The authentication technique is said to be efficient if it detects compromised nodes accurately with less complexity, reduced authentication delay, and keying overhead. In this paper, a threshold-based authentication scheme for cluster-based VANETs is proposed. The vehicles are clustered, and the threshold degree of each node is estimated. The threshold degree is a combination of direct threshold degree and indirect threshold degree. Based on this estimated threshold degree, cluster heads are selected. Then, each vehicle is monitored by a set of verifiers, and the messages are digitally signed by the sender and encrypted using a public/ private key as distributed by a threshold authority and decrypted by the destination. This verifies the identity of sender as well as receiver thus providing authentication to the scheme. By simulation results, we prove that the proposed technique provides high security with less overhead and delay.
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
Vehicles download the data when passing through a drive through the road (RSU) and then share the data after travelling outside the coverage of RSU.A key issue of downloading
cooperative data is how effectively data is shared among them self. Developing an application layer data exchange protocol for the coordination of vehicles to exchange data according to
their geographic locations. Coordinated sharing can avoid medium access control (MAC) layer
collisions and the hidden terminal effect can be avoided in the multi-hop transmission. A salient
feature of the application layer data exchange protocol, in the voluntary services, Vehicles purchase the requested data from service provider via RSUs. In this project, we propose a
cooperative data sharing with secure framework for voluntary services in special vehicles networks (VANETs). We also concentrate on security in the process of downloading data and
sharing. Applicants to ensure exclusive access to data applied and security of the vehicles
involved in the implementation.
Abstract: VANET (vehicular ad-hoc network) is a classification of MANET in which vehicles act as mobile node and provides a different approach to Intelligent transport System (ITS). VANET is an emerging area for Intelligent Transportation System (ITS) which can result in increased traffic safety, collision warning through exchange of messages through wireless media. Efficient routing protocols are required for efficient communication among vehicles. In the given paper, we surveyed various VANETs protocols like GPRS, GPRS-MV & GPSR. We compare our proposed protocols via NS-2 based simulations and show the performance of different protocols.
Challenging Issues in VANET Network and its Routing Algorithms-An Analysisidescitation
Vehicular Ad hoc Network (VANET), a rapidly
deployed wireless network, is a subclass of mobile ad hoc
networks (MANET) that uses multi-hop routing to provide
network connectivity among vehicles (V2V) or vehicle to road-
side equipments (V2R). VANETs have received increasing
research attention in recent years because of its vast
applications like safety, comfort and entertainment. Variations
with time in network topology impose new challenges for
routing protocols in such networks as traditional routing
protocols are not suitable for VANETs. This work is an attempt
to figure out the challenges in VANET comprehensively in
conjunction with the recommended routing protocols by
comparing the existing routing protocols with respect to
existing challenges.
Trust based multi objective honey badger algorithm to secure routing in vehic...IJECEIAES
A vehicular ad-hoc network (VANET) is a set of intelligent vehicles that interact without any fixed infrastructure. Data transmission between each transmitter/receiver pair is accomplished using routing protocols. However, communication over the VANET is vulnerable to malicious attacks, because of the unavailability of fixed infrastructure and wireless communication. In this paper, the trust based multi objective honey badger algorithm (TMOHBA) is proposed to achieve secure routing over the VANET. The TMOHBA is optimized by incorporating different cost functions, namely, trust, end to end delay (EED), routing overhead, energy, and distance. The developed secure route discovery using the TMOHBA is used to improve the robustness against the malicious attacks, for increasing the data delivery. Moreover, the shortest path discovery is used to minimize the delay while improving the security of VANET. The TMOHBA method is evaluated using the packet delivery ratio (PDR), throughput and EED. Existing researches such as hybrid enhanced glowworm swarm optimization (HEGSO) and ad-hoc on-demand distance vector based secure protocol (AODV-SP) are used to evaluate the TMOHBA method. The PDR of the TMOHBA method for 10 malicious attacks is 90.6446% which is higher when compared to the HEGSO and AODV-SP.
Vehicular Ad hoc Network (VANET) is the favorable method to enhance the safety of divers and passengers. It becomes a basic element of the Intelligent Transportation System (ITS). It has created by applying the concepts of Mobile Ad Hoc Networks (MANETs) – which is an application of a wireless network for exchanging the data – to the domain of vehicles. They become a main element of intelligent transportation systems. In existing technique drawback is the Authentication Server (AS) gives all the working to Law Executor (LE) means AS send information to RSU, RSU send this information to law executor and then login process start but if LE behave maliciously then this authentication process fail. In our propose work, we calculate the trust of each vehicle's on the basis of their behavior. Each vehicle calculates the trust of its neighbor and send this value to AS by RSU then AS update these values and then broadcast this value by RSU, now all the vehicles have a trust value of its neighboring vehicles so that send the data by using hashing technique and use trusted path to send data source to a destination so that security enhances.
Vehicular ad hoc network is one of the most interesting research areas due to flexibility, low cost, high sensing fidelity, fault tolerance, creating many new and exciting application areas for remote sensing. So, it has emerged as a promising tool for monitoring the physical world with wireless sensor that can sense, process and communicate. Being ad-hoc in nature, VANET is a type of networks that is created from the concept of establishing a network of cars for a specific need or situation. VANETs have now been established as reliable networks that vehicles use for communication purpose on highways or urban environments. VANET considered as a distinct type of Mobile Ad Hoc Networks holds the opportunity to make peoples life and death decisions by predicting and helping the drivers and other people about the road safety and other critical conditions.
Effective Road Model for Congestion Control in VANETSijwmn
Congestion on the roads is a key problem to deal with, which wastes valuable time.. Due to high mobility
rate and relative speed link failure occur very often. VANET is used to tackle the problem of congestion,
and make decisions well in advance to avoid traffic congestion. In this paper we proposed a solution to
detect and control the traffic congestion by using of both (V2V) and (V2I), as a result the drivers become
aware of the location of congestion as well as way to avoid getting stuck in congestion. The congestion is
detected by analyzing the data obtained by vehicular communication and road side units to avoid the
traffic. Our proposition system is competent of detecting and controlling traffic congestion in real-time.
V2V and V2I communication network is used to receive and send the messages. We simulate the result by
using Congestion Detection and Control Algorithm (CDCA), and show that this is one effective way to
control congestion. The Proposed methodology ensures reliable and timely delivery of messages to know
about congestion and avoid it.
Similar to A Secure Intrusion Prevention Protocol for VANET to Enhance Security (20)
Efforts made in many countries to stop the COVID-19 pandemic include vaccinations. However,
public skepticism about vaccines is a pressing issue for health authorities. With the COVID-19 vaccine
available,
SARS-CoV-2, as the causative agent of COVID-19, has spread throughout the world after becoming
a pandemic in March 2020. In the midst of the ongoing COVID-19 pandemic, we are also faced with another
serious health problem
This paper discusses the construction and implementation of a system for the measurement of
electrical power parameters; amperage and voltage of the hybrid system photovoltaic solar-wind, to evaluate
the system parameters and performance. The basis of the development of the measuring apparatus is the use of
an Arduino Mega 2560 to provide the interface between the electrical circuits of the sensors and the dynamics
of the voltage-amperage as well as collect data in an analog format as well as development of functional
dependence relationships. The collected data is converted into digital format and stored it in an Excel format
through the "PLX-DAQ Spreadsheet" that connects the Arduino and the PC for display and analysis of the
system parameters. The proposed technique for power measurements of AC and DC proved to be reliable and
can predict the power amperage and voltage within relative error of 1.63 % for AC and 4.16% for DC,
respectively.
The optimum speed required for mass-size reduction of shells to produce most sizes that are small
comparable with kernel sizes; coupled with retention of kernel wholeness in cracked palm nut mixture under
repeated impact was investigated. This is to enhance whole kernel separation by dry method, reduce maintenance
and production cost of palm kernel oil (PK0); and lower the risk of oil rancidity associated with split kernel
production and wet method of separation. A static nut cracker and centrifugal nut cracker were used in this study as
Test Rigs while sieves were used to grade cracked shells and whole kernels. The data generated were evaluated. A
model was developed for energy via speed required to retain kernels wholeness following repeated impact in the
crackers. Technical analysis revealed that the maximum allowable speed to retain kernel wholeness is 27.93 m/s;
the minimum allowable average speed to fragment cracked shells is 24.95 m/s. Further analysis showed that the
optimum speed and energy required for cracked nut mixture under repeated impact to have kernel wholeness
retention and production of small sizes of cracked shells relative to kernel sizes are 25.71 m/s and 0.4 J,
respectively.
This review was written to provide a comprehensive summary of the suggested etiologies of Chronic Kidney
Disease of Unknown Etiology (CKDu) in Sri Lanka. In this review, Chronic Kidney Disease (CKD) is explained
in detail and its known etiologies are discussed. CKDu is defined and its epidemiology is discussed, with the
compilation of statistic from over 15 research papers through the years 2000 to present.
This work contributes to the monitoring of water pollution of some selected Dams in Katsina
State, North western Nigeria by assessing the degree of heavy metal pollution in the Dams sediment samples.
The study was conducted in the year 2017 within some selected Dams in the State (Ajiwa, Zobe,
Sabke/Dannakola) that are beehives of fishing and Agricultural activities in Katsina State. Analysis for the
concentration of these heavy metals; Cr, Cd, Fe, Ni, Mn, Pb and Zn was conducted by the use of AAS (by
Atomic Absorption Spectrophotometry) method. Several indices were used to assess the metal contamination
levels in the sediment samples, namely; Geo-accumulation Index (Igeo), Enrichment Factor (EF),
Contamination Factor (CF), Degree of Contamination (Cd), Pollution Load Index (PLI) and Potential
Ecological Risk Index (PERI). The result of this study has shown that generally among the heavy metals
evaluated, the highest concentration was observed for Fe (range: 2.6718-4.2830 ppm), followed by Zn (range:
0.4265-0.7376 ppm), Cr (range: 0.1106-0.1836 ppm), Cd (range: 0.1333-0.1273 ppm) and Mn (range: 0.1136-
0.1271 ppm). While Pb has the lowest concentration (range: 0.0472-0.0598 ppm). For all the site sampled the
heavy metal Ni was below detection level (BDL). From the results of heavy metals I-geo values, according to
Muller’s classification, all the sediment samples from the selected dams were unpolluted (class 0). The result for
the enrichment factor has shown that for all the selected dam sediment samples the heavy metals show
deficiency to minimal enrichment. Also based on the contamination factors for all sediment samples the heavy
metal Cd has a CF values range of 0.5430-0.6665 (~1), indicating that the sediment samples are moderately
contaminated with Cd. In contrast, the rest of the heavy metals exhibit low contamination in general. The value
of PLI ranges from 0.2408 to 0.4935, indicating unpolluted to moderate pollution. The Eri values for all
samples are all < 40, presenting low ecological risk. The results suggest that the sediment samples from the
selected dams in Katsina state has low contamination by the heavy metals evaluated.
Using QR Decomposition to calculate the sum of squares of a model has a limitation that the number of rows,
which is also the number of observations or responses, has to be greater than the total number of parameters used in the
model. The main goal in the experimental design model, as a part of the Linear Model, is to analyze the estimable function
of the parameters used in the model. In order not to deal with generalized invers, partitioned design matrix may be used
instead. This partitioned design matrix method may be used to calculate the sum of squares of the models whenever the total
number of parameters is greater than the number of observations. It can also be used to find the degrees of freedom of each
source of variation components. This method is discussed in a Balanced Nested-Factorial Experimental Design.
Introduction:It has been proven twice that the Hambantota District has the highest life expectancy in male
population. This study focused to find and identify reasons for Hambantota District people to have high life
expectancy at birth.
Methodology: Research was carried out in both qualitative and quantitative phases in five MOH (Medical
Health Officer) divisions in HambantotaDistrict. Study focused on 3 age categories, 55-65 Years, 66-75 Years,
and above 76 Years. Main objectives and key information areas are Life Style and Social Behaviors, Food
Consumption and Diet, Familial Trait and Physical and Mental Health.
Findings: Majority of the male population have educated up to grade 5and most are engaged in the agriculture
while others engaged in fishery and self-employment etc. Almost everyone reachestheir workplaces by foot or by
bicycle. Many of them work less than six hours. They spend their free time with their family members and watch
TV. Most of them do not consume alcohol and smoke. Almost everyone take part in social activities. Majority eat
red rice for all three meals. Almost everyone eats fish every day. They have a high salt intake. Their parents and
ancestors have also have had a high life expectancy. Only a minority suffer from chronic illnesses. They all have
a good physical and mental health condition. They spend happy and relaxed lifestyle.
Conclusion: Healthy diet, low alcohols consumption and smoking, high iodine intake, physical activeness and
their social wellbeing effect for high life expectancy within the male population of selected five MOH divisions
in Hambantota District. They have a free and happy life. Genetics of these people also may contribute for high
life expectancy. Abundance of neem trees in this area also may effect on their high life expectancy.
A clay deposit in Chavakali of western Kenya was evaluated for its potential as refractory raw
material. The collected clay sample was crushed, sieved and the chemical composition determined in
percentage weight (wt %) of (SiO2, Al2O3, Fe2O3, etc) using Atomic Absorption Spectrophotometer (AAS). The
samples were moulded into rectangular shaped bricks of 40mm height, 40mm width and 80mm length, allowed
to dry and later fired up to a temperature of 10000C. Refractory properties like Compressive strength,
Hardness, Linear shrinkage on firing, Apparent porosity and Density were determined using standard
techniques. The result of chemical analysis indicated that the clay was composed of Silica (SiO2), 67.3%;
Alumina (Al2O3), 16.67%; Iron Oxide (Fe2O3), 3.87%; Calcium Oxide (CaO), 0.37%; Potassium Oxide (K2O),
2.30%; Sodium Oxide (Na2O), 1.39%; and other traces. The physical and mechanical tests show that the clay
has Cold Crushing Strength of 10.36MPa, Hardness of 40.080 GPa, Linear shrinkage of 6.17%, Apparent
Porosity of 32.71% and Bulk Density of 2.77g/cm3
. Chavakali clay can make better local refractory
Nihon University challenged world record of the human-powered aircraft flight based on the
regulation of Fédération Aérionautique Internationale in Kasumigaura Lake, Japan, 2014. The wing fell off in
midair immediately after take-off, the pilot landed to the lake for safety. So, the challenge failed. It guessed the
operational errors were correlated with the wing falling in midair, which had not happened in our experience.
The flight recording camera and the salvaged airplane were investigated. The fault tree analysis was conducted
for cause investigation. The wing falling was the result as the chain destruction starting from the coupling parts
being damaged in take-off. The defective take-off was caused by composite factors on only operational errors.
The risk that the ultralight airplane might disintegrate in midair by only operational error became apparent.
Due to the large-scale exploitation of mineral resources and the unreasonable human activities, the
geological disasters in Jiaozuo City have become increasingly prominent and the degree of harm increased. This
leds to a tremendous threat to human life and property safety. Jiaozuo City, the main types of geological
disasters, landslides, ground subsidence, debris flow and ground fissures. It has great significance to the
development of the city and the protection of people's life and property to explore the hidden dangers of
geological disasters and actively take preventive and control measures. The establishment of geological
hazard group measurement system of prevention and control to achieve the timely detection of geological
disasters, rapid early warning and effective avoidance.
Dangerous gas explosion accidents result in considerable amount of casualties and property damage.
Hence, an investigation on the generation of poisonous gases in gas explosions exerts important implications
for accident prevention and control and in the decision-making processes of fire rescue. Therefore, a gas
explosion piping test system is established in this paper. Experimental research on gas explosion is conducted by
selecting methane/air premixed gases with concentrations of 7%, 9%, 11%, 13%, and 15% in the gas explosive
range. This research aims to reveal the regularity of CO generation after gas explosion in pipelines.
Experimental results showed that when the gas concentration is small (< 9%), 1500–3000 ppm CO will be
produced. When the gas concentration is large (> 9%), the CO amount will reach 3000–40000 ppm. The
variation trend in CO concentration and the quantity of explosive gas are also obtained.
To evaluate the influence of the entry speed to flow field above the water surface on an object
high-speed entering into water, the flow field was measured experimentally by using an optical visualization
method. The entry speed was ranging from 0.2 to 1.5 km/s. In case that the entry speed was higher than the
sound speed of gas above the water surface, the vertical velocity of the tip of a water splash was linear to the
vertical location of the tip. The ratio between the initial vertical velocity of a water splash and the entry speed
was independent from the entry speed and was constant.A shock wave was driven above the water surface by the
entry even thoughthe entry speed was lower than the sound speed of gas above the water surface.A scaling law
for the propagation of a shock wave driven by explosion of an explosive was applicable to the propagation of
the shock wave driven by the water entry by using the kinetic energy of the entry object instead of the explosive
energy.
Pingdingshan Coal Mine district is one of the six mining areas of Henan Province, which is a
large coal base in China. After 60 years of exploitation, it has brought great benefits, at the same time,
serious geological disasters have been occurred. It has seriously damaged the normal production of the
masses, life, restricting the development of Pingdingshan coal mine economy. In this paper, the
geological disasters such as ground collapse, ground fissures and ground subsidence in Pingdingshan coal
mine are analyzed, and the degree of geological disasters in the mining area is analyzed in combination
with the severely affected mining area. Finally, reasonable and feasible countermeasures have been put
forward.
Kelud volcano is located in East Java Province, Indonesia. According to Geochemical study of
Kelud Volcano, it could be divided into 3 periods which are Kelud I (older than 100 ky BP), Kelud II (40 – 100
ky BP), and Kelud III (younger than 40 ky BP). A specific petrogenesis of Kelud are dominatad by magma
mixing and fractional crystalization. New petrological data from Kelud volcano was taken through products of
the eruption in 1990 (Vulkanian type), 2007 (Lava plug forming) and 2014 (Plinian type). Petrographic study
on these rocks showed that reverse and oscilatory zoning on plagioclases, Shieve-like and corroded textures on
plagioclases and pyroxenes are common. However, normal zoning textures were also found on plagioclases and
pyroxenes. Whole rock study on these rocks showed all rocks were classified into Basalt to Andesite in
composition with calc-alkaline group. The study indicated that their magma origin derrived from slab with
fractional crystallization during in the magma reservoir, and magma mixing processes are dominant expecially
in magma pockets. Concequently, the magma origin and petrogenesis of Kelud magma after the 1966 eruption
are still the same as those of old magma of Kelud.
Black cotton soils are among a group of soils termed as problematic soils. These soils have
undesirable characteristics in relation to construction works and therefore need some form of improvement
when encountered in construction projects. Techniques for improvement of black cotton soils include
replacement, moisture control or adding a stabilizer. Cement and/or lime has been commonly used in soil
stabilization for ages. However, due to the associated cost, required quality control and the need to utilize waste
materials in construction, new stabilizing materials are emerging. This paper presents a study on application of
quarry dust for improving properties of black cotton soil in Mbeya region, Tanzania. The targeted improvement
was to achieve minimum acceptable characteristics for road subgrade as per Tanzania standards. It was
determined that 40% by weight of quarry dust added to the black cotton soil was able to improve the
characteristics by increasing CBR value from 3.8 to 15.7 and reducing PI from 32% to 15%. It will be worthy
studying the cost implication of the suggested improvement in relation to other techniques before application of
the study findings.
High intensity rain and morphometri in Padang city cause at Arau. Morphometri
geomorphologi that is related to wide of, river network, stream pattern and gradien of river. The form wide
of DAS will be by stream pattern and level.This will influence to the number of rain. Make an index to
closeness of stream depict closeness of river stream at one particular DAS. Speed of river stream influenced
by storey, level steepness of river. Steepness storey, level is comparison of difference height of river
downstream and upstream. Ever greater of steepness of river stream, excelsior speed of river stream that
way on the contrary. High to lower speed of river stream influence occurence of floods, more than anything
else if when influenced by debit big. By using rainfall from year 2005 to year 2015, and use Thiessen method
got a rainfall. Use the DEM IFSAR, analysed sofware ARGIS, and with from earth map, the result got DAS
in at condition of floods gristle and sedimentation. There are band evakuasi for resident which data in
floods area.
The chemical (extractives and lignin) content and histological property (microscopic structure)
of tissues of Ricinodendron heudelotii (Baill, Pierre ex Pax), an angiosperm, were investigated for its potential
as a fibrous raw material for pulp and paper production. Bolts of about 70 cm were cut from the felled trees at
three different merchantable height levels of 10%, 50%, and 90% to obtain: corewood, middlewood and
outerwood samples. The fiber characteristics of the selected trees viz: the fiber length, fibre diameter and lumen
diameter were measured while the cell wall thickness was derived from the measured fibre dimensions. The
average fiber length, cell wall thickness, and lumen width, were 1.40 mm, 4.6 µm, and 32.3 µm, respectively.
The extractive and lignin contents were determined. Klason lignin content was about 30%. Extractive content of
R. heudelotii ranged from 0.41 to 0.5%. Based on these findings R. heudelotii is suitable for pulp and paper
production.
The prolific Niger Delta Basin is a mature petroleum province. Therefore, further prospectivity in
the basin lies within deeper plays which are high pressure and high temperature (HPHT) targets. One of the
main characteristics of the Niger Delta is its unique diachronous tripartite stratigraphy. Its gross onshore and
shallow offshore lithostratigraphy consists of the deep-seated Akata Formation and is virtually exclusively
shale, the petroliferous paralic Agbada Formation in which sand/shale proportion systematically increases
upward, and at the top the Benin Formation composed almost exclusively of sand. This stratigraphic pattern is
not exactly replicated in the deep offshore part of the delta.
A low-carbon steel wire of AISI 1022 is used to easily fabricate into self-drilling tapping screws,
which are widely used for construction works. The majority of carbonitriding activity is performed to improve
the wear resistance without affecting the soft, tough interior of the screws in self-drilling operation. In this
study, Taguchi technique is used to obtain optimum carbonitriding conditions to improve the mechanical
properties of AISI 1022 self-drilling tapping screws. The carbonitriding qualities of self-drilling tapping screws
are affected by various factors, such as quenching temperature, carbonitriding time, atmosphere composition
(carbon potential and ammonia level), tempering temperature and tempering time. The quality characteristics of
carbonitrided tapping screws, such as case hardness and core hardness, are investigated, and so are their
process capabilities. It is experimentally revealed that the factors of carbonitriding time and tempering
temperature are significant for case hardness. The optimum mean case hardness is 649.2HV. For the case
hardness, the optimum process-capability ratio increases by about 200% compared to the original result. The
new carbonitriding parameter settings evidently improve the performance measures over their values at the
original settings. The strength of the carbonitrided AISI 1022 self-drilling tapping screws is effectively improved.
More from International journal of scientific and technical research in engineering (IJSTRE) (20)
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
A Secure Intrusion Prevention Protocol for VANET to Enhance Security
1. International journal of scientific and technical research in engineering (IJSTRE)
www.ijstre.com Volume 1 Issue 3 ǁ June 2016.
Manuscript id. 744190326 www.ijstre.com Page 23
A Secure Intrusion Prevention Protocol for VANET to Enhance
Security
J.Veneeswari1
, C.Balasubramanian2
1 PG-Scholar, Department of CSE, PSRRengasamy College of Engineering for Women, Sivakasi,
2Professor- Department of CSE, PSRRengasamy College of Engineering for Women, Sivakasi.
E-mail:-venijeyaraj93@gmail.com,c.balasubramanian@gmail.com,
ABSTRACT A vehicular ad-hoc network (VANETs) is emerging technology in wireless ad-hoc
network.VANETs are dope out to improve vehicular safety and manage the traffic in the urban areas. Adaptive
slot assignment strategy with fuzzy logic are used with multipath routing mechanism with TDMA allocation to
limit the collision rate and improve the energy and reduce stoppage in the vehicle statement. In this paper, an
interruption avoidance protocol that are integrated with digital signature and game theory approach with Road
side unit control to enhance the security and protecting the VANET environment. Using this intrusion
prevention protocol is implemented to examine the various parameter values to provide the Quality of Service,
inter –vehicle and intra-vehicle security in the zone with security showed with the simulated results.
I. INTRODUCTION
VANET environment are developed with the Intelligent Transportation system for fast and intelligent
means of communication with the Distributed database multipath routing and collision avoidance
technique.ASAS-fuzzy logic are taken with the routing to provide TDMA based allocation with various vehicles
in urban road .VANET provide the safety and reduces the accident with improve the safety measures of the
vehicle to limit the accident and it claims the noteworthy information to vehicle, roadside unit ,for authenticated
environment. User authentication increases the accessing information with secured confident level of the user.
Various authentication protocols are deployed in the road and vehicles.
IETF has standard network mobility provide the stability to provide the various data service with global
connectivity of vehicles with the data services.VANET with pure ad hoc network where vehicle to vehicle
without any need of centralized control of any infrastructure. Next to that Road side unit (RSU)with the fixed
content are used these both are provide with security to avoid the steeling of information.CAR-2-CAR
consortium has developed many security protocols to crash the attackers when the frequent exchange of data on
vehicles in the security. Destination based on the distance vector routing is used in the basic with multiple
attacker avoidance is stated in SEAD (secure and efficient Adhoc distance vector) .It intake more bandwidth and
limited CPU processing its more capable to protect the DOS attack. It works with the help of hash function by
choosing the random values at initial. Discovering the initial route which disperse the each outgoing with
encoded scheme .SMT(secure message transmission )protocol with the light weight active path communication
in this protocol it sends the acknowledgement to both sender and receiver vehicle. To protect the location
information they develop the NDM (Non-Disclosure method) it covers the Information disclosure, location
tracking with technology of asymmetric cryptography is used it provide the security requirement privacy
.ARIDANE it terminate the route of uncompromised node. it covers the DOS,routing attack, replay attack with
the symmetric cryptography, MAC it gives authentication to each vehicles. Cryptosystem are used with the
privacy of message exchange and privacy with multilayer attack FHSS (frequency –hopping spread spectrum) is
used in the bodily coating to avoid the DOS attack in vehicles.
II. RELATED WORK
The system proposed in [4] it is a impact of the mobility on the transmit of overhaul with the efficient MAC
protocol it leads to the development of inter-vehicle communication through various monitoring mechanism.
Reliable Reservation (RR-allocation) is capable for transmit the slotted/framed for their broadcast service it is
provided with TDMA based allocation.RR-allocation provide an reliable broadcast service and reservation of
access channel avoid the collision and eliminate parallel transmission. Broadcasting vehicles belong on various
terminals they do not know each other vehicle for concurrent transmission. The transmission causes collision by
uncovered vehicles that lead to hidden terminal
Problem. Clustering method is intense technique to reduce the collision in transmission is used in[5].Directional
stability based clustering algorithm(DISCA) is used for maintain the stability of the cluster with the mobility of
the vehicle and direction of mobility in vehicles and reduce the time to reform the cluster again.The clustering
2. A Secure Intrusion Prevention Protocol for VANET to Enhance Security
Manuscript id. 744190326 www.ijstre.com Page 24
efficiency is based on the active cluster that are present prolong time in medium. Mobility based of clustering is
proposed in[6]it provide the stable cluster with high mobility of vehicles. Based on cluster formation it elect the
cluster head for message transmission it maintain availability to provide the self recognizing of vehicle with
mobility based ad-hoc clustering scheme(MOBIC).Space –orthogonal frequency(SOFT) is provide with the
medium layer with Time access control for VANET(SOFT-MAC) are used to provide secure interaction
between two transmitter in[7]they proposed to enhance the QOS requirement to reduce the collision overhead
here we can use the more number of vehicles .Vehicular multichannel MAC protocol (VE-MAC) proposed in
[8] is centralized manner with control of allocated time slots are used to provide limited access of cluster to
reduce probability ratio of collision. Adaptive TDMA slot assignment protocol (ATSA) in[8] this allocate the
time slots based on the mobility of the vehicles with correct direction and location of the vehicle it reduce the
vehicle that access the same time slot it reduce the collision of redundant access of the vehicle.
The proposal of [9] specified with the technique named as Adaptive slot assignment strategy (ASAS) which
provide the timeslot for access the communication channel based on the cluster head elected on the vehicle to
minimize the collision in vehicles .In various solution scheme used for vehicles to avoid these type of access
and merging collision in the network. It allow one vehicle to transmit in the particular time slot based on the
request. This schedule of time slot is tabulated with the cluster head formation.warmhole attack is taken in the
network . Nash Equilibrium (NE) game which provide the channel allocation security issues are arise the
network found and resolved.
III. PROBLEMS
In VANETs without incorporating security in fuzzy logic to make the VANET enivironment with more
risk many packet delay ,energy drop can occur in the network.Our proposed paper is taken with the warmhole
attack is taken in the ASAS-FUZZY network and build with the digital signature and game theory approach to
increase the energy ,limits the delay , packet drop network over head is reduced for the vehicles in the urban
areas.
IV. SYSTEM DESCRIPTION
4.1 InVANET(Intelligent Vehicular AdhocNetwork)
Intelligent vehicular network are concentrate the communication that are based on the vehicles –vehicles
and vehicles –roadside unit.
Decision making taken through various inferences in traffic.
It increase the dynamic mobility of the vehicle with the increase of high speed communication and road
safety.
FIG:-1 INTELLIGENTVEHICULAR ADHOC NETWORK
VANET COMMUNICATION METHODS
In urban areas there are large number of vehicles.There are more than 750 million of vehicles having
Vehicular network system.Information sharing is very important between the vechicles.Using DSRC vehicles take
place in the communication range of communication is reached around the signal up to 1 km with independent
manner.Intelligent transport system (ITS) broadcast messages to other vehicle which connect the network devices.
The ITS play main role of passing the information each vehicle with safe destination with collision avoidance.It
coordinate the vehicles through the transporation or location of each vehicle in the urban area.
3. A Secure Intrusion Prevention Protocol for VANET to Enhance Security
Manuscript id. 744190326 www.ijstre.com Page 25
FIG 2:-VANET COMMUNICATION
Each events that occur in the environment that shows in fig [1] are passed to other vehicle for the vehicle safety
4.2 TDMA ALLOCATION:-
TDMA allocation is offered with the various slot allocation and reservation to provide the service to
channel in the vehicles that are requested.
TDMA slot assignment- Vehicles position are monitored with a global positioning system(GPS) to allocate
the time
TDMA slot reservation-It based on the vehicles that requested to cluster head
FIG:-3 TDMA SLOT ASSIGNMENT AND RESERVATION
In fig:-2 the cluster is dope out with the more vehicles with the reserved time slot for each cluster head to
transmit the information to another cluster head. Transformation of mobility information is passed by the
vehicles that are monitored the information by the presence of Global positioning system (GPS) to know the
location .
4.3 ASAS PROTOCOL
Adaptive slot assignment strategy (ASAS) is technique used in this paper to allocate the particular access of the
vehicle that are processed to reserve the time slot for multiple request given by the vehicles for their interactions
that are requested by the vehicles, with the acceptance of the high priority of the messages that depends upon
the speed, location. It minimize the inter cluster formation of the vehicle and improve the throughput for each
vehicle
Service channel (SCH) offers the service for an efficient channel to access frequently with time slots and to
minimize the collision rates in different speed conditions by their given request.
4.4 FUZZY LOGIC
A group of fuzzy rules like human brain which predict the values for interpretation of uncertain sensory
information that given by the vehicle
4. A Secure Intrusion Prevention Protocol for VANET to Enhance Security
Manuscript id. 744190326 www.ijstre.com Page 26
FIG :-4 FUZZYCOST LOGIC FOR FORWARDING PACKET
In degree of fuzzy cost is determined by the given inputs that are fuzzified to provide appropriate output with
the range of vehicles and the direction of vehicle for the communication.
DISTRANCE=1-
DFV
RFV
........................ (1)
DFV=Direction of vehicle
RFV=Range of vehicle
In this equation (1) that are needed to calculate the distance of the vehicles. Using the distance we can calculate
the distance of parameter value.
FIG-: 5 OUTPUT PARAMETER FOR FUZZY LOGIC
In fig 4 there are various output parameter that measured by the various fuzzy cost and membership functions.
4.5 SECURITY REQUIREMENT FOR VANET
The secure VANET environment with the enhancing speed with reducing the adversaries in VANET
Authentication
Availability
Non-repudiation
Privacy
Real time constraints
Integrity
Confidentiality
Preserving the information from the unauthorized persons. Keys infrastructure is used to update the security in
vehicle. License fed in to the Road Side Unit (RSU) to recognize the vehicle identity, location, driver
information and which direction the vehicle are travelling .Temporary keys are used to preserve the safety in the
identity. Vehicle acknowledgement is important for the real time constraints. Prevention of data security to alter
5. A Secure Intrusion Prevention Protocol for VANET to Enhance Security
Manuscript id. 744190326 www.ijstre.com Page 27
the data content from the hackers after the attack it retrieved the message from the receiver end within the
milliseconds.
Threats to Availability, Authenticity and Confidentiality
Many threats are happen in the routing in the vehicle to vehicle and infrastructure.
Denial of service Attack
Broadcast Tampering
Malware
Spamming
Black hole attack
The attack renders the network unavailable to authentic user for serious disruption to its operation. Malware
attacks are more likely to carried attackers in insider and outsider with the surplus data.
V. NETWORK MODEL
In this proposed system the network model of the VANET are the base for the network model is to create
the mobility nodes in the environment and with the topology specification to reach the destination. In the urban
traffic area are consider in the system to monitor the range of collision avoidance.
FIG 6:-IMPLEMENTATION OF THE SECURITY IN VANET ENVIRONMENT
QOS parameter are evaluated in the security VANET environment with the deploymentation of
VANETMOBISIM topology to reduce the delay for the intervehicle message transmission.
VI. IMPLEMENTATION
Deploying this work is first to create the mobility node with the network simulator .In this routing protocol
are used to measure the QOS parameters.
Node implementation in ASAS-FUZZY with wormhole attack
Implementing digital signature and game theory approach
Comparison between wormhole attack with ASAS FUZZY approach and enhanced ASAS FUZZY
with game theoretic approach and digital signatures .
6. A Secure Intrusion Prevention Protocol for VANET to Enhance Security
Manuscript id. 744190326 www.ijstre.com Page 28
6.1 NODE IMPLEMENTATION IN ASAS- FUZZY WITH WORMHOLE ATTACK
Nodes are implemented in the topology in VANETMOBISIM . Creation of nodes is base for VANET and
transfer of packets between nodes. Using TCL script to verify the nodes.it is used with ASAS-FUZZY protocol .
SCREEN SHOT :-1 ASAS –FUZZY PROTOCOL
In this we can calculate the collision rate, delay, energy spent and through put ratio.
TOPOLOGY GENERATION:-
Road topology with number of vehicles 50 is created using Vanetmobsim and output of VANET is fed as input
to ns2 fo rmobility of nodes.Integrating VANET.Jar with road map file to form mobility
FIG:-7 VANETMOBISIMTOPOLOGY GENERATION
In FIG:-6 road topology is generated with the road map files. Integrating VANET.Jar with road map to form
mobility files are fed to ASAS implementation.
WARMHOLE ATTACK:-
Formation of the VANET MOBI SIM topology in the urban road with fuzzy based rules to inhibit the
wormhole hole attack in that malicious nodes are formed in the network to form a tunnel like structure to steal
the privacy of original routing information .Original certainty of information are taken and content are modified
to cause more problem in the deployed nodes with the fuzzy logic in the network. Denial of service are happen
in the vehicle causes more delay of message transmission and reduce the ratio of packet transmission in multiple
routing.
7. A Secure Intrusion Prevention Protocol for VANET to Enhance Security
Manuscript id. 744190326 www.ijstre.com Page 29
SCREEN SHOT :-2 WORM HOLE ATTACK
Wormhole attack with ASAS FUZZY-Protocol is deployed in the network and it degraded the performance.
Service taken in the each nodes with the loss of energy, false data reaches the destination end. During the
routing in this node deploymentation causes more collision in the network .
CALCULATION:-
Delay=End time-Start time
Collision rate =
𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 𝐩𝐚𝐜𝐤𝐞𝐭 𝐫𝐞𝐜𝐞𝐯𝐢𝐞𝐝
𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 𝐩𝐚𝐜𝐤𝐞𝐭 𝐬𝐞𝐧𝐝
Consume energy = 𝐈𝐧𝐢𝐭𝐚𝐥 𝐞𝐧𝐞𝐫𝐠𝐲− 𝐅𝐢𝐧𝐚𝐥 𝐞𝐧𝐞𝐫𝐠𝐲
Total energy=Total consume energy(less)
Throughput=𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 𝐬𝐞𝐧𝐝 𝐩𝐚𝐜𝐤𝐞𝐭 − 𝐍𝐮𝐦𝐛𝐞𝐫 𝐨𝐟 𝐫𝐞𝐜𝐞𝐯𝐢𝐞𝐝 𝐩𝐚𝐜𝐤𝐞𝐭.
TABLE 1:-DELAY RATE FOR WORMHOLE ATTACK
SCREEN SHOT :-3 AVERAGE DELAY IN WORMHOLE ATTACK
8. A Secure Intrusion Prevention Protocol for VANET to Enhance Security
Manuscript id. 744190326 www.ijstre.com Page 30
In fig:- 9 and above table shows the average delay rate of the nodes with the deployment of wormhole attack in
the VANET environment. Lot of denial of services are happen with the wormhole attack .
TABLE 2:- COLLISION RATE IN WORMHOLE ATTACK
In wormhole attack the collision rate will be less compare to another protocols
SCREEN SHOT :-4 COLLISION RATE FOR WORMHOLE ATTACK
In fig:- 10 and above table shows the average collision rate of the nodes with the deployment of wormhole
attack in the VANET environment.
TABLE 3:- ENERGY SPENT IN WORMHOLE ATTACK
9. A Secure Intrusion Prevention Protocol for VANET to Enhance Security
Manuscript id. 744190326 www.ijstre.com Page 31
SCREEN SHOT :-5 ENERGY SPENT IN WORMHOLE ATTACK
In fig:- 11 and above table shows the average energy spent in the nodes with the deployment of wormhole
attack in the VANET environment.
TABLE 4:- THROUGHPUT IN WORMHOLE ATTACK
SCREEN SHOT :-6 AVERAGE THROUGH PUT IN WORMHOLE ATTACK
In fig:- 12 and above table shows the average throughput rate of the nodes with the deployment of wormhole
attack in the VANET environment.
6.2 IMPLEMENTING DIGITAL SIGNATURE AND GAME THEORY APPROACH
Transmission of packets is done using enhanced ASAS-FUZZY with game theoretic approach and digital
signature so that wormhole attack is prevented in the network and performance is increased.
DIGITAL SIGNATURE ALGORTHIM
Generate a random integer.
The signature must be bit pattern depends on the message being signed.
Encryption and decryption is done with the public key and private key(with random numbers)
10. A Secure Intrusion Prevention Protocol for VANET to Enhance Security
Manuscript id. 744190326 www.ijstre.com Page 32
Signing key verification is done with global components to verify the valid function.
Random values are to be taken no same values for key generation
SCREEN SHOT :-7 DIGITAL SIGNATURE AND GAME THEORY APPROACH
An algorthim problems are stated with the role of players where present in the fig:-13 selected nodes to play
typical inputs in the traffic based on that it generate the keys.
SCREEN SHOT :-8 KEY GENERATION
In fig 14 key generation are taken with the random numbers that are chosen in the nodes for communication.
TABLE 5:-DELAY RATE FOR DIGITAL SIGNATURE AND GAME THEORY APPROACH
SCREEN SHOT :-9 DELAY RATE FOR DIGITAL SIGNATURE AND GAME THEORY
APPROACH
11. A Secure Intrusion Prevention Protocol for VANET to Enhance Security
Manuscript id. 744190326 www.ijstre.com Page 33
In fig:- 15 and above table shows the average delay rate of the nodes with the deployment with digital
signature and game theory approach to overcome wormhole attack to in the VANET environment.
TABLE 6:-COLLISION RATE FOR DIGITAL SIGNATURE AND GAME THEORY APPROACH
SCREEN SHOT :-10 COLLISION RATE FOR DIGITAL SIGNATURE AND GAME THEORY
APPROACH
In fig:- 16 and above table shows the average collision rate of the nodes with the deployment with digital
signature and game theory approach to overcome collision that present in the wormhole attack.
TABLE 7:-ENERGY SPENT FOR DIGITAL SIGNATURE AND GAME THEORY APPROACH
12. A Secure Intrusion Prevention Protocol for VANET to Enhance Security
Manuscript id. 744190326 www.ijstre.com Page 34
SCREEN SHOT :-11 ENERGY SPENT FOR DIGITAL SIGNATURE AND GAME THEORY
APPROACH
Eneergy spent in each nodes based on the transmission range to overcome the attacks that happen in the
wormhole are taken placed in In fig:- 17and above table shows the average collision rate of the nodes with the
deployment with digital signature and game theory approach. Literally compare to the other approaches here it
will be more energy drop in the routing mechanism .digital signature reduces the energy spent and increase the
ratio of faster communication in the Vehicular environment.
TABLE 8:-THROUGHPUT FOR DIGITAL SIGNATURE AND GAME THEORY APPROACH
SCREEN SHOT :-12 THROUGHPUT FOR DIGITAL SIGNATURE AND GAME THEORY
APPROACH
13. A Secure Intrusion Prevention Protocol for VANET to Enhance Security
Manuscript id. 744190326 www.ijstre.com Page 35
In fig:- 18 and above table shows the average throughput rate of the nodes with the deployment of digital
signature and game theory approach to overcome wormhole attack in the VANET environment
6.3 COMPARISION BETWEEN ESTIMATED VALUES.
ASAS-Fuzzy logics are incorporated with some attacks with normal routing parameter, VEMAC and ASAS
protocol with the deploymentation of digital signature and game theory approach with various key generations.
QOS parameter are compared with AODV, ASAS ,ASAS-FUZZY ,VEMAC,WORMHOLEATTACK and
digital signature & game theory approach is done with output is shown using graphs.
The Graph plot with AODV ,VEMAC,ASAS and ASAS- fuzzy ,WORM HOLE attack and digital signature
& game theory using Y graph and time is plotted.
SCREEN SHOT 13:-DELAY RATE
SCREEN SHOT 14:-COLLISION RATE
14. A Secure Intrusion Prevention Protocol for VANET to Enhance Security
Manuscript id. 744190326 www.ijstre.com Page 36
SCREEN SHOT 15:-ENERGY SPENT
SCREEN SHOT 16:-THROUGHPUT RANGE
In our proposed papers are focussing to reduce the collision is main criteria if we minimize it automatically
energy spent to transfer the packet is reduced and increase the through put ratio .In multipath routing mechanism
are taken with secure message transmission. Attackers can come from the inside and outside of the node. Road
side unit (RSU) contain all information about the vehicles and sends the trust worthy information from the
authenticated database in the system.
TABLE:9 PACKET DELIVERY RATIO
15. A Secure Intrusion Prevention Protocol for VANET to Enhance Security
Manuscript id. 744190326 www.ijstre.com Page 37
Above screenshot represent the delay, packet drop in the ASAS-FUZZY environment is deployed with any
attacks it shows more number of content modification in the original message Service are to be provided to the
system with exceed of the time limit failure of nodes, ring like structure of attack to drop the important
information in the environment
SCREEN SHOT 17 :-PACKET DELIVERY RATIO
Digital signature and game theory approach with routing of random variables for typical situation to reduce the
attack increase the throughput ratio of this type of scenarios. various key formation are used to enhances the key
packet delivery ratio compare to the ASAS-FUZZY based rules in TDMA allocation in VANET.
VII. CONCLUSION AND FUTURE WORK:-
This paper proposes an ASAS-FUZZY based technique with the reserve the channel for vehicles with the
TDMA for the VANETs for multiple decision making .It control the various traffic measures with the various
speed condition.
Using the shown output result we can analysis the consummation of the collision rate it proven the range of
diminution with the increase in the energy during the packet transmission. It is compared with normal AODV,
VEMAC, ASAS,and proposed ASAS with fuzzy logics using this we can measure the stability of clustering and
increase the packet transmission rate.
In spite of increasing the energy in the vehicles. In future we can build the security between the vehicles to
enhance the authentication for communication. For authenticate user roadside unit should be available for the
needed packet transformation and to get the non-reputation of the packet. Various attacks are possible in
VANETs so track out the adversary with implementing new privacy methods can build for VANETs.Track the
adversary with the location based positions.
With the increase of the security to protect the domain with deploying of various attacks it is overcome by the
digital signature and game theory approaches in the environment it will reduce the delay in the vehicles . This
paper proposes an Digital signature and game theory approach with ASAS-FUZZY based technique for
VANET the multiple decision making to provide security in VANET .It control the various traffic measures
with the various speed condition.It reduces the delay and increases the packet delivery ratio reduces
the various attack in VANET
REFERENCES
[1.] J.Veneeswari, C.Balasubramanian “An urban road traffic with the dedicated fuzzy control system in VANET” ARPN Journal of
Engineering and Applied Sciences VOL. 11, NO. 2, JANUARY 2016 .
[2.] Smitha Shivshankar,Abbas Jamalipour:-”An Evolutionary Game Theory-Based Approach toCooperation in VANETs Under
Different Network Conditions” IEEE transactions on vehicular technology, vol. 64, no. 5, may 2015.
[3.] Bin Yang, Xiao Sun, Rong Chai, Li Cai, Xizhe Yang-” Game Theory Based Relay Vehicle Selection for VANET” IEEE 24th
International Symposium on Personal, Indoor and Mobile Radio Communications: Mobile and Wireless Networks 2013.
[4.] Xiaolong Ma, Liangmin Wang-”Game Theory Based Cooperation Incentive Mechanism in Vehicular Ad hoc Networks”
International Conference on Management of e-Commerce and e-Government 2012.
[5.] Tomoki Matsukawa, Taisuke Yamamoto, Youji Fukuta-” Controlling Signature Verification of Network Coded Packet on
VANET”-2012 .
[6.] Harbir Kaur, Sanjay Batish & Arvind Kakaria-” An Approach To Detect The Wormhole Attack In Vehicular Adhoc Networks”
International Journal of Smart Sensors and Ad Hoc Networks -2012
[7.] M. A. Alawi, R. A. Saeed and A. A. Hassan, “Cluster-based multihopvehicular communication with multi-metric optimization,”
ICCCE 2012 ,pp. 22-27, Jul. 2012.
16. A Secure Intrusion Prevention Protocol for VANET to Enhance Security
Manuscript id. 744190326 www.ijstre.com Page 38
[8.] D. j. Yang, X. Fang, G. l. Xue, “HERA: an optimal relay assignment scheme for cooperative networks,” IEEE J. Sel. Areas
Commun. , vol.30, no. 2, pp.245-253, 2012.
[9.] M. H. Wei, K. C. Wang, and I. L. Hsieh, “A reliable routing scheme based on vehicle moving similarity for VANETs,” IEEE
TENCON 2011, pp.426-430,Nov.2011.
[10.] A. Benslimane, S. Barghi, and C. Assi, “An efficient routing protocol for connecting vehicular networks to the Internet,”
Pervasive and Mobile Computing Journal, vol. 7, pp.98-113, 2011.
[11.] M. Seyfi, S. Muhaidat, J. Liang, and M. Uysal, “Relay selection in dualhop vehicular networks,” IEEE Signal Process. Lett. , vol.
18, pp.134– 137, 2011.
[12.] Y. Jiang, H. Zhu, M. Shi, X. Shen, and C. Lin, “An efficient dynamicidentity based signature scheme for secure network
coding,” Computer Networks, vol.54, pp.28-40, 2010.
[13.] C.-C. Chen, S. Y. Oh, P. Tao, M. Gerla, and M. Y. Sanadidi, “Pipeline Network Coding for Multicast Streams (Invited Paper),”
in Proc. 5th Int.Conference on Mobile Computing and Ubiquitous Networking (ICMU 2010), April 2010.
[14.] Y. Bi, L. Cai, X. Shen, and H. Zhao, “A cross layer broadcast protocol for multihop emergency message dissemination in inter-
vehicle communication,” IEEE ICC 2010, vol.10, pp.88-105, Oct. 2010.
[15.] J. Yoo, B. S. C. Choi and M. Gerla, “An opportunistic relay protocol forvehicular road-side access with fading channels,” IEEE
ICNP 2010, pp.233-242, Oct. 2010.
[16.] Shea, C., Hassanabadi, B., Valaee, S: “Mobility-based clustering in VANETs using affinity propagation”. In: IEEE Globecom
(2009)
[17.] T.K Mak,k.pLaberteauxR.sengupta and m-ergen,”Multichannel medium access control for dedicated short range communication
“, IEEE transaction on vehicular technology ,vol 58.issuse 1,pp.349-366,Jan 2009.
[18.] CAR 2 CAR Communication consortiums. Http://www.car-to-car.org/.
[19.] The FCC DSRC (Dedicated short range communications) website. http://wireless.fcc.gov/services/its/dsrc/.
[20.] Vanetmobisim project, home page. http://vanet.eurecom..fr.Accessed 29 May 2010.