Submit Search
Upload
ACT: Securing Vanet Against Malicious Vehicles Using Advanced Clustering Technique
•
0 likes
•
3 views
IRJET Journal
Follow
https://www.irjet.net/archives/V9/i1/IRJET-V9I117.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 7
Download now
Download to read offline
Recommended
A Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETs
IRJET Journal
VANET Clustering
VANET Clustering
ANKIT temurnikar
IRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
IRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
IRJET Journal
Control of A Platoon of Vehicles in Vanets using Communication Scheduling Pro...
Control of A Platoon of Vehicles in Vanets using Communication Scheduling Pro...
IRJET Journal
M-AODV Routing Protocol in VANET to Detect and Prevent Black Hole Attack
M-AODV Routing Protocol in VANET to Detect and Prevent Black Hole Attack
IRJET Journal
A novel k-means powered algorithm for an efficient clustering in vehicular ad...
A novel k-means powered algorithm for an efficient clustering in vehicular ad...
IJECEIAES
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
IRJET Journal
Review on IoT Based Bus Scheduling System using Wireless Sensor Network
Review on IoT Based Bus Scheduling System using Wireless Sensor Network
IRJET Journal
Recommended
A Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETs
IRJET Journal
VANET Clustering
VANET Clustering
ANKIT temurnikar
IRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
IRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
IRJET Journal
Control of A Platoon of Vehicles in Vanets using Communication Scheduling Pro...
Control of A Platoon of Vehicles in Vanets using Communication Scheduling Pro...
IRJET Journal
M-AODV Routing Protocol in VANET to Detect and Prevent Black Hole Attack
M-AODV Routing Protocol in VANET to Detect and Prevent Black Hole Attack
IRJET Journal
A novel k-means powered algorithm for an efficient clustering in vehicular ad...
A novel k-means powered algorithm for an efficient clustering in vehicular ad...
IJECEIAES
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
IRJET Journal
Review on IoT Based Bus Scheduling System using Wireless Sensor Network
Review on IoT Based Bus Scheduling System using Wireless Sensor Network
IRJET Journal
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
IJCNCJournal
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
IJCNCJournal
Smart optimization in 802.11p media access control protocol for vehicular ad ...
Smart optimization in 802.11p media access control protocol for vehicular ad ...
IJECEIAES
A Study of Message Authentication Protocol with Reduced Computation in Vehicu...
A Study of Message Authentication Protocol with Reduced Computation in Vehicu...
IRJET Journal
A044030110
A044030110
IJERA Editor
IRJET- Survey on Delivering Hazardous Event Messages to Distinct Vehicles
IRJET- Survey on Delivering Hazardous Event Messages to Distinct Vehicles
IRJET Journal
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Editor IJCATR
Performance evaluation of vanets
Performance evaluation of vanets
csandit
Inter vehicular communication using packet network theory
Inter vehicular communication using packet network theory
eSAT Publishing House
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
pijans
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
pijans
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
AM Publications,India
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
International Journal of Computer and Communication System Engineering
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
IRJET Journal
14 27 may17 12mar 7266 7192-1-sm edit septian
14 27 may17 12mar 7266 7192-1-sm edit septian
IAESIJEECS
Real–Time Intelligent Transportation System based on VANET
Real–Time Intelligent Transportation System based on VANET
IRJET Journal
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Editor IJARCET
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Editor IJARCET
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)
ijceronline
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to ACT: Securing Vanet Against Malicious Vehicles Using Advanced Clustering Technique
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
IJCNCJournal
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
IJCNCJournal
Smart optimization in 802.11p media access control protocol for vehicular ad ...
Smart optimization in 802.11p media access control protocol for vehicular ad ...
IJECEIAES
A Study of Message Authentication Protocol with Reduced Computation in Vehicu...
A Study of Message Authentication Protocol with Reduced Computation in Vehicu...
IRJET Journal
A044030110
A044030110
IJERA Editor
IRJET- Survey on Delivering Hazardous Event Messages to Distinct Vehicles
IRJET- Survey on Delivering Hazardous Event Messages to Distinct Vehicles
IRJET Journal
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Editor IJCATR
Performance evaluation of vanets
Performance evaluation of vanets
csandit
Inter vehicular communication using packet network theory
Inter vehicular communication using packet network theory
eSAT Publishing House
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
pijans
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
pijans
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
AM Publications,India
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
International Journal of Computer and Communication System Engineering
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
IRJET Journal
14 27 may17 12mar 7266 7192-1-sm edit septian
14 27 may17 12mar 7266 7192-1-sm edit septian
IAESIJEECS
Real–Time Intelligent Transportation System based on VANET
Real–Time Intelligent Transportation System based on VANET
IRJET Journal
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Editor IJARCET
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Editor IJARCET
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)
ijceronline
Similar to ACT: Securing Vanet Against Malicious Vehicles Using Advanced Clustering Technique
(20)
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
Smart optimization in 802.11p media access control protocol for vehicular ad ...
Smart optimization in 802.11p media access control protocol for vehicular ad ...
A Study of Message Authentication Protocol with Reduced Computation in Vehicu...
A Study of Message Authentication Protocol with Reduced Computation in Vehicu...
A044030110
A044030110
IRJET- Survey on Delivering Hazardous Event Messages to Distinct Vehicles
IRJET- Survey on Delivering Hazardous Event Messages to Distinct Vehicles
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance evaluation of vanets
Performance evaluation of vanets
Inter vehicular communication using packet network theory
Inter vehicular communication using packet network theory
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
14 27 may17 12mar 7266 7192-1-sm edit septian
14 27 may17 12mar 7266 7192-1-sm edit septian
Real–Time Intelligent Transportation System based on VANET
Real–Time Intelligent Transportation System based on VANET
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
dollysharma2066
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
roselinkalist12
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Dr. Gudipudi Nageswara Rao
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
k795866
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
RajaP95
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
me23b1001
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
Recently uploaded
(20)
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
Internship report on mechanical engineering
Internship report on mechanical engineering
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
ACT: Securing Vanet Against Malicious Vehicles Using Advanced Clustering Technique
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 01 | Jan 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 89 ACT: Securing Vanet Against Malicious Vehicles Using Advanced Clustering Technique D. Govindaraj, M.Sc., (Ph.D).,1 C. Rajkumar, M.C.A., (Ph.D).,2 P. Sakthi Murugan., M.Sc(CS)., M.Phil.,(P.hD).3 1,2,3Assistant Professor, Department of Computer Science, Kaamadhenu Arts and Science College, Sathyamangalam, Tamilnadu ------------------------------------------------------------------------***--------------------------------------------------------------------- Abstract: Vehicular Ad-hoc NETworks (VANETs) are a contemporary technology that assists a vehicle and its driver in a variety of ways. VANETs' key features are nodes, which are vehicles with reasonably high mobility and a continually changing topology. When it comes to data transmission in VANETs, a source node must rely on intermediary nodes to transfer data packets to the destination node through multi- hop paths. VANETs may provide improved performance if all of its nodes communicate effectively and cooperatively. In VANETs, a node may produce and broadcast critical messages to other nodes in the network for the sake of safety. A good clustering method is necessary for network stability and network productivity. This article proposes an ACT approach for creating an advanced cluster on a VANET network and detecting rogue network nodes for network security. The HMAC protocol is tested in Network Simulator (NS2) for speed and accuracy, and it is also compared to the AODV routing system. It has been discovered that when VANET is in a high mobility and adaptable architecture, ACT performs much better. The proposed protocol's performance is assessed using the following performance metrics: average end-to-end latency, throughput, routing load, and packet delivery ratio. The proposed protocol's performance is assessed in the presence of malevolent (route modifiers and packet droppers) vehicles, and the findings reveal that the suggested protocol achieves higher accuracy and outperforms the AODV routing protocol. Keywords: ACT, VANET, RSU, CH, Malicious Vehicle, HMAC, AODV 1 INTRODUCTION Capability and the extremely changeable topology of Vehicular Ad Hoc Networks (VANETs) are the most significant barriers to the widespread use of this promising technology. Adopting an effective VANET technology with well-developed architecture is no longer an essay, which is why VANET architecture is a prominent issue among research scholars. There are several network types accessible, including ad-hoc networks, sensor networks, computer networks, and IoT device networks. One of the most significant issues in a sensor network is organising network nodes to ensure connection and optimal efficiency in terms of taken parameters. Energy is a significant component in sensor networks since battery capacity is restricted and energy limits are crucial in sensor network longevity. As a result, it is critical to create a network with a strong architecture and appropriate operation in a dedicated network, and several designs and protocols have been established to organise the sensor network. Sensor nodes are organised into distinct clusters, and one sensor node from each cluster is chosen as the cluster head (CH), who subsequently serves a unique role as a vital routing element as an alternative to the malicious node. Furthermore, each CH develops a transmission schedule for the cluster's sensor nodes. Schedule allows for automated topology change inside a cluster based only on the shortest distance with CH. The clustering notion is being used in the VANET structure. Several clustering strategies have been discovered to be used in VANET. Figure 1: VANET Architecture
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 01 | Jan 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 90 In VANET, a multi-expert-based stable bunching approach is used. This strategy involves RSU experts and vehicle operators. The size of the group is varied and chosen by RSU specialists based on relative versatility, which is recorded by the average speed of the significant number of cars in extends. Following the formation of the group, the RSU operator selects and selects the appropriate bunch head based on weight factor, with the vehicle with the highest weight factor selected as CH. The movement of control messages between vehicles during the bunch and group head selection arrangement introduces directing overhead into the system. We employ RSU for bunch organisation and group head selection, which helps to reduce system steering overhead. The selection of different group sizes based on all factors considered and the typical speed of vehicles will aid in the formation of long-living bunches. When reproduction is performed in NS2, the presented method outperforms in terms of bunch life time, CH choice time, and group construction time. The primary goal for the proposed work is to construct a stable bunch based on vehicle speed and neighbour list. To complete the specified work, we use adaptable and static programming techniques. RSU operators form the group and choose the group leader, after which the group is left to function on its own. Bunch the board is completed by the group leader, and it also interacts with the group to move all other part cars. 2 BACKGROUND STUDY Zhexin Xu suggested an innovative adaptive multichannel MAC protocol to improve the utilisation and equity of the intended time-slot allocation method for VANETs. The suggested protocol is essentially based on the concept of SD-TDMA. The goal is for collision clients to be able to participate in the time slot allocation mechanism as soon as possible following the commencement of SCHI. When compared to existing approaches, it became shown that our technique may more efficaciously and dynamically allot time slots according with the detection topology, while simultaneously lowering transmission collisions using a single detection method. Different types of access technologies may be used in the future to improve spectrum use. [8] Laisen Nie et al offered anspatio-temporal aspects of visitors matrix are taken into account in anomaly identification, as well as a CNN-primarily based fully anomaly detection method. The hierarchical convolution and sub-sampling layers extract multi-fractal and coffee- rank characteristics thoroughly for estimating community web site visits. In addition, a threshold-based fully entirely method is alluded to in this strategy for the identification of anomalies. The simulated results claim that their suggested methodology may detect abnormalities in ordinary website online site visitors flows exactly for VANETs utilising the resource of way of reading the provided method employing the real community dataset [10]. Zhihao Ding suggested a stepped forward routing protocol in VANETs as a way of improving on the previous approach of the current GPSR routing protocol. The highlight of our suggested routing protocol is that it reduces route elimination and manual route dependability. They used mobility and MAC cast off estimates to enhance the GPSR routing protocol's following hop preference approach. Our routing protocol's strategy is entirely dependent on vehicular digital devices, which may provide a massive quantity of vehicular data. They provided mobility information (velocity and route) as well as MAC remove estimate in the succeeding hop choice approach to improve the direction's reliability and decrease waste. [11] Kuldip Singh Atwal et al. widely disseminated a delegating control capability amongst a global controller in clouds and nearby controllers on every OBU, it provides a possibility for V to-V, V-to-I, and hybrid conversation, and they achieved packages to demonstrate efficient mobility management and QoS guidance of the concept [12]. N. B. Gayathri et al. have developed a green certificates-a lot less authentication system for batch verification in VANETs. The suggested approach does not make use of bilinear pairings over elliptic curves. In terms of authentication, integrity, privacy, non-repudiation, traceability, anonymity, and revocation, the suggested approach is friendly. Our methodology employs a batch verification method to validate a pair of signatures in a single example, significantly reducing the computational effort on RSUs [13]. Mumin Ozpolat et al. suggested a tractable insurance model for city mmWave ad hoc vehicular networks for two specific cases. It is well known that line methods may be used to version vehicular networks, which facilitates assessment. The mathematical model, which was built with the help of Monte Carlo simulations, revealed that city mmWave ad hoc vehicle networks have a likely usable resource entirely connected visitors, which, in comparison to VANET, is more sensitive to a rise in transmitter density [14]. Xinxin He et al. presented a tighter TC with higher high quality in a large-scale fading environment. Within the Rayleigh fading environment, a basic expression of TC applied to a sparse site visitors scenario and a TC
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 01 | Jan 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 91 improved application to a dense net web page website online site visitors scenario are derived. As a consequence, in a dense visitor scenario, the TC of a linear VANET under Rayleigh fading channels is determined using the basic formula [16]. Zhiwei Yanget et al. provided a totally new clustering set of rules for VANETs with the helpful resource of considering automobile navigation routes. Based entirely on the overlapping insane portions of routes from unique motors, they created a feature to predict the duration that motors may likewise additionally additionally moreover continue to be buddies in future voyage. Cluster heads are chosen based entirely on the total period that a vehicle may keep its network in the future. Their recommended approach type of parameter has progressed universal normal performance metrics, along with the presence of clusters, and a broad range of reputation changes [19]. 3 SYSTEM MODEL The attacker affects and modifies the nodes such that they do not relay information. These occupy the information that is produced by nodes and is sent. The reprogrammed nodes are known as black hole nodes, and the area in which they are located is known as the black hole region. During the communication process, the Sybil attacker connects with the other node using a one-hop mechanism. In such case, each node has access to any other regular node, and it is the simplest approach to get data from nodes such as node location and id. Every node has sensible agents that are localised to preserve the accept as true with and neighbour node records. The dynamic consider updating mechanism is maintained by making use of some of the following matrices. They are the amount of power spent, the community's latency, the number of lost packets, node capabilities, and neighbour node collaboration. Message Authentication and Integrity: A hub vehicle should be able to authenticate that a message was delivered, passed, and tagged by an outside hub or vehicle (or a legal gathering portion) without being altered, modified, or changed by anybody. Identity protection Isolation security: A vehicle's actual and distinct personality should not be linked or related to any message so that other cars or even RSUs can't expose a vehicle's true character by breaking down numerous messages delivered by it. Traceability: As far as I am aware, a vehicle's true nature should be concealed if and when necessary. The TA should be able and in a position to recognise and understand a vehicle's true nature and link the message to the sender. Vehicle Deployment and Network Construction: VANET is a network of nodes that are moving VANET's goal is to offer communication amongst exceptional nearby vehicles. Mobile Domain: This domain is divided into two parts. Vehicle domain, which includes all moving vehicles such as buses, trucks, and so on. The second component consists of mobile devices, which include all portable devices such as PDAs, laptops, and smart phones. Infrastructure Domain: It has two folds as well. Road- side infrastructure comprises of stationary road-side entities such as traffic signal poles and so on, while centralised infrastructure domain consists of a central management centre, traffic management centre, and so on. Generic Domain: It includes both network infrastructure and personal infrastructure, such as all internet mobile and data servers that support VANET architecture. The communication between all VANET devices is accomplished via the use of a wireless channel known as wave. This kind of connectivity and message transmission provides us with a wealth of information to drivers and passengers, as well as allowing security apps to improve security and provide a more comfortable driving experience. The most important gadget components are the utility (AU), (OBU), and (RSU). Figure 2: Roadmap generation using Ns2 simulation tool.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 01 | Jan 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 92 On board unit (OBU): An OBU is a wave gadget generally mounted over vehicle the fundamental primary work of the OBU are 1. Positive message move. 2. Wireless Radio access 3. Specially appointed and Geographical directing 4. System clog control 5. Information security and IP versatility. B. Application unit (AU): The AU is a circuit device built within the vehicle mode that employs the applications programming provided by the provider while employing the OBU's communication capabilities. The AU is used to operate the Internet [8]. The AU can be a devoted circuit gadget for security applications or a standard gadget, for example, a single computerised associate to run the Internet. The AU can be interconnected to the OBU through a wired or remote association and may live with the OBU in a solitary physical gadget unit the distinction between the AU and the OBU is coherent. Roadside Unit (RSU): The RSU is a remote device that is often located along the street side or in designated places, such as junctions, squares, streets, or near parking spaces. The RSU is outfitted with one system gadget gear for a dedicated brief small - extension correspondence based on IEEE802.11p radio-based innovation, and it may also be equipped with additional system gadgets to be used for correspondence within the infrastructural arrange. 1. Extending the correspondence scope of the specifically designated system by re-circulating data to various OBUs and transmitting data to various RSUs in 2. Executing security applications, for example, a low scaffold mishap cautioning or work zone using framework infrastructure to vehicle (I2V) and acting as a data source. 3. Making Internet access available to OBUs. Attack Construction: An attack launched by an external source against a portion of a network's nodes. The attacker affects and modifies the nodes such that they do not relay information. These occupy the information that is produced by nodes and is sent. The reprogrammed nodes are known as black hole nodes, and the area in which they are located is known as the black hole region. The sensor nodes in the network are represented by the little green circles. The black hole area is the name given to the holding zone. The attacked intruded route traffic is always automatically discarded. The black hole area serves as the entry point for a huge variety of assaults. Because of the attacker's activity, the network's quality of service is greatly impacted, resulting in packet loss, increased latency, and lower throughput. A Sybil attack produces a large number of identities from the same faulty node. This form of attack is the most hazardous to the VANET since it serves as a gateway for other types of assaults such as wormholes and sinkholes. The Sybil attacker is created when one node talks with another using a one-hop mechanism during the communication process. In such case, each node has access to any other regular node, and it is the simplest method to get data from nodes such as node location and id, among other things. Using this information, the attacker node will generate similar ids in order to launch assaults on the regular nodes. Clustering Technique: The trust-white value of the nodes, the trust value of the route, and the coverage area of the nodes that are directed to the child nodes by a fuzzy based cluster This technique focuses on cluster routing via the use of a fuzzy (fcm-fuzzy cluster mechanism) approach in which the cluster head is chosen at random and all nodes have the same amount of strength. The nodes with the most spiritual force are chosen as CH. Because the method is one of the centralised CH choice algorithms, the CH is responsible for consumption of energy calculation and direction routing considerations decision here, the major advantage is to decrease the node distance. On the introductory condition accept as true with price is suggested the use of the immediately talk with the neighbour communicate nodes. There are sensible agents in each node who are localised to manner and accept as true with, and neighbour node records are also kept. The dynamic consider updating mechanism is maintained by making use of some of the following matrices. They are the amount of power spent, the community's latency, the number of lost packets, node capabilities, and neighbour node collaboration. NSO Optimization: Node Swarm Optimization (NSO) is a technique of development in which regular species social fundamental practises are taken into account with the ultimate goal of computation. It is a swarm intelligence system that relies on the populace to execute an improvement procedure
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 01 | Jan 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 93 with the goal of improving a wellness work. This technology employs a swarm with the purpose of searching on each node and recording the health assessment of each molecule. The particles are then linked with their coordinating speed. It will help the node make the shift to a legal region by taking into account the enhanced wellness capacity's cost. From every piece of information nearby, best position increases the worldwide best situation to identify the group head position in order to limit the overall vitality consumption. When compared to other scientific and heuristic techniques, PSO calculation has higher productivity and throughput. HMAC- cross layer Approach Initially, the node begins by determining the best intermediate node from the location. This is made feasible via the periodic dissemination of greeting messages. In this example, the greeting message is exchanged every 30 seconds. And the hello memory is then transmitted between nodes, enabling the nodes to discover the next neighbour and the information is saved in the neighbours list. The node begins sensing important characteristics and sends data to the destination using CSMA technology. This technique is repeated until two requirements are met. They are as follows: (a) there should be no rise in traffic load; and (b) there should be no emergency packet transmission. The transmission of high-priority region-based data has started. If any node is detected as being in the high precedence area, those surrounding nodes store the data and switch to TDMA, providing the current slot to the node that is in the high precedence zone. If two nodes occupy the high priority zone in the current slot, they will be allocated to transmit data one after the other. Finally, CSMA mode will be enabled. The packet contains all of the node identifying information, and those data are transferred together with the packets, increasing the speed of data flow from one node to another. The buffer level of the node furthest from the sink is extremely low, causing the node to migrate closer to the sink node in order to boost the buffer level. The network's threshold value is specified here to compute total memory availability. 4. RESULTS AND DISCUSSION The Proposed ACT method to implemented by using Ns2 simulation tool. In existing AODV protocol has compared with the proposed protocol. The comparison charts like delay, PDR, Energy, Routing overhead, packet loss, throught parameters are given. Figure 3: End to End delay comparison chart Figure 4: Packet delivery ratio
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 01 | Jan 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 94 Figure 5: Comparison chart for Energy consumption Figure 6: Comparison chart for routing overhead Figure 7: Packet loss comparison Figure 8: Throughput comparison chart In figure 3 to 8 are represented the comparison chart for the delay, PDR, Energy, Routing overhead, packet loss, throught parameters. When comparing the Existing method AODV protocol, the proposed method achives the better performance. 5. CONCLUSION The network connection is an essential requirement in the case of VANET, and the security of the vehicular ad hoc network is greatly rising day by day due to the adoption of transportation systems. The issues of VANET security must yet be addressed for fully protected VANET environments. The Advanced Clustering Technique
7.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 01 | Jan 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 95 (ACT) method that we devised is a scalable mechanism that makes effective use of the number of equipped cars travelling in a road section to estimate overall traffic density optimally. An ACT technique has been presented for creating a stable cluster in VANET and removing rogue nodes from the network. The advanced clustering approach is used to offer a stable cluster head and to remove malicious nodes, the PSO optimization is used to generate node records and to estimate their health, and lastly the HMAC protocol is used for energy efficiency. We will continue to enhance the PDR and communication overhead. 6. REFERENCES 1. ZhexinXu et al,” Adaptive multichannel MAC protocol based totally on SD-TDMA mechanism for the vehicular advert hoc network”, IET conversation, Vol. 12 Iss. 12, pp. 1509- 1516, 2018. 2. Milind R. Penurkar et al,” Opportunistic Routing set of rules for routing messages in Emergency situations the use of Vehicular put off Tolerant network”,IEEE,2018 3. Van O et al,” Combining Spatial and Social recognition in D2D Opportunistic Routing”, IEEE Communications magazine,2018. 4. Ms. Varsha T. Lokare et al.” Markov Chain based totally absolutely Opportunistic Routing Protocol to beautify the overall overall performance of the MANET”, IEEE XploreCompliant, 2018. 5. Li et al,” glide-layer and reliable Opportunistic Routing algorithm for cell advert Hoc Networks”, IEEE, 2018. 6. Hajer Ben Fradj et al,” Comparative have a have a have a have a look at of Opportunistic Routing in wireless Sensor Networks”,IEEE,2018 7. Yue Cao et al,” A Trajectory-pushed Opportunistic Routing Protocol for VCPS”, IEEE Transactions On Aerospace and digital systems, 2018. 8. ZhexinXu et al,” Adaptive multichannel MAC protocol based on SD-TDMA mechanism for the vehicular ad hoc community”, IET Commun., 2018, Vol. 12 Iss. 12, 2018. 9. Xiaoping Yang et al,” development of GPSR protocol in Vehicular ad hoc community”, IEEE, 2018. 10. Laisen Nie et al,” Spatio-Temporal network website internet web page traffic Estimation and Anomaly Detection based totally mostly on Convolutional Neural community in Vehicular ad-Hoc Networks”,IEEE,quantity 4,2018. 11. Zhihao Ding et al,” Mobility based Routing Protocol with MAC Collision development in Vehicular advert Hoc Networks”, IEEE, 2018. 12. Kuldip Singh Atwal et al,” SDN-based without a doubt Mobility control and QoS useful aid for Vehicular advert- hoc Networks”, ICNC, 2018. 13. N. B. Gayathri et al,” inexperienced Pairing-loose Certificateless Authentication Scheme with Batch Verification for Vehicular advert-hoc Networks”, IEEE, 2018. 14. MuminOzpolat et al,” A Grid-primarily based completely insurance assessment of city mmWave Vehicular advert Hoc Networks”, IEEE, 2018. 15. Leandro N. Balico et al,” Localization Prediction in Vehicular advert Hoc Networks”, IEEE, 2018. 16. Xinxin He et al,” Transmission potential assessment for Vehicular advert Hoc Networks”, IEEE, 2018. 17. Abdel-Mehsen Ahmad et al,” Chain-primarily based absolutely records Dissemination in Vehicular advert-hoc Networks”, IEEE, 2018. 18. Abdul Rahim Ansari et al,” correct 3-D Localization method for Public safety packages in Vehicular advert-Hoc Networks”, IEEE, 2018. 19. Zhiwei Yang et al,” Navigation direction based genuinely robust Clustering for Vehicular advert Hoc community”, IEEE, 2018
Download now