At the late years, researches focused on the cyber denial of service (DoS) attacks in the vehicle ad hoc networks (VANETS). This is due to high importance of ensuring the save receiving of information in terms of vehicle to vehicle (V2V), vehicle to infrastructure (V2I) and Vehicle to Road side unit (V2R). In this paper, a cyber-security system is proposed to detect and block the DoS attacks in VANET. In addition, a simulator for VENAT based on lightweight authentication and key exchange is presented to simulate the network performance and attacks. The proposed system consists of three phases: registration, authentication as well as communications and DoS attack detection. These phases improve the system ability to detect the attacks in efficient way. Each phase working is based in a proposed related algorithm under the guidance of lightweight protocol. In order to test the proposed system, a prototype is considered includes six cars and we adopt police cars due to high importance of exchanged information. Different case studies have been considered to evaluate the proposed system and the obtained results show a high efficiency of performance in terms of information exchange and attack detection.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDr.Irshad Ahmed Sumra
In this
respect, the network availability is exposed to many types of attacks.
In this paper, Denial of Service (DOS) attack on network availability
is presented and its severity level in VANET environment is
elaborated. A model to secure the VANET from the DOS attacks has been developed and some possible solutions to overcome the attacks have been discussed.
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...Editor IJCATR
In recent years, the number of automobiles on the road has increased tremendously. Due to high density and mobility of vehicles,
possible threats and road accidents are increasing. Wireless communication allows sending safety and other critical information. Due to this
inherent wireless characteristic and periodic exchange of safety packets, Vehicular Ad-hoc Network (VANET) is vulnerable to number of
security threats like Sybil attack or temporal attack. In this paper, a detailed discussion has been done on both the type of attacks. With the
help of already published works, some approaches have also been studied which have proved to be of significance in detection of these
attacks.
A Survey on Vehicle to Infrastructure Communication SystemIOSR Journals
Abstract: Vehicle-to-Infrastructure (V2I) Communications for Safety is the wireless exchange of critical safety
and operational data between vehicles and roadway infrastructure, intended primarily to avoid motor vehicle
crashes. Vehicle-to-infrastructure (V2I) communication based on wireless local area network (WLAN) IEEE
802.11 standard technology can support user in-motion to achieve preferable Internet connectivity. This
standard is created for urgent short message transmission.The IEEE 802.11 standard defines an infracture
mode with at least one central access point connected to a wired network. In this paper we present an
experimental study of IEEE802.11g using off-the-shelf devices in vehicle-to-infrastructure small scale scenario.
In order to evaluate the V2I the type of communication in large scale scenario and intelligent transportation
systems (ITS) will necessitate wireless vehicle-to-infrastructure (V2I) communica-tions. This wireless link can
be implemented by several technolo-gies, such as digital broadcasting, cellular communication, or dedicated
short range communication (DSRC) systems. Analyses of the coverage and capacity requirements are presented
when each of the three systems are used to implement the V2I link
Keywords: Short Range Vehicle Network; 802.11g; wireless network; goodput; network performance;
transport; mobile stations; auto traffic; vehicle speed
Security attacks and solutions in vehicular ad hoc networks a surveypijans
Vehicular Ad hoc Networks (VANETs) have emerged recently as one of the most attractive topics for
researchers and automotive industries due to their tremendous potential to improve traffic safety, efficiency
and other added services. However, VANETs are themselves vulnerable against attacks that can directly
lead to the corruption of networks and then possibly provoke big losses of time, money, and even lives. This
paper presents a survey of VANETs attacks and solutions in carefully considering other similar works as
well as updating new attacks and categorizing them into different classes.
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
Designing a protocol structure which contains the control system, VANET device and the type of communication message structures which will implement the message packets for v2v or v2I infrastructure . The different message packets contain the information required to transfer from one node to another in vehicular network for communication. Design various algorithm required for Control, Alert and Infotainment messages. Time stamping lowering data rate efficient packet delivery and proper communication of required messages. Implementation of proposed algorithms and comparison of them with existing algorithms and study of different factors affecting the working of theses algorithms. Analysis of proposed design approach and improvements in results if required.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDr.Irshad Ahmed Sumra
In this
respect, the network availability is exposed to many types of attacks.
In this paper, Denial of Service (DOS) attack on network availability
is presented and its severity level in VANET environment is
elaborated. A model to secure the VANET from the DOS attacks has been developed and some possible solutions to overcome the attacks have been discussed.
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...Editor IJCATR
In recent years, the number of automobiles on the road has increased tremendously. Due to high density and mobility of vehicles,
possible threats and road accidents are increasing. Wireless communication allows sending safety and other critical information. Due to this
inherent wireless characteristic and periodic exchange of safety packets, Vehicular Ad-hoc Network (VANET) is vulnerable to number of
security threats like Sybil attack or temporal attack. In this paper, a detailed discussion has been done on both the type of attacks. With the
help of already published works, some approaches have also been studied which have proved to be of significance in detection of these
attacks.
A Survey on Vehicle to Infrastructure Communication SystemIOSR Journals
Abstract: Vehicle-to-Infrastructure (V2I) Communications for Safety is the wireless exchange of critical safety
and operational data between vehicles and roadway infrastructure, intended primarily to avoid motor vehicle
crashes. Vehicle-to-infrastructure (V2I) communication based on wireless local area network (WLAN) IEEE
802.11 standard technology can support user in-motion to achieve preferable Internet connectivity. This
standard is created for urgent short message transmission.The IEEE 802.11 standard defines an infracture
mode with at least one central access point connected to a wired network. In this paper we present an
experimental study of IEEE802.11g using off-the-shelf devices in vehicle-to-infrastructure small scale scenario.
In order to evaluate the V2I the type of communication in large scale scenario and intelligent transportation
systems (ITS) will necessitate wireless vehicle-to-infrastructure (V2I) communica-tions. This wireless link can
be implemented by several technolo-gies, such as digital broadcasting, cellular communication, or dedicated
short range communication (DSRC) systems. Analyses of the coverage and capacity requirements are presented
when each of the three systems are used to implement the V2I link
Keywords: Short Range Vehicle Network; 802.11g; wireless network; goodput; network performance;
transport; mobile stations; auto traffic; vehicle speed
Security attacks and solutions in vehicular ad hoc networks a surveypijans
Vehicular Ad hoc Networks (VANETs) have emerged recently as one of the most attractive topics for
researchers and automotive industries due to their tremendous potential to improve traffic safety, efficiency
and other added services. However, VANETs are themselves vulnerable against attacks that can directly
lead to the corruption of networks and then possibly provoke big losses of time, money, and even lives. This
paper presents a survey of VANETs attacks and solutions in carefully considering other similar works as
well as updating new attacks and categorizing them into different classes.
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
Designing a protocol structure which contains the control system, VANET device and the type of communication message structures which will implement the message packets for v2v or v2I infrastructure . The different message packets contain the information required to transfer from one node to another in vehicular network for communication. Design various algorithm required for Control, Alert and Infotainment messages. Time stamping lowering data rate efficient packet delivery and proper communication of required messages. Implementation of proposed algorithms and comparison of them with existing algorithms and study of different factors affecting the working of theses algorithms. Analysis of proposed design approach and improvements in results if required.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes
A review on various security attacks in vehicular ad hoc networksjournalBEEI
Ad hoc vehicle networks (VANET) are being established as a primary form of mobile ad hoc networks (MANET) and a critical infrastructure to provide vehicle passengers with a wide range of safety applications. VANETs are increasingly common nowadays because it is connecting to a wide range of invisible services. The security of VANETs is paramount as their future use must not jeopardize their users' safety and privacy. The security of these VANETs is essential for the benefit of secure and effective security solutions and facilities, and uncertainty remains, and research in this field remains fast increasing. We discussed the challenges in VANET in this survey. Were vehicles and communication in VANET are efficient to ensure communication between vehicles to vehicles (V2V), vehicles to infrastructures (V2I). Clarified security concerns have been discussed, including confidentiality, authentication, integrity, availableness, and non-repudiation. We have also discussed the potential attacks on security services. According to analysis and performance evaluations, this paper shows that the ACPN is both feasible and appropriate for effective authentication in the VANET. Finally, the article found that in VANETs, encryption and authentication are critical.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
In Vehicular Communication, the security system against the attacker is very important. Sybil attacks have been regarded as a serious security threat to ad hoc networks and sensor networks. It is an attack in which an original identity of the vehicle is corrupted or theft by an attacker to creates multiple fake identities. Detecting such type of attacker and the original vehicle is a challenging task in VANET. This survey paper briefly presents various Sybil attack detection mechanism in VANET.
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...Dr.Irshad Ahmed Sumra
Road accident and traffic congestion are global issues faced by many countries around the world. Road accident led to fatalities and injuries, while traffic congestion led to inconvenient driving and fuel energy wastage. Vehicular Ad hoc Network (VANET), as part of Intelligent Transportation System (ITS), has the ability to provide safety and non-safety applications to users on roads for safe, reliable and comfort driving. In this paper, propose an integrated multi-level Security model and core purpose of this model is to provide the resiliency against malicious attack and aim to reduce incidents of road accidents, as well as to ease traffic congestion.
Mobile Ad-hoc Network is group of wireless mobile device with restricted broadcast range and no use of base Infrastructure. The secure routing model helps for reduced honest elicitation and free riding problem. The term honest elicitation means it forward high recommendation for malicious node in order to avoid itself. It means the high recommendation for colludingmalicious node. When operating in hostile or suspicious setting, MANETs require privacy and ,communication security in routing protocol. In this paper we present the type of attacks and operation on network layer with routing protocol technique i.e. based on an on-demand locationbased anonymous MANET routing protocol called SMRT (secure MANET routing technique ,with trust model) that achieves security and privacy against insider and outsider adversaries.
VANET is next generation vehicular network and
its applications will be play key to safe human life while journey
on highway. Security is one of the key prominent factors for
implement VANET in real environment.In this survey paper, discuss in detail the various computing methods and illustrate the relationship with vehicular network. Using these computing
methods to secure the vehicular network from attackers and
attacks.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Dr. Amarjeet Singh
Vehicles in a vehicular ad-hoc network (VANET) broadcast information about the driving environment in the road. Due to the open-access environment, this means that the VANET is susceptible to security and privacy issues. However, none of the related works satisfies all security and privacy requirements. Besides, their proposed has huge overhead in terms of computation and communication. To address the above issues, we will propose the security and privacy scheme based on Elliptic Curve Cryptography (ECC) and one secure hash function. Hence the reliability of each message being signed and checked has been improved. The main aim of this work is to satisfy all aspect requirements of security and privacy and reduce the computational complexity of the system.
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication. The experiment showed very good results, in the line-of-sight (LOS) condition, they are limited to reception distances up to 145 meters while in the non-lineof-sight (NLOS) condition, they are limited to reception distances up to 55 meters.
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
Vehicles download the data when passing through a drive through the road (RSU) and then share the data after travelling outside the coverage of RSU.A key issue of downloading
cooperative data is how effectively data is shared among them self. Developing an application layer data exchange protocol for the coordination of vehicles to exchange data according to
their geographic locations. Coordinated sharing can avoid medium access control (MAC) layer
collisions and the hidden terminal effect can be avoided in the multi-hop transmission. A salient
feature of the application layer data exchange protocol, in the voluntary services, Vehicles purchase the requested data from service provider via RSUs. In this project, we propose a
cooperative data sharing with secure framework for voluntary services in special vehicles networks (VANETs). We also concentrate on security in the process of downloading data and
sharing. Applicants to ensure exclusive access to data applied and security of the vehicles
involved in the implementation.
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Dr.Irshad Ahmed Sumra
in this slide, it will discuss two new types of attacks which are called road side traffic signal attack and also Internet attack in vehicular network. The authors will explain an attacker‟s behaviour and how he/she will launch an attack on a road side traffic signal and Internet services and create problems for other users of network. Through different scenarios, it will explain the
effect of these attacks on other components of network.
Vehicular Ad hoc Network (VANET) is the favorable method to enhance the safety of divers and passengers. It becomes a basic element of the Intelligent Transportation System (ITS). It has created by applying the concepts of Mobile Ad Hoc Networks (MANETs) – which is an application of a wireless network for exchanging the data – to the domain of vehicles. They become a main element of intelligent transportation systems. In existing technique drawback is the Authentication Server (AS) gives all the working to Law Executor (LE) means AS send information to RSU, RSU send this information to law executor and then login process start but if LE behave maliciously then this authentication process fail. In our propose work, we calculate the trust of each vehicle's on the basis of their behavior. Each vehicle calculates the trust of its neighbor and send this value to AS by RSU then AS update these values and then broadcast this value by RSU, now all the vehicles have a trust value of its neighboring vehicles so that send the data by using hashing technique and use trusted path to send data source to a destination so that security enhances.
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
A System state in HTTP botnet uses HTTP protocol
for the creation of chain of Botnets thereby compromising
other systems. By using HTTP protocol and port number 80,
attacks can not only be hidden but also pass through the
firewall without being detected. The DPR based detection
leads to better analysis of botnet attacks [3]. However, it
provides only probabilistic detection of the attacker and also
time consuming and error prone. This paper proposes a Genetic
algorithm based layered approach for detecting as well as
preventing botnet attacks. The paper reviews p2p firewall
implementation which forms the basis of filtering.
Performance evaluation is done based on precision, F-value
and probability. Layered approach reduces the computation
and overall time requirement [7]. Genetic algorithm promises
a low false positive rate.
Software engineering based self-checking process for cyber security system in...IJECEIAES
Newly, the cyber security of vehicle ad hoc network (VANET) includes two practicable: vehicle to vehicle (V2V) and Vehicle to Infrastructure (V2I) that have been considered due to importance. It has become possible to keep pace with the development in the world. The people safety is a priority in the development of technology in general and particular in of VANET for police vehicles. In this paper, we propose a software engineering based self-checking process to ensure the high redundancy of the generated keys. These keys are used in underlying cyber security system for VANET. The proposed self-checking process emploies a set of NIST tests including frequency, block and runs as a threshold for accepting the generated keys. The introduced cyber security system includes three levels: Firstly, the registration phase that asks vehicles to register in the system, in which the network excludes the unregistered ones. In this phase, the proposed software engineeringbased self-checking process is adopted. Secondly, the authentication phase that checks of the vehicles after the registration phase. Thirdly, the proposed system that is able to detect the DOS attack. The obtained results show the efficient performance of the proposed system in managing the security of the VANET network. The self-checking process increased the randomness of the generated keys, in which the security factor is increased.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes.
In vehicular ad hoc network (VANETs), the applications mainly focused on the road challenging subclass of Mobile Ad-hoc Network, which empowers smart transmission among vehicles and between vehicles and roadside frameworks. It is an optimistic methodology for the Intelligent Transport System (ITS). There are numerous difficulties to be tended while utilizing VANET. It is flexible and has a high dynamic topology and flexibility which makes the conventional MANET protocols unacceptable for VANET. Trust is a principal element which is used to create a trustful environment to improve the security in vehicular networks. Trust can be calculated by observing the human behavior which creates a trusted communicating environment. In this paper, we define the architecture of VANET, then the communication establishment and various challenges. Some trust models had been defined in this paper to enforce honest information sharing between communicating nodes. Trust establishment is compulsory among communicating vehicles to build a secure messages exchange and reliability.
A review on various security attacks in vehicular ad hoc networksjournalBEEI
Ad hoc vehicle networks (VANET) are being established as a primary form of mobile ad hoc networks (MANET) and a critical infrastructure to provide vehicle passengers with a wide range of safety applications. VANETs are increasingly common nowadays because it is connecting to a wide range of invisible services. The security of VANETs is paramount as their future use must not jeopardize their users' safety and privacy. The security of these VANETs is essential for the benefit of secure and effective security solutions and facilities, and uncertainty remains, and research in this field remains fast increasing. We discussed the challenges in VANET in this survey. Were vehicles and communication in VANET are efficient to ensure communication between vehicles to vehicles (V2V), vehicles to infrastructures (V2I). Clarified security concerns have been discussed, including confidentiality, authentication, integrity, availableness, and non-repudiation. We have also discussed the potential attacks on security services. According to analysis and performance evaluations, this paper shows that the ACPN is both feasible and appropriate for effective authentication in the VANET. Finally, the article found that in VANETs, encryption and authentication are critical.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
In Vehicular Communication, the security system against the attacker is very important. Sybil attacks have been regarded as a serious security threat to ad hoc networks and sensor networks. It is an attack in which an original identity of the vehicle is corrupted or theft by an attacker to creates multiple fake identities. Detecting such type of attacker and the original vehicle is a challenging task in VANET. This survey paper briefly presents various Sybil attack detection mechanism in VANET.
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...Dr.Irshad Ahmed Sumra
Road accident and traffic congestion are global issues faced by many countries around the world. Road accident led to fatalities and injuries, while traffic congestion led to inconvenient driving and fuel energy wastage. Vehicular Ad hoc Network (VANET), as part of Intelligent Transportation System (ITS), has the ability to provide safety and non-safety applications to users on roads for safe, reliable and comfort driving. In this paper, propose an integrated multi-level Security model and core purpose of this model is to provide the resiliency against malicious attack and aim to reduce incidents of road accidents, as well as to ease traffic congestion.
Mobile Ad-hoc Network is group of wireless mobile device with restricted broadcast range and no use of base Infrastructure. The secure routing model helps for reduced honest elicitation and free riding problem. The term honest elicitation means it forward high recommendation for malicious node in order to avoid itself. It means the high recommendation for colludingmalicious node. When operating in hostile or suspicious setting, MANETs require privacy and ,communication security in routing protocol. In this paper we present the type of attacks and operation on network layer with routing protocol technique i.e. based on an on-demand locationbased anonymous MANET routing protocol called SMRT (secure MANET routing technique ,with trust model) that achieves security and privacy against insider and outsider adversaries.
VANET is next generation vehicular network and
its applications will be play key to safe human life while journey
on highway. Security is one of the key prominent factors for
implement VANET in real environment.In this survey paper, discuss in detail the various computing methods and illustrate the relationship with vehicular network. Using these computing
methods to secure the vehicular network from attackers and
attacks.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Dr. Amarjeet Singh
Vehicles in a vehicular ad-hoc network (VANET) broadcast information about the driving environment in the road. Due to the open-access environment, this means that the VANET is susceptible to security and privacy issues. However, none of the related works satisfies all security and privacy requirements. Besides, their proposed has huge overhead in terms of computation and communication. To address the above issues, we will propose the security and privacy scheme based on Elliptic Curve Cryptography (ECC) and one secure hash function. Hence the reliability of each message being signed and checked has been improved. The main aim of this work is to satisfy all aspect requirements of security and privacy and reduce the computational complexity of the system.
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication. The experiment showed very good results, in the line-of-sight (LOS) condition, they are limited to reception distances up to 145 meters while in the non-lineof-sight (NLOS) condition, they are limited to reception distances up to 55 meters.
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
Vehicles download the data when passing through a drive through the road (RSU) and then share the data after travelling outside the coverage of RSU.A key issue of downloading
cooperative data is how effectively data is shared among them self. Developing an application layer data exchange protocol for the coordination of vehicles to exchange data according to
their geographic locations. Coordinated sharing can avoid medium access control (MAC) layer
collisions and the hidden terminal effect can be avoided in the multi-hop transmission. A salient
feature of the application layer data exchange protocol, in the voluntary services, Vehicles purchase the requested data from service provider via RSUs. In this project, we propose a
cooperative data sharing with secure framework for voluntary services in special vehicles networks (VANETs). We also concentrate on security in the process of downloading data and
sharing. Applicants to ensure exclusive access to data applied and security of the vehicles
involved in the implementation.
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Dr.Irshad Ahmed Sumra
in this slide, it will discuss two new types of attacks which are called road side traffic signal attack and also Internet attack in vehicular network. The authors will explain an attacker‟s behaviour and how he/she will launch an attack on a road side traffic signal and Internet services and create problems for other users of network. Through different scenarios, it will explain the
effect of these attacks on other components of network.
Vehicular Ad hoc Network (VANET) is the favorable method to enhance the safety of divers and passengers. It becomes a basic element of the Intelligent Transportation System (ITS). It has created by applying the concepts of Mobile Ad Hoc Networks (MANETs) – which is an application of a wireless network for exchanging the data – to the domain of vehicles. They become a main element of intelligent transportation systems. In existing technique drawback is the Authentication Server (AS) gives all the working to Law Executor (LE) means AS send information to RSU, RSU send this information to law executor and then login process start but if LE behave maliciously then this authentication process fail. In our propose work, we calculate the trust of each vehicle's on the basis of their behavior. Each vehicle calculates the trust of its neighbor and send this value to AS by RSU then AS update these values and then broadcast this value by RSU, now all the vehicles have a trust value of its neighboring vehicles so that send the data by using hashing technique and use trusted path to send data source to a destination so that security enhances.
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
A System state in HTTP botnet uses HTTP protocol
for the creation of chain of Botnets thereby compromising
other systems. By using HTTP protocol and port number 80,
attacks can not only be hidden but also pass through the
firewall without being detected. The DPR based detection
leads to better analysis of botnet attacks [3]. However, it
provides only probabilistic detection of the attacker and also
time consuming and error prone. This paper proposes a Genetic
algorithm based layered approach for detecting as well as
preventing botnet attacks. The paper reviews p2p firewall
implementation which forms the basis of filtering.
Performance evaluation is done based on precision, F-value
and probability. Layered approach reduces the computation
and overall time requirement [7]. Genetic algorithm promises
a low false positive rate.
Software engineering based self-checking process for cyber security system in...IJECEIAES
Newly, the cyber security of vehicle ad hoc network (VANET) includes two practicable: vehicle to vehicle (V2V) and Vehicle to Infrastructure (V2I) that have been considered due to importance. It has become possible to keep pace with the development in the world. The people safety is a priority in the development of technology in general and particular in of VANET for police vehicles. In this paper, we propose a software engineering based self-checking process to ensure the high redundancy of the generated keys. These keys are used in underlying cyber security system for VANET. The proposed self-checking process emploies a set of NIST tests including frequency, block and runs as a threshold for accepting the generated keys. The introduced cyber security system includes three levels: Firstly, the registration phase that asks vehicles to register in the system, in which the network excludes the unregistered ones. In this phase, the proposed software engineeringbased self-checking process is adopted. Secondly, the authentication phase that checks of the vehicles after the registration phase. Thirdly, the proposed system that is able to detect the DOS attack. The obtained results show the efficient performance of the proposed system in managing the security of the VANET network. The self-checking process increased the randomness of the generated keys, in which the security factor is increased.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes.
In vehicular ad hoc network (VANETs), the applications mainly focused on the road challenging subclass of Mobile Ad-hoc Network, which empowers smart transmission among vehicles and between vehicles and roadside frameworks. It is an optimistic methodology for the Intelligent Transport System (ITS). There are numerous difficulties to be tended while utilizing VANET. It is flexible and has a high dynamic topology and flexibility which makes the conventional MANET protocols unacceptable for VANET. Trust is a principal element which is used to create a trustful environment to improve the security in vehicular networks. Trust can be calculated by observing the human behavior which creates a trusted communicating environment. In this paper, we define the architecture of VANET, then the communication establishment and various challenges. Some trust models had been defined in this paper to enforce honest information sharing between communicating nodes. Trust establishment is compulsory among communicating vehicles to build a secure messages exchange and reliability.
A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)IAEME Publication
Since Vehicular ad hoc networks (VANETs) are vulnerable to various kinds of attacks, there is a need to fulfill the security requirements like message privacy, integrity, and authentication. The authentication technique is said to be efficient if it detects compromised nodes accurately with less complexity, reduced authentication delay, and keying overhead. In this paper, a threshold-based authentication scheme for cluster-based VANETs is proposed. The vehicles are clustered, and the threshold degree of each node is estimated. The threshold degree is a combination of direct threshold degree and indirect threshold degree. Based on this estimated threshold degree, cluster heads are selected. Then, each vehicle is monitored by a set of verifiers, and the messages are digitally signed by the sender and encrypted using a public/ private key as distributed by a threshold authority and decrypted by the destination. This verifies the identity of sender as well as receiver thus providing authentication to the scheme. By simulation results, we prove that the proposed technique provides high security with less overhead and delay.
Detection of Sybil attack in vehicular ad hoc networks by analyzing network ...IJECEIAES
Vehicular ad hoc network (VANET) is an emerging technology which can be very helpful for providing safety and security as well as for intelligent transportation services. But due to wireless communication of vehicles and high mobility it has certain security issues which cost the safety and security of people on the road. One of the major security concerns is the Sybil attack in which the attacker creates dummy identities to gain high influence in the network that causes delay in some services and fake voting in the network to misguide others. The early detection of this attack can prevent people from being misguided by the attacker and save them from getting into any kind of trap. In this research paper, Sybil attack is detected by first applying the Poisson distribution algorithm to predict the traffic on the road and in the second approach, analysis of the network performance for packet delivery ratio (PDR) is performed in malign and benign environment. The simulation result shows that PDR decreases in presence of fake vehicles in the network. Our approach is simple and effective as it does not require high computational overhead and also does not violate the privacy issues of people in the network.
Vehicular ad-hoc networks (VANETs) technology has come out as an important research field over the last few years. VANETs are the likely an influencing approach to provide safety of driver and other applications for the traffic conditions as well as passengers. Being dynamic in nature, it establishes the network, according to the situation and need of the users and provides reliable communication among the vehicles. Due to its great benefits, it is highly vulnerable to various attacks and security in VANET should be taken into consideration. This paper presented the security attacks between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). Many research works have been done to improve the performance and security of this network. The main aim of this paper is the security using hashing and techniques to calculate the trust in VANETs.
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
Vehicular ad-hoc networks (VANETs) technology has turned out as a vital research field throughout the most recent couple of years. VANETs are the likely an impacting way to deal with giving security of driver and different applications for the activity conditions and additionally travelers. Being dynamic in nature, it created the network, according to the condition and requirement of the users and provides consistent communication between the vehicles. Due to its excessive advantages, it is highly susceptible to numerous attacks and security in VANET should be taken into consideration. This paper presented the security issues such as authenticity, integrity, availability, confidentiality, anonymity and non-repudiation to provide the secure communication between Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I). Numerous research works have been done to recover the performance and security of this network. The fundamental point of this paper is the several security challenges and the applications of VANETs.
MALICIOUS NODE DETECTION THROUGH AODV IN VANET ijasuc
VANET is a subset of MANET which offers communication between the nodes. VANET is a collection of
various dynamic nodes that can change it and configure itself on the network. In Vanet, various routing
protocols may be implemented to route the packet and Ad-hoc On-Demand Distance Vector (AODV) is one
of the protocol that floods the packets to discover route. In Ad hoc On Demand Vector (AODV) routing
protocol for VANET, malicious nodes may distrupt the network and make it difficult for the nodes to
communicate. In this paper, AODV Routing Protocol is analysed in vanet with and without malicious
attack. The malicious node disrupts the limit and floods the network with false packets. Malicious node will
affect the performance of the entire network as it consumes more bandwidth and drops packets which in
turn reduce the performance of AODV routing protocol and vanet.
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
Recently, vehicular ad hoc networks (VANETs) have been garnering
significant inter-est from the people involved in transportation field.
Nowadays automotive manufactur-ers have already supplying vehicles with
multitude of road sensors that provides many useful characteristics. VANET
communication not only offers the drivers and passen-gers with the various
safety related services but also provides a wide range of valuable
applications. However, the inherent openness of the wireless communication
medium used by VANETs exposes vehicles to various security and privacy
issues. Researchers have proposed many security schemes to solve the issues
mentioned above for the widespread deployment of VANETs. However,
these schemes failed to fulfill all as-pects of security and privacy
requirements. Besides, these schemes have not provided the performance
parameters such as computation and communication costs. The pri-mary
emphasis of this paper is on the taxonomy of security schemes based
conditional privacy-preserving with respect to strengths and limitations.
Besides, a comparison be-tween these schemes related to the model of
security and privacy requirements, attacks, and performance parameters is
provided. Finally, this paper critically reviews the re-lated works by taking
into consideration the design and development of all VANETs security and
privacy schemes, this paper could serve as a guide and reference.
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...IJCI JOURNAL
ith the recent advancements in and popularity of wireless ne
tworks, the security based issues are also
increasing considerably. In this paper, we look at the data s
ecurity and situational security vulnerabilities
in the communication network for fishermen at sea being develope
d by our research center. We are
proposing certain solutions and algorithms for avoiding some of the si
tuations. They are Adaptive Context-
aware Transmission Power Control (ACTPC) as a proposed solution
for preventing unauthorized users at
the maritime border, along with border alert and distress alert. Th
e algorithms are implemented using a
network of MICAz mote
Towards design strong emergency and COVID-19 authentication scheme in VANETnooriasukmaningtyas
The wide use of vehicular ad hoc networks (VANETs) in the last decade has led many researchers to find efficient and reliable methods to obtain the desired benefits and offer services, such as healthcare and traffic management. However, VANETs suffer from security issues represented by authentication and data integrity. In this paper, we propose a robust mutual authentication scheme based on elliptic curve cryptography (ECC), cryptography Hash Function, and a pseudonym. The proposed work was twofold in focus: first, on healthcare in emergency cars which use VANETs, and second, on overcoming security issues, such as resisting familiar attacks (e.g. insider attacks and reply attacks). Because of the serious situation generated by the worldwide outbreak of the Covid-19 epidemic, we also found this research valuable in supporting global efforts to combat the rapid spread of this virus, by finding the safest and fastest routes to epidemic treatment centres for medical staff, assistance teams in medical operations, fumigation control, and all work teams associated with disease control. This research attempts to contribute by proposing a special signal used to define epidemic teams. The best route, fast route can be chosen by using VANETs infrastructure. This scheme also deals with metric security features, such as key management, data integrity, and data privacy. In the communication and computation cost, we noticed that our proposed scheme achieved good results compared with the related works
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Vehicular ad hoc network is one of the most interesting research areas due to flexibility, low cost, high sensing fidelity, fault tolerance, creating many new and exciting application areas for remote sensing. So, it has emerged as a promising tool for monitoring the physical world with wireless sensor that can sense, process and communicate. Being ad-hoc in nature, VANET is a type of networks that is created from the concept of establishing a network of cars for a specific need or situation. VANETs have now been established as reliable networks that vehicles use for communication purpose on highways or urban environments. VANET considered as a distinct type of Mobile Ad Hoc Networks holds the opportunity to make peoples life and death decisions by predicting and helping the drivers and other people about the road safety and other critical conditions.
The paper considers the problem of protecting the Internet of things
infrastructure against denial-of-service (DoS) attacks at the application level.
The authors considered parameters that affect the network gateway
workload: message frequency, payload size, number of recipients and some
others. We proposed a modular structure of the attack detection tool
presented by three classifiers that use the following attributes: username,
device ID, and IP-address. The following types of classifiers have been the
objects for the research: multilayer perceptron, random forest algorithm, and
modifications of the support vector machine. Some scenarios for the behavior
of network devices have been simulated. It was proved that for the proposed
feature vector on simulated training and test data sets, the best results have
been shown by a multilayer perceptron and a support vector machine with a
radial basis function of the kernel and optimization with SMO algorithm. The
authors also determined the conditions under which the selected classifiers
have the best quality of recognizing abnormal and legitimate traffic in MQTT
networks.
V2V communication systems communicates with the approaching vehicle and avoids the accident by alerting the driver and often it drives away the vehicle if the driver fails to stop it. V2I communication system communicates with the server in the road and reduces the traffic taking place in the road.
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Networkpaperpublications3
Abstract: Vehicular ad hoc networks (VANETs) can provide scalable and cost-effective solutions for applications such as traffic safety, dynamic route planning, and context-aware advertisement using short-range wireless communication. To function properly, these applications require efficient routing protocols. However, existing mobile ad hoc network routing and forwarding approaches have limited performance in VANETs. This dissertation shows that routing protocols which account for VANET-specific characteristics in their designs, such as position and mobility of Vehicle, can provide good performance for a large spectrum of applications.
Increased vehicular traffic demands smart vehicles which can interact with each other and roadside infrastructure to prevent accidents. Vehicular Ad-hoc Network (VANET) provides this flexibility to the vehicles. In this desertion we initially analyze the performance of AODV and OLSR, and further we improve the performance of AODV by selecting the node on the basis of trust value of the successive nodes, we also reduce the neighbor hood expiry time and correspondingly update the route table of AODV, with this purposed approach we would be able to reduce the end-to-end delay of AODV sufficiently also the performance of AODV increase in terms of Throughput and packet delivery ratio.Keywords: VANET, AODV, ROUTING, ROUT TABLE.
Title: Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Author: Dalbir Singh, Amit Jain (Asst. Prof.)
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Similar to Cyber DoS attack-based security simulator for VANET (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
2. Int J Elec & Comp Eng ISSN: 2088-8708
Cyber DoS attack-based security simulator for VANET (Muntadher Naeem Yasir)
5833
proposed a distributed mechanism to protect against harmful compounds. This mechanism of action was
performed through the behavior of prediction of malicious vehicles within the network. It used Kalman filters
to divide the vehicles into three sections: white, gray and black based on working factors within the network
range. Their goal was to prevent or detect DoS attacks. They have used NS3 simulations to complete their
work within this specific environment, which result to predict malicious vehicles and this decreases as
the number of nodes increases, giving results of 80%. While if the number of compounds increases,
the percentage is gradually decreased. But it can still detect harmful attacks with high intensity and the ratio
is also high when delivering packets between vehicles. In [9], a mechanism to prevent DoS attack on
the physical layer, MAC and IEEE 802.16P was suggested. Packet delivery ratio values are used to identify
the harmful vehicles. The mechanism of work was based on the percentage of beam delivery. A list was
created to save IP all harmful vehicles. MATLAB and NS2 are used for simulations. The results have
compared in the event that there were harmful vehicles or not. A specific number of vehicles have used
only 10. The contract was discovered in seconds and added to the list.
In [10], the PSO algorithm was used in VANET to detect DoS attacks. The PSO algorithm was
based on behavior simulations. In [11], authors discussed a mechanism to combat jamming messages that
could cause a DoS attack. Naturally, there were multiple paths in the network, the path may be long or it may
be short to be considered by the vehicles. Long paths are alternative in the event of congestion or traffic
blocks. Harmful vehicles send jamming messages to the long and short paths and this causes a DoS attack.
A DoS attack separated service from vehicles on VANET to an increase traffic jams and accidents.
The researchers suggested a mechanism that worked to stop attacks by using the following parameters
(Packet Send Ratio and Segregation). This mechanism does not prevent or detect harmful vehicles from
attacking in the future on the VANET.
In [12], The authors suggested an algorithm based on the detection of an enhanced attack package to
identify DoS. The mechanism of operation of this algorithm was to verify harmful compounds as well as to
improve the performance of the system as quickly as possible. The role of road side unit (RSU) here is to
quickly check with each vehicle that works with server registration to store all the information in the database.
The algorithm taked the path of early detection of DoS attacks through the channel the vehicle is
communicating with RSU. In [13], the researchers suggested DJVAN algorithm to detect jamming in
the VANET. The algorithm was based on the packet delivery rate (PDR). When jamming was effective,
the attacker launched attacks on the two connected vehicles. Therefore, the contact could not obtain a contact
link to send the information. Even if there was a communication process, the data packets did not arrive
completely. Thus, if the value of the PDR was small, the system cloud judge whether it was DoS attacks or not.
As a result, the literary studies of some researchers regarding DoS attacks leads to considered
a lightweight protocol based on researchers work. The proposed system differs in terms of construction,
phases, and handling of DoS attacks. The proposed system supports two different types of communication,
vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (C2I).
2. PROPOSED SYSTEM
As mentioned earlier, the proposed system takes into account the online security of VANET.
The proposed system can be divided into different sub-sections as follows.
2.1. Proposed system schema
A number of the attacks have appeared recently in the VANET network, the most famous of which
are DoS that separates the vehicle from other vehicles. This leads to serious problems that may cause material
or physical damage. Figure 1 shows the proposed scheme that is based on the use of a lightweight protocol
which consists of three levels. The proposed protocol is characterized by exploiting a very small storage
space within the system, as well as a currency mainly focused on discovering DoS attacks that separate
the victim's vehicle from the service. This is done by sending number unlimited of messages which leads to
the vehicle's delusions with false information providing to take another path which can cause an overlap in
sending of correct information between police vehicles.
The proposed protocol works to determine the identity of the attacking vehicle, whether it is in
the process of sending or receiving through the time difference or the number of messages sent from
the attacker. The scheme clarifies the work of the protocol with three levels of registration, authentication,
communication and detection of the attack. The first level is the registration, between the vehicles and
the server (V2S) by sending each vehicle of request a key to the server. Then, the server returns the request
accompanied with a key for each vehicle. The second level is authentication where each vehicle works to
exchange keys with each other. Each vehicle sends the key received to the server to check the presence of
the keys in the server. The three level represents communication and attack detection through the mechanism
of the number of messages received and the time difference of messages to identify the vehicle. This level
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 5832 - 5843
5834
works to store its information within the system and disconnects the car from the network and prevents any
further trying in future.
Figure 1. Proposed system schema
2.2. Levels of the proposed system
Three levels are considered in the proposed cyber security system. These levels can be explained in
the next sub-sections.
2.2.1. Level one: registration algorithm
In the registration phase, the process between the police vehicles and the server is carried out by
sending a key request from the vehicle to the server to request a key. Figure 2 shows the work of
the proposed algorithm at the level of registration, through a number of steps outlined below:
Step 1 : Start
Step 2 : Vehicle_n selects and Identification (ID_V_n), PassWords (PW_V_n) and they generate values
(R_V_n). For ensuring security, all Vehicles computes the following:
Vehicle_n:
An=h[ID_V_n||PW_V_n]⊕R_V_n (1)
Bn=h[ID_V_n||An]⊕R_V_n (2)
Cn=h[PW_V_n||Bn]⊕R_V_n (3)
Req_n=Bn⊕Cn (4)
POLICE VEHICLES SERVER
Vehicle n+1Vehicle n Vehicle n+5Vehicle n+4Vehicle n+3Vehicle n+2
Check Key Exchange ==
Check Key Exchange ==
Check Key Exchange ==
Check Key Exchange ==
Check Key Exchange ==
Vehicle Key n+5
Vehicle Key n+4
Vehicle Key n+3
Vehicle Key n+2
Vehicle Key n+1
Vehicle Key n
Vehicle Key n
Vehicle Key n
Vehicle Key n
Vehicle Key n
Vehicle Key n+1
Vehicle Key n+1
Vehicle Key n+1
Vehicle Key n+1
Vehicle Key n+2
Vehicle Key n+3
Vehicle Key n+4
Vehicle Key n+5
Check Key Exchange ==
Check Key Exchange ==
Check Key Exchange ==
Check Key Exchange ==
Vehicle Key n+2
Vehicle Key n+2
Vehicle Key n+2
Vehicle Key n+3
Vehicle Key n+4
Vehicle Key n+5
Check Key Exchange ==
Check Key Exchange ==
Check Key Exchange ==
Vehicle Key n+4
Vehicle Key n+5
Vehicle Key n+3
Vehicle Key n+3
Check Key Exchange ==
Check Key Exchange ==
Vehicle Key n+5
Vehicle Key n+4
Check Key Exchange ==
ENC H(Msg = hello + parameters)
ENC H(Msg = hello + parameters)
ENC H
(Msg=Accident at location Z+parameters)
)Block(AttackMsg.System
ΔT
Block
ENC (Msg = Accident at location Z + parameters)
ΔT
4. Int J Elec & Comp Eng ISSN: 2088-8708
Cyber DoS attack-based security simulator for VANET (Muntadher Naeem Yasir)
5835
Step 3 : Encryption of Req_n using hash function MD5, which is the requested key, is sent to Vehicle_Server
through insecure path.
Step 4 : After receiving the Vehicle_Server the requests, it Checking whether the vehicle registered its
information inside the server beforehand, or not sent to Step 9.
As well as checking whether the vehicle is registered as an Attacker vehicle that was discovered
during the communication process, or not sent to Step 9.
Step 5 : Server selects the IDs, PWs and time response (ID_V_S, PW_V_S, T_S) and generate values
(R_V_S). For ensuring security, the Vehicle_Server computes:
Ns=h[ID_V_S||T_S]⊕R_V_S (5)
Key_V_i=h[ID_V_S||Req_i||Ns]⊕R_V_S (6)
Then, the TPD_Server Stores the result as (Key_V_i).
Step 6 : Prior to the process of sending the key, it is tested through NIST using three types of frequency,
block and runs test it to make sure that the key is strong in terms of randomness [14-16], except that
return to step 5.
Step 7 : Encrypted of Key_V_i using hash function MD5, then sent to Vehicle n through insecure path.
Step 8 : After receiving the keys of Vehicle n, TPD_Vehicle Stores its own key (Key_V_n).
Step 9 : End.
Figure 2. Vehicle n registration algorithm
Start
Data
n, PWnhoose: IDC
nRandom: R
If the Vehicle
n not Attacker
?
Vehicle n
Based on
eq. 1,eq. 2,eq. 3,eq. 4
Hash Function MD5
Database
If the Vehicle
n Registered ?
s, PWsChoose: ID
sRandom: R
Based on
eq. 5,eq. 6
Hash Function MD5
Yes
No
End
Return the register key to
Vehicle n
Test NIST for
?nkey
Sequence passes NIST test for randomness
There is evidence
that sequence is
NOT random
No
Yes
Yes
No
Server
Fetch the
Database
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 5832 - 5843
5836
2.2.2. Level two: authentication algorithm
In the Authentication phase, the authentication process takes place between a vehicle and a neighbor
vehicle (V2V) or between the vehicle and the road side units or infrastructure (V2I). After the process of
checking the vehicle registration, authentication phase begins. The authentication process is carried out by
exchanging the keys of the two vehicles with each other. Each vehicle sends its key to the server to verify
the presence of the key that was previously stored in the registration phase. Figure 3 shows the work of
the proposed algorithm for authentication, and the next steps are illustrated:
Step 1 : Start.
Step 2 : Check the Vehicle registration is it registration valid or not previously registered in the network to
be registered before the authentication phase.
Step 3 : Send vehicle n key to another vehicle n+1 (Vn2Vn+1) or infrastructure (Vn2Is).
Step 4 : After receiving the keys of Vehicle n, Vehicle n+1 or infrastructure send their keys to a vehicle n.
Step 5 : After receiving the keys, the server checks the validity of the keys and makes sure they are inside its
database.
Step 6 : After checking if the vehicle and vehicle key to be authenticated with is present, the authentication
process is successfully completed, otherwise, the authentication currency is not done.
Step 7 : End.
Figure 3. Authentication algorithm between vehicles n and n+1
Check Registration
Start
Data
Send Vehicle (n) key
to Another Vehicle
(n+1) or
Infrastructure
Is Vehicle
Registration ?
Registrartion
process
Check the Vehicle
Registration
Is Registration
valid ?
Such Vehicle is not
Authentication
Yes
End
Such Vehicle is
Authentication
The System Checks the
validity of All keys
No
Yes
Yes No
Server
Fetch the
Database
Vehicle (n+1) or
infrastructure send
their keys to a
vehicle (n)
Authentication
the keys
included ?
No
Check Authentication
6. Int J Elec & Comp Eng ISSN: 2088-8708
Cyber DoS attack-based security simulator for VANET (Muntadher Naeem Yasir)
5837
2.2.3. Level three: communication and DoS attack detection algorithm
During the communication phase and detection of DoS attacks, data transmission between two
adjacent or non-adjacent vehicles is carried out. This is done by sending a message from the vehicle n to
the vehicle n+1 for informing of an accident at the location W or requesting help or otherwise. This requires
accurate information between vehicles due to the sensitivity of the networks within the scope of maintaining
security. The proposed protocol determines the identity of the attacking vehicle through the number of
messages or the time difference that occurs during the transmission process between the sent received
messages by vehicles. The verification process of the message is done by following it inside the receiving
and sending vehicles after receiving the response message from the vehicle. Figure 4 illustrates the work of
the proposed algorithm for the communication process and the detection of DoS attacks.
Figure 4. Communication and attack detection algorithm
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 5832 - 5843
5838
The following steps illustrate the work of the algorithm.
Step 1 : Start.
Step 2 : Vehicle_n , selects: (Msg:Accident at the location W , Key_V_n , Sending time T_n) and generates
value of (U_V_n) ,then for ensuring security , the Vehicle computes:
Vehicle_n :
XXn=h[Key_V_n||T_n]⊕U_V_n (7)
YYn=h[XXn||Key_V_n]⊕U_V_n (8)
REQn=(INPUT-Msg)⊕Key_V_n⊕XXn⊕YYn⊕T_n (9)
Step 3 : Encryption of REQn using hash function SHA-256 and is sent to Vehicle_n+1 through insecure path.
Step 4 : After receiving the Vehicle_n+1 the request, it on (ΔTn+1 ≤ T_ n+1 – T_ n).
Step 5 : If the equation condition is fulfilled, the communication process is completed. If the equation
condition is not fulfilled, this means that the sending vehicle is considered as a DoS attack.
The system works to reserve the vehicle information after confirming that it is a DoS attack.
It is added to the attack list inside the server to be prevented when you try to enter the network in
the registration phase again, so it works to disconnect it from the network.
Step 6 : The car selects: (Msg: ok, Key_V_n+1 , Sending time T_ n+1) and generates value of (U_V_ n+1) ,then
for ensuring security , the Vehicle computes:
Vehicle_n+1:
CCn+1=h[Key_V_n+1||T_n+1]⊕U_V_ n+1 (10)
NNn+1=h[CCn+1||Key_V_n+1]⊕U_V_ n+1 (11)
REPn+1=(INPUT-Msg)⊕Key_V_n+1⊕CCn+1⊕NNn+1⊕ ΔT n+1 (12)
Step 7 : Encryption of REP n+1 using hash function SHA-256 and is sent to Vehicle_n through insecure path.
Step 8 : Next receiving the Vehicle_n the reply, it computed depending on (ΔTn ≤ 'T_ n – 'T_ n+1).
Step 9 : If the equation condition is fulfilled, the communication process is finished. If the equation
condition is not fulfilled, Step5.
Step 9 : End.
2.3. GUI of the proposed system
In this side, we deal with the details of the designed VANET’s simulator in terms of the Graphical
User Interface (GUI). To build this simulator, we rely on a set of software of Microsoft Visual Studio 2013,
SQL Server 2014, and Photoshop. The C# language was used in programming of the proposed protocol at all
three levels: registration, authentication, communication and detection of DoS attacks. For the data transfer
process in V2S, the vehicle traffic mechanism is coordinated within the environment used and the encryption
used within the protocol’s work. The use of a flexible programming language that deals with Network work
like C# language. As for the SQL server 2014 is required, to store the information of each vehicle, as well as
storing vehicles information on the server, it requires us to create a database for each vehicle and also to
the server. For the design of the interface, we used Photoshop.
Figure 5 shows the GUI design that is divided into four sections. The first section is the environment
that represents the vehicles and the mechanism for signal transmission between them and the server.
The second section is the infrastructure that consists of RSU connected to the server. The third section shows
the tools used for each case whether it is in the stage of registration, authentication, communication and
detection of DoS attacks. As for the last section, it represents the results interface for each stage and shows
how the protocol works.
3. RESULTS
Now, it is well known that the considered prototype includes six vehicles as a prototype. In order to
test the performance of the proposed security system, three case studies have been considered.
8. Int J Elec & Comp Eng ISSN: 2088-8708
Cyber DoS attack-based security simulator for VANET (Muntadher Naeem Yasir)
5839
Police Vehicle
Vehicle (DoS Attack)
Server
RSU
Registration V2I
Authentication V2V
Transmutation V2V
NOT- Registration V2I
NOT- Authentication V2V
NOT- Transmutation V2V (DoS Attack)
Figure 5. Graphical user interface of the proposed system
3.1. Case Studies of registration results
In this section, we address the study of registration for a number of cases that may occur during
the registration process. Also, we address the statement of the results of our proposed protocol. Note,
that the data used in the sent and received processes has been encrypted at this phase using Hash function
MD5 [17-19].
3.1.1. First one
Figure 6 shows the case that considers a successful registration process between the vehicle (A) and
the server. Starting the registration phase by sending the vehicle n a request that carries vehicle information
to the server, which must to be stored previously on the server. After the server receives the request, it checks
the vehicle information in the server. If the vehicle information is present on the server, the server sends
a response carrying a key to the vehicle as shown in Figure 7.
IDn(A) 65785 IDn-S 65785
PWn(A) 8934567887904 PWn-S 8934567887904
REQ. h[ IDn+ PWn ] MD5 IF (IDn= IDn-S)&&(PWn= PWn-S)
REP. h[ Keyn ] MD5 Successful
Figure 6. Communication between V2S (Successful)
Figure 7. Communication result between V2S (Successful)
9. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 5832 - 5843
5840
3.1.2. Second one
The second case adopts an unsuccessful registration process between the vehicle (A) and the server
as shown in Figure 8. Starting the registration phase by sending the vehicle n a request that carries vehicle
information to the server. After the server receives the request, it checks the vehicle information in the server.
If the vehicle information is not present on the server, the server sends a response carrying a message
(Cannot register or not registration) to the vehicle as shown in Figure 9.
IDn(A) 65785 IDn-S 65785
PWn(A) 7855346789856 PWn-S 8934567887904
REQ. h[ IDn+ PWn ] MD5 IF (IDn= IDn_S)&&(PWn=! PWn_S)
REP. NOT-Registration Unsuccessful
Figure 8. Communication between V2S (Unsuccessful)
Figure 9. Communication result between V2S (Unsuccessful)
3.1.3. Third one
Figure 10 shows the third case of an unsuccessful registration process between the vehicle (C) and
the server. Starting the registration phase by sending the vehicle n a request that carries vehicle information
to the server. After the server receives the request, it checks the vehicle information in it. If the vehicle n,
is already registered in the list of vehicles that pose a threat to the network after its discovery at
the communication stage. The server sends a response carrying a message (Cannot register or not registration
<<Attacker>>) to the vehicle as shown in Figure 11.
IDn(C) 87785 Attacker
list-S
Vehicle (Attack)
PWn(C) 4995346743756
REQ. h[ IDn+ PWn ] MD5 If (Vehicle = Attack)
REP. NOT-Registration Unsuccessful
Figure 10. Communication between VAttack2S (Unsuccessful)
Figure 11. Communication result between VAttack2S (Unsuccessful)
3.2. Case studies of authentication results
In the authentication section, we explain a study of two cases, namely: the success of authentication
and the lack of success of authentication and what is the role of the proposed protocol at this stage in
particular. Note that authentication occurs between V2V or V2I during the registration phase.
3.2.1. First one
In this case, the authentication process takes place between the vehicle (A) and the vehicle (B) as
shown in Figure 12. The vehicle n sends its key to the vehicle n+1. Likewise, the vehicle n+1 send its key to
the vehicle n, in order to the keys exchange. After this step, each vehicle (Vn, Vn+1) sends its key to
the server. The server, checks for the presence of the key of each vehicle. If the keys are presented for both
vehicles, authentication is successful. The result is shown in Figure 13.
10. Int J Elec & Comp Eng ISSN: 2088-8708
Cyber DoS attack-based security simulator for VANET (Muntadher Naeem Yasir)
5841
Vn(A)
h[ Keyn ] MD5
Vn+1(B)
h[ Keyn+1 ] MD5
h[ Keyn+1 ] MD5 h[ Keyn ] MD5
Check IF (Keyn = Keyn_S)&&(Keyn+1 = Keyn+1_S)
Results Successful (Authentication)
Figure 12. Authentication between V2V (Successful)
Figure 13. Authentication result between V2V (Successful)
3.2.2. Second one
In the second case, the authentication process between Vehicle (A) and Vehicle (B) is performed as
shown in Figure 14. After the key exchange process between both vehicles, each vehicle (Vn, Vn + 1) sends
its key to the server. The server checks the key for each vehicle stored on it. In the event that the vehicle
n + 1 keys exist, but the vehicle n key does not exist, which means the vehicle n is not passing
the registration phase. Therefore, the authentication process is failed as shown in Figure 15.
Vn(A)
h[ Keyn ] MD5
Vn+1(B)
h[ Keyn+1 ] MD5
h[ Keyn+1 ] MD5 h[ Keyn ] MD5
Check IF (Keyn =! Keyn_S)&&(Keyn+1 = Keyn+1_S)
Results Unsuccessful (Authentication)
Figure 14. Authentication between V2V (Unsuccessful)
Figure 15. Authentication result between V2V (Unsuccessful)
3.3. Case studies of communication and dos attack detection results
After studying the results of the registration and authentication cases, we discuss the results of
the communication case and the detection of DoS attacks, through two cases. The first case represents
a normal connection between two vehicles. The second case shows how the DoS attack is discovered during
the communication phase. Note that the data used in the transmission and reception process has been
encrypted at this stage by using Hash function SHA-256 [20-26].
3.3.1. First one
Figure 16 shows a successful communication process between the first vehicle Vn (A) and
the second vehicle Vn+1 (D). Vehicle n sends a message to the vehicle n+1 holding the following text
(accident at the location Y) to inform it of an accident at the location Y. After verifying the integrity of
the message, the vehicle n+1 sends a response bearing the following text (OK) to the vehicle n, which also
checks the received message and finds whether it is harmful to the network system or not. Figure 17 shows
the results of the communication process between both vehicles.
11. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 5832 - 5843
5842
Vn(A)
h[Accident at location Y]
SHA-256
If (ΔTn+1 ≤ Tn+1 - Tn)
Vn+1(D)
True
If (ΔTn≤ 'Tn- 'Tn+1) h[ OK ]
SHA-256True
Results Successful (Communication)
Figure 16. Communication from vehicle A to vehicle D (Normal)
Figure 17. Communication result from vehicle A to vehicle D (Successful)
3.3.2. Second one
Figure 18 shows the process of identifying or detecting a DoS attack during communication between
two vehicles (VC2VB) or (Vn2Vn+1). When the vehicle n sends a message to the vehicle n+1, it carries
the following text (accident at site X) and in large quantities to report it to an accident at site X. This is to
ensure that a vehicle takes another path or other location. After verifying the message, the type of attack is
determined using the mechanism of our protocol by calculating the time difference for the transmission and
to receive (ΔTn+1 ≤ T_ n+1 – T_ n). The Vehicle n+1 sends a response with the following text (OK) to
the server. In turn, it blocks the vehicle that posed a threat to the vehicle as well as adding it to the list of
attacking vehicles. Figure 19 shows the results of the attack detection process in our proposed protocol.
Vn(C)
h[Accident at location X]
SHA-256
If (ΔTn+1 ≤ Tn+1 - Tn)
Vn+1(B)
False
Added to the attack list in
server
h[ OK ]
SHA-256
Results Unsuccessful (Attack)
Figure 18. Communication and DoS attack detection from vehicle C to vehicle B (Attack)
Figure 19. Communication results and DoS attack detection from vehicle C to vehicle B (Attack)
4. CONCLUSION
In this paper, we have proposed a lightweight protocol of cyber security system to detect and block
of DoS attacks in VANET. A simulator for VANET was presented based on lightweight authentication and
key exchange protocol. The proposed protocol includes three levels, each of which works to maintain
12. Int J Elec & Comp Eng ISSN: 2088-8708
Cyber DoS attack-based security simulator for VANET (Muntadher Naeem Yasir)
5843
network cyber security from attacks that are related to DoS attacks to reach the required safety. These levels
were registration, authentication as well as communication and attack detection. The proposed levels worked
as obstacles to prevent the DoS attaches. Even if the attached vehicle passes the registration and
authentication levels, the third level can detect it from its behavior inside the VANET. The obtained results
showed the efficiency in performance of the proposed system in detecting the attacks. This was concluded by
considering different case studies.
REFERENCES
[1] Q. Xu, et al., “Vehicle-to-vehicle safety messaging in DSRC,” in Proceedings of the 1st ACM international
workshop on Vehicular ad hoc networks, pp. 19-28, 2004.
[2] K. B. Kelarestaghi, et al., “Survey on Vehicular Ad Hoc Networks and Its Access Technologies Security
Vulnerabilities and Countermeasures,” arXiv Prepr. arXiv1903.01541, pp. 1-22, 2019.
[3] U. Parmar and S. Singh, “Overview of various attacks in VANET,” International Journal of Engineering Research
and General Science, vol. 3, no. 3, pp. 120-125, 2015.
[4] J. M. De Fuentes, et al., “Overview of security issues in vehicular ad-hoc networks,” in Handbook of research on
mobility and computing: Evolving technologies and ubiquitous impacts, IGI global, pp. 894-911, 2011.
[5] K. Verma, et al., “An efficient defense method against UDP spoofed flooding traffic of denial of service (DoS)
attacks in VANET,” in 2013 3rd IEEE International Advance Computing Conference (IACC), pp. 550-555, 2013.
[6] P. Sirola, et al., “An analytical study of routing attacks in vehicular ad-hoc networks (VANETs),” International
Journal of Computer Science Engineering, vol. 3, no. 4, pp. 210-218, 2014.
[7] A. Pathre, “Identification of malicious vehicle in vanet environment from ddos attack,” Journal of Global Research
in Computer Science, vol. 4, no. 6, pp. 30-34, 2013.
[8] T. Bouali, et al., “A distributed prevention scheme from malicious nodes in VANETs’ routing protocols,” in 2016
IEEE Wireless Communications and Networking Conference, pp. 1-6, 2016.
[9] K. Jeffane and K. Ibrahimi, “Detection and identification of attacks in Vehicular Ad-Hoc NETwork,” in 2016
International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 58-62, 2016.
[10] S. M. Nyabuga, et al., “Using particle swarm optimization (PSO) algorithm to protect vehicular ad hoc networks
(VANETS) from denial of service (DOS) attack,” International Journal of Advanced Research in Computer
Engineering and Technology, vol. 5, no. 3, pp. 628-631, 2016.
[11] I. K. Azogu, et al., “A new anti-jamming strategy for VANET metrics-directed security defense,” in 2013 IEEE
Globecom Workshops (GC Wkshps), pp. 1344-1349, 2013.
[12] A. Singh and P. Sharma, “A novel mechanism for detecting DOS attack in VANET using Enhanced Attacked
Packet Detection Algorithm (EAPDA),” in 2015 2nd international conference on recent advances in engineering &
computational sciences (RAECS), pp. 1-5, 2015.
[13] L. Mokdad, et al., “DJAVAN: Detecting jamming attacks in Vehicle Ad hoc Networks,” Performance Evaluation,
vol. 87, pp. 47-59, 2015.
[14] V. B. Suresh, et al., “On-chip lightweight implementation of reduced NIST randomness test suite,” in 2013 IEEE
International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 93-98, 2013.
[15] A. Kaminsky, “Testing the Randomness of Cryptographic Function Mappings,” IACR Cryptology ePrint Archive,
Report 2019/078, 2019.
[16] B. Kang, et al., “Nonce-Based Key Agreement Protocol Against Bad Randomness,” International Journal of
Foundations of Computer Science, vol. 30, no. 04, pp. 619-633, 2019.
[17] M. Erritali, et al., “A Contribution to Secure the Routing Protocol "Greedy Perimeter Stateless Routing" Using
a Symmetric Signature-Based AES and MD5 Hash,” International Journal of Distributed and Parallel Systems,
vol. 2, no. 5, pp. 95-103, 2011.
[18] R. Shaikh and D. Deotale, “A survey on VANET security using ECC, RSA & MD5,” International Journal of
Advanced Research in Computer and Communication Engineering, vol. 4, no. 6, pp. 167-172, 2015.
[19] X. Wang and H. Yu, “How to break MD5 and other hash functions,” in Annual international conference on
the theory and applications of cryptographic techniques, pp. 19-35, 2005.
[20] J. Petit, “Analysis of ecdsa authentication processing in vanets,” in 2009 3rd International Conference on New
Technologies, Mobility and Security, pp. 1-5, 2009.
[21] J. J. Haas, et al., “Real-world VANET security protocol performance,” in GLOBECOM 2009-2009 IEEE Global
Telecommunications Conference, pp. 1-7, 2009.
[22] B. Pooja, et al., “Mitigation of insider and outsider DoS attack against signature based authentication in VANETs,”
in 2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE), pp. 152-157, 2014.
[23] J. Molina-Gil, et al., “Aggregation and probabilistic verification for data authentication in VANETs,” Information
Science, vol. 262, pp. 172-189, 2014.
[24] A. Smitha, et al., “An optimized adaptive algorithm for authentication of safety critical messages in VANET,” 2013
8th International Conference on Communications and Networking in China (CHINACOM), pp. 149-154, 2013.
[25] K. Mershad and H. Artail, “REACT: Secure and efficient data acquisition in VANETs,” IEEE 7th International
Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 149-156, 2011.
[26] S. A. Shah, et al., “A Dynamic Privacy Preserving Authentication Protocol in VANET Using Social Network,” in
International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed
Computing, pp. 53-65, 2019.