Vehicular ad hoc network (VANET) is an emerging technology which can be very helpful for providing safety and security as well as for intelligent transportation services. But due to wireless communication of vehicles and high mobility it has certain security issues which cost the safety and security of people on the road. One of the major security concerns is the Sybil attack in which the attacker creates dummy identities to gain high influence in the network that causes delay in some services and fake voting in the network to misguide others. The early detection of this attack can prevent people from being misguided by the attacker and save them from getting into any kind of trap. In this research paper, Sybil attack is detected by first applying the Poisson distribution algorithm to predict the traffic on the road and in the second approach, analysis of the network performance for packet delivery ratio (PDR) is performed in malign and benign environment. The simulation result shows that PDR decreases in presence of fake vehicles in the network. Our approach is simple and effective as it does not require high computational overhead and also does not violate the privacy issues of people in the network.
Vehicular Ad hoc Network (VANET) is the favorable method to enhance the safety of divers and passengers. It becomes a basic element of the Intelligent Transportation System (ITS). It has created by applying the concepts of Mobile Ad Hoc Networks (MANETs) – which is an application of a wireless network for exchanging the data – to the domain of vehicles. They become a main element of intelligent transportation systems. In existing technique drawback is the Authentication Server (AS) gives all the working to Law Executor (LE) means AS send information to RSU, RSU send this information to law executor and then login process start but if LE behave maliciously then this authentication process fail. In our propose work, we calculate the trust of each vehicle's on the basis of their behavior. Each vehicle calculates the trust of its neighbor and send this value to AS by RSU then AS update these values and then broadcast this value by RSU, now all the vehicles have a trust value of its neighboring vehicles so that send the data by using hashing technique and use trusted path to send data source to a destination so that security enhances.
Cyber DoS attack-based security simulator for VANET IJECEIAES
At the late years, researches focused on the cyber denial of service (DoS) attacks in the vehicle ad hoc networks (VANETS). This is due to high importance of ensuring the save receiving of information in terms of vehicle to vehicle (V2V), vehicle to infrastructure (V2I) and Vehicle to Road side unit (V2R). In this paper, a cyber-security system is proposed to detect and block the DoS attacks in VANET. In addition, a simulator for VENAT based on lightweight authentication and key exchange is presented to simulate the network performance and attacks. The proposed system consists of three phases: registration, authentication as well as communications and DoS attack detection. These phases improve the system ability to detect the attacks in efficient way. Each phase working is based in a proposed related algorithm under the guidance of lightweight protocol. In order to test the proposed system, a prototype is considered includes six cars and we adopt police cars due to high importance of exchanged information. Different case studies have been considered to evaluate the proposed system and the obtained results show a high efficiency of performance in terms of information exchange and attack detection.
Vehicular ad-hoc networks (VANETs) technology has come out as an important research field over the last few years. VANETs are the likely an influencing approach to provide safety of driver and other applications for the traffic conditions as well as passengers. Being dynamic in nature, it establishes the network, according to the situation and need of the users and provides reliable communication among the vehicles. Due to its great benefits, it is highly vulnerable to various attacks and security in VANET should be taken into consideration. This paper presented the security attacks between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). Many research works have been done to improve the performance and security of this network. The main aim of this paper is the security using hashing and techniques to calculate the trust in VANETs.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
Vehicular ad-hoc networks (VANETs) technology has turned out as a vital research field throughout the most recent couple of years. VANETs are the likely an impacting way to deal with giving security of driver and different applications for the activity conditions and additionally travelers. Being dynamic in nature, it created the network, according to the condition and requirement of the users and provides consistent communication between the vehicles. Due to its excessive advantages, it is highly susceptible to numerous attacks and security in VANET should be taken into consideration. This paper presented the security issues such as authenticity, integrity, availability, confidentiality, anonymity and non-repudiation to provide the secure communication between Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I). Numerous research works have been done to recover the performance and security of this network. The fundamental point of this paper is the several security challenges and the applications of VANETs.
Accident Avoidance and Privacy-Preserving in V2R Communication using Chord Al...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes
Vehicular Ad hoc Network (VANET) is the favorable method to enhance the safety of divers and passengers. It becomes a basic element of the Intelligent Transportation System (ITS). It has created by applying the concepts of Mobile Ad Hoc Networks (MANETs) – which is an application of a wireless network for exchanging the data – to the domain of vehicles. They become a main element of intelligent transportation systems. In existing technique drawback is the Authentication Server (AS) gives all the working to Law Executor (LE) means AS send information to RSU, RSU send this information to law executor and then login process start but if LE behave maliciously then this authentication process fail. In our propose work, we calculate the trust of each vehicle's on the basis of their behavior. Each vehicle calculates the trust of its neighbor and send this value to AS by RSU then AS update these values and then broadcast this value by RSU, now all the vehicles have a trust value of its neighboring vehicles so that send the data by using hashing technique and use trusted path to send data source to a destination so that security enhances.
Cyber DoS attack-based security simulator for VANET IJECEIAES
At the late years, researches focused on the cyber denial of service (DoS) attacks in the vehicle ad hoc networks (VANETS). This is due to high importance of ensuring the save receiving of information in terms of vehicle to vehicle (V2V), vehicle to infrastructure (V2I) and Vehicle to Road side unit (V2R). In this paper, a cyber-security system is proposed to detect and block the DoS attacks in VANET. In addition, a simulator for VENAT based on lightweight authentication and key exchange is presented to simulate the network performance and attacks. The proposed system consists of three phases: registration, authentication as well as communications and DoS attack detection. These phases improve the system ability to detect the attacks in efficient way. Each phase working is based in a proposed related algorithm under the guidance of lightweight protocol. In order to test the proposed system, a prototype is considered includes six cars and we adopt police cars due to high importance of exchanged information. Different case studies have been considered to evaluate the proposed system and the obtained results show a high efficiency of performance in terms of information exchange and attack detection.
Vehicular ad-hoc networks (VANETs) technology has come out as an important research field over the last few years. VANETs are the likely an influencing approach to provide safety of driver and other applications for the traffic conditions as well as passengers. Being dynamic in nature, it establishes the network, according to the situation and need of the users and provides reliable communication among the vehicles. Due to its great benefits, it is highly vulnerable to various attacks and security in VANET should be taken into consideration. This paper presented the security attacks between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). Many research works have been done to improve the performance and security of this network. The main aim of this paper is the security using hashing and techniques to calculate the trust in VANETs.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
Vehicular ad-hoc networks (VANETs) technology has turned out as a vital research field throughout the most recent couple of years. VANETs are the likely an impacting way to deal with giving security of driver and different applications for the activity conditions and additionally travelers. Being dynamic in nature, it created the network, according to the condition and requirement of the users and provides consistent communication between the vehicles. Due to its excessive advantages, it is highly susceptible to numerous attacks and security in VANET should be taken into consideration. This paper presented the security issues such as authenticity, integrity, availability, confidentiality, anonymity and non-repudiation to provide the secure communication between Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I). Numerous research works have been done to recover the performance and security of this network. The fundamental point of this paper is the several security challenges and the applications of VANETs.
Accident Avoidance and Privacy-Preserving in V2R Communication using Chord Al...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Networkpaperpublications3
Abstract: Vehicular ad hoc networks (VANETs) can provide scalable and cost-effective solutions for applications such as traffic safety, dynamic route planning, and context-aware advertisement using short-range wireless communication. To function properly, these applications require efficient routing protocols. However, existing mobile ad hoc network routing and forwarding approaches have limited performance in VANETs. This dissertation shows that routing protocols which account for VANET-specific characteristics in their designs, such as position and mobility of Vehicle, can provide good performance for a large spectrum of applications.
Increased vehicular traffic demands smart vehicles which can interact with each other and roadside infrastructure to prevent accidents. Vehicular Ad-hoc Network (VANET) provides this flexibility to the vehicles. In this desertion we initially analyze the performance of AODV and OLSR, and further we improve the performance of AODV by selecting the node on the basis of trust value of the successive nodes, we also reduce the neighbor hood expiry time and correspondingly update the route table of AODV, with this purposed approach we would be able to reduce the end-to-end delay of AODV sufficiently also the performance of AODV increase in terms of Throughput and packet delivery ratio.Keywords: VANET, AODV, ROUTING, ROUT TABLE.
Title: Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Author: Dalbir Singh, Amit Jain (Asst. Prof.)
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
In vehicular ad hoc network (VANETs), the applications mainly focused on the road challenging subclass of Mobile Ad-hoc Network, which empowers smart transmission among vehicles and between vehicles and roadside frameworks. It is an optimistic methodology for the Intelligent Transport System (ITS). There are numerous difficulties to be tended while utilizing VANET. It is flexible and has a high dynamic topology and flexibility which makes the conventional MANET protocols unacceptable for VANET. Trust is a principal element which is used to create a trustful environment to improve the security in vehicular networks. Trust can be calculated by observing the human behavior which creates a trusted communicating environment. In this paper, we define the architecture of VANET, then the communication establishment and various challenges. Some trust models had been defined in this paper to enforce honest information sharing between communicating nodes. Trust establishment is compulsory among communicating vehicles to build a secure messages exchange and reliability.
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
Designing a protocol structure which contains the control system, VANET device and the type of communication message structures which will implement the message packets for v2v or v2I infrastructure . The different message packets contain the information required to transfer from one node to another in vehicular network for communication. Design various algorithm required for Control, Alert and Infotainment messages. Time stamping lowering data rate efficient packet delivery and proper communication of required messages. Implementation of proposed algorithms and comparison of them with existing algorithms and study of different factors affecting the working of theses algorithms. Analysis of proposed design approach and improvements in results if required.
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Dr. Amarjeet Singh
Vehicular Ad-hoc Network (VANET) technology is the basis of Intelligent Transportation System (ITS) connectivity that enables the delivery of useful information to and fro between vehicles in vehicle-to-vehicle communication mode; or between vehicle and infrastructure in vehicle-to-infrastructure mode for safety and comfort. However, due to the openness of the wireless medium used by VANET, the technology is vulnerable to security threats in both communication modes. In this study, the essential background of VANET from architectural point of view and communication types are discussed. Then, the overview of modification attack in VANET is presented. In addition, this paper thoroughly reviews the existing prevention schemes for modification attack in VANET. This review paper reveals that there is still a need for a better and more efficient preventive scheme to address the modification attack in VANET.
Vehicular Messaging In IOT Using Epidemic RoutingEditor IJCATR
Now a days there are lots of inventions done in vehicles and some may in progress, these inventions help to resolve the
challenges caused by the increasing transportation issues. These modern vehicles equipped with a large amount of sensors, actuators
and communication devices e.g. GPS. New vehicles have possessed powerful sensing, networking, communication and data
processing capabilities and can communicate with other vehicles or exchange information with the external environments over various
protocols. This can be done with the help of Vehicular communication systems; these are the networks in which vehicle and roadside
units are the communicating node, with each other provide the information, such as safety warnings and traffic information. They can
be effective in avoiding accidents and traffic congestion. To solve these issue sending and receiving messages is an important factor.
All this things are good when the number of vehicles are less, system must be able to handle traffic spike or sudden demands caused
by special events or situations such as sport games or emergencies. This is nothing but a scalability challenge which is going to
overcome in this paper using routing protocol called Epidemic routing protocol.
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationIJERA Editor
VANET provide facility for the vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages to other vehicles. However, this raises the issue of security and privacy. Here, we have described various existing solutions/protocols that are used in order to satisfy the security and privacy requirement of the vehicular ad hoc network. We have also described security issues and challenges in VANET. We have presented various security attributes that may be considered as criteria to measure security such as availability, confidentiality, integrity, authentication and non-repudiation. This paper also give the detail information of some of the schemes such as RAISE ,IBV with their pros and cons.
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
Vehicles download the data when passing through a drive through the road (RSU) and then share the data after travelling outside the coverage of RSU.A key issue of downloading
cooperative data is how effectively data is shared among them self. Developing an application layer data exchange protocol for the coordination of vehicles to exchange data according to
their geographic locations. Coordinated sharing can avoid medium access control (MAC) layer
collisions and the hidden terminal effect can be avoided in the multi-hop transmission. A salient
feature of the application layer data exchange protocol, in the voluntary services, Vehicles purchase the requested data from service provider via RSUs. In this project, we propose a
cooperative data sharing with secure framework for voluntary services in special vehicles networks (VANETs). We also concentrate on security in the process of downloading data and
sharing. Applicants to ensure exclusive access to data applied and security of the vehicles
involved in the implementation.
A Novel Sybil Attack Detection Mechanism in Urban Vehicular NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
V2V communication systems communicates with the approaching vehicle and avoids the accident by alerting the driver and often it drives away the vehicle if the driver fails to stop it. V2I communication system communicates with the server in the road and reduces the traffic taking place in the road.
Iot based smart transport management systemGagan Bansal
In this paper, the author highlighted the workings, executions, implementations, and the application of the Internet of Things (IoT) in transport management and vehicle to vehicle
communication systems.
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...IJERA Editor
VANET or Vehicular Ad-Hoc Network is a special type of MANET or Mobile Ad-Hoc Network that is
designed specifically for communications between vehicles or V2V and vehicles to infrastructure or V2I. There
is a lot of studies and research that has been dedicated to study this technology due to its importance and
necessity in our life. The fact that each and every module presented must be tested thoroughly before putting it
into action, as there will be severe consequences in case of a system malfunction especially if it's a vehicular
design problem. However, seeing VANETS coming into reality becomes very close with the advancement of
IEEE 802.11p standard that is being dedicated to the DSRC or dedicated short range communication [1]. This
paper will discuss this technology emphasizing some of its applications, current limitations and future challenges
plus simulating a real traffic using SUMO and OpenStreetMap
EXAMINING MODERN DATA SECURITY AND PRIVACY PROTOCOLS IN AUTONOMOUS VEHICLESijcsit
A fully automated, self-driving car can perceive its environment, determine the optimal route, and drive
unaided by human intervention for the entire journey. Connected autonomous vehicles (CAVs) have the
potential to drastically reduce accidents, travel time, and the environmental impact of road travel. Such
technology includes the use of several sensors, various algorithms, interconnected network connections,
and multiple auxiliary systems. CAVs have been subjected to attacks by malicious users to gain/deny
control of one or more of its various systems. Data security and data privacy is one such area of CAVs that
has been targeted via different types of attacks. The scope of this study is to present a good background
knowledge of issues pertaining to different attacks in the context of data security and privacy, as well
present a detailed review and analysis of eight very recent studies on the broad topic of security and
privacy related attacks. Methodologies including Blockchain, Named Data Networking, Intrusion
Detection System, Cognitive Engine, Adversarial Objects, and others have been investigated in the
literature and problem- and context-specific models have been proposed by their respective authors
A fully automated, self-driving car can perceive its environment, determine the optimal route, and drive
unaided by human intervention for the entire journey. Connected autonomous vehicles (CAVs) have the
potential to drastically reduce accidents, travel time, and the environmental impact of road travel. Such
technology includes the use of several sensors, various algorithms, interconnected network connections,
and multiple auxiliary systems. CAVs have been subjected to attacks by malicious users to gain/deny
control of one or more of its various systems. Data security and data privacy is one such area of CAVs that
has been targeted via different types of attacks. The scope of this study is to present a good background
knowledge of issues pertaining to different attacks in the context of data security and privacy, as well
present a detailed review and analysis of eight very recent studies on the broad topic of security and
privacy related attacks. Methodologies including Blockchain, Named Data Networking, Intrusion
Detection System, Cognitive Engine, Adversarial Objects, and others have been investigated in the
literature and problem- and context-specific models have been proposed by their respective authors.
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
More Related Content
Similar to Detection of Sybil attack in vehicular ad hoc networks by analyzing network performance
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Networkpaperpublications3
Abstract: Vehicular ad hoc networks (VANETs) can provide scalable and cost-effective solutions for applications such as traffic safety, dynamic route planning, and context-aware advertisement using short-range wireless communication. To function properly, these applications require efficient routing protocols. However, existing mobile ad hoc network routing and forwarding approaches have limited performance in VANETs. This dissertation shows that routing protocols which account for VANET-specific characteristics in their designs, such as position and mobility of Vehicle, can provide good performance for a large spectrum of applications.
Increased vehicular traffic demands smart vehicles which can interact with each other and roadside infrastructure to prevent accidents. Vehicular Ad-hoc Network (VANET) provides this flexibility to the vehicles. In this desertion we initially analyze the performance of AODV and OLSR, and further we improve the performance of AODV by selecting the node on the basis of trust value of the successive nodes, we also reduce the neighbor hood expiry time and correspondingly update the route table of AODV, with this purposed approach we would be able to reduce the end-to-end delay of AODV sufficiently also the performance of AODV increase in terms of Throughput and packet delivery ratio.Keywords: VANET, AODV, ROUTING, ROUT TABLE.
Title: Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Author: Dalbir Singh, Amit Jain (Asst. Prof.)
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
In vehicular ad hoc network (VANETs), the applications mainly focused on the road challenging subclass of Mobile Ad-hoc Network, which empowers smart transmission among vehicles and between vehicles and roadside frameworks. It is an optimistic methodology for the Intelligent Transport System (ITS). There are numerous difficulties to be tended while utilizing VANET. It is flexible and has a high dynamic topology and flexibility which makes the conventional MANET protocols unacceptable for VANET. Trust is a principal element which is used to create a trustful environment to improve the security in vehicular networks. Trust can be calculated by observing the human behavior which creates a trusted communicating environment. In this paper, we define the architecture of VANET, then the communication establishment and various challenges. Some trust models had been defined in this paper to enforce honest information sharing between communicating nodes. Trust establishment is compulsory among communicating vehicles to build a secure messages exchange and reliability.
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
Designing a protocol structure which contains the control system, VANET device and the type of communication message structures which will implement the message packets for v2v or v2I infrastructure . The different message packets contain the information required to transfer from one node to another in vehicular network for communication. Design various algorithm required for Control, Alert and Infotainment messages. Time stamping lowering data rate efficient packet delivery and proper communication of required messages. Implementation of proposed algorithms and comparison of them with existing algorithms and study of different factors affecting the working of theses algorithms. Analysis of proposed design approach and improvements in results if required.
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Dr. Amarjeet Singh
Vehicular Ad-hoc Network (VANET) technology is the basis of Intelligent Transportation System (ITS) connectivity that enables the delivery of useful information to and fro between vehicles in vehicle-to-vehicle communication mode; or between vehicle and infrastructure in vehicle-to-infrastructure mode for safety and comfort. However, due to the openness of the wireless medium used by VANET, the technology is vulnerable to security threats in both communication modes. In this study, the essential background of VANET from architectural point of view and communication types are discussed. Then, the overview of modification attack in VANET is presented. In addition, this paper thoroughly reviews the existing prevention schemes for modification attack in VANET. This review paper reveals that there is still a need for a better and more efficient preventive scheme to address the modification attack in VANET.
Vehicular Messaging In IOT Using Epidemic RoutingEditor IJCATR
Now a days there are lots of inventions done in vehicles and some may in progress, these inventions help to resolve the
challenges caused by the increasing transportation issues. These modern vehicles equipped with a large amount of sensors, actuators
and communication devices e.g. GPS. New vehicles have possessed powerful sensing, networking, communication and data
processing capabilities and can communicate with other vehicles or exchange information with the external environments over various
protocols. This can be done with the help of Vehicular communication systems; these are the networks in which vehicle and roadside
units are the communicating node, with each other provide the information, such as safety warnings and traffic information. They can
be effective in avoiding accidents and traffic congestion. To solve these issue sending and receiving messages is an important factor.
All this things are good when the number of vehicles are less, system must be able to handle traffic spike or sudden demands caused
by special events or situations such as sport games or emergencies. This is nothing but a scalability challenge which is going to
overcome in this paper using routing protocol called Epidemic routing protocol.
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationIJERA Editor
VANET provide facility for the vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages to other vehicles. However, this raises the issue of security and privacy. Here, we have described various existing solutions/protocols that are used in order to satisfy the security and privacy requirement of the vehicular ad hoc network. We have also described security issues and challenges in VANET. We have presented various security attributes that may be considered as criteria to measure security such as availability, confidentiality, integrity, authentication and non-repudiation. This paper also give the detail information of some of the schemes such as RAISE ,IBV with their pros and cons.
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
Vehicles download the data when passing through a drive through the road (RSU) and then share the data after travelling outside the coverage of RSU.A key issue of downloading
cooperative data is how effectively data is shared among them self. Developing an application layer data exchange protocol for the coordination of vehicles to exchange data according to
their geographic locations. Coordinated sharing can avoid medium access control (MAC) layer
collisions and the hidden terminal effect can be avoided in the multi-hop transmission. A salient
feature of the application layer data exchange protocol, in the voluntary services, Vehicles purchase the requested data from service provider via RSUs. In this project, we propose a
cooperative data sharing with secure framework for voluntary services in special vehicles networks (VANETs). We also concentrate on security in the process of downloading data and
sharing. Applicants to ensure exclusive access to data applied and security of the vehicles
involved in the implementation.
A Novel Sybil Attack Detection Mechanism in Urban Vehicular NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
V2V communication systems communicates with the approaching vehicle and avoids the accident by alerting the driver and often it drives away the vehicle if the driver fails to stop it. V2I communication system communicates with the server in the road and reduces the traffic taking place in the road.
Iot based smart transport management systemGagan Bansal
In this paper, the author highlighted the workings, executions, implementations, and the application of the Internet of Things (IoT) in transport management and vehicle to vehicle
communication systems.
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...IJERA Editor
VANET or Vehicular Ad-Hoc Network is a special type of MANET or Mobile Ad-Hoc Network that is
designed specifically for communications between vehicles or V2V and vehicles to infrastructure or V2I. There
is a lot of studies and research that has been dedicated to study this technology due to its importance and
necessity in our life. The fact that each and every module presented must be tested thoroughly before putting it
into action, as there will be severe consequences in case of a system malfunction especially if it's a vehicular
design problem. However, seeing VANETS coming into reality becomes very close with the advancement of
IEEE 802.11p standard that is being dedicated to the DSRC or dedicated short range communication [1]. This
paper will discuss this technology emphasizing some of its applications, current limitations and future challenges
plus simulating a real traffic using SUMO and OpenStreetMap
EXAMINING MODERN DATA SECURITY AND PRIVACY PROTOCOLS IN AUTONOMOUS VEHICLESijcsit
A fully automated, self-driving car can perceive its environment, determine the optimal route, and drive
unaided by human intervention for the entire journey. Connected autonomous vehicles (CAVs) have the
potential to drastically reduce accidents, travel time, and the environmental impact of road travel. Such
technology includes the use of several sensors, various algorithms, interconnected network connections,
and multiple auxiliary systems. CAVs have been subjected to attacks by malicious users to gain/deny
control of one or more of its various systems. Data security and data privacy is one such area of CAVs that
has been targeted via different types of attacks. The scope of this study is to present a good background
knowledge of issues pertaining to different attacks in the context of data security and privacy, as well
present a detailed review and analysis of eight very recent studies on the broad topic of security and
privacy related attacks. Methodologies including Blockchain, Named Data Networking, Intrusion
Detection System, Cognitive Engine, Adversarial Objects, and others have been investigated in the
literature and problem- and context-specific models have been proposed by their respective authors
A fully automated, self-driving car can perceive its environment, determine the optimal route, and drive
unaided by human intervention for the entire journey. Connected autonomous vehicles (CAVs) have the
potential to drastically reduce accidents, travel time, and the environmental impact of road travel. Such
technology includes the use of several sensors, various algorithms, interconnected network connections,
and multiple auxiliary systems. CAVs have been subjected to attacks by malicious users to gain/deny
control of one or more of its various systems. Data security and data privacy is one such area of CAVs that
has been targeted via different types of attacks. The scope of this study is to present a good background
knowledge of issues pertaining to different attacks in the context of data security and privacy, as well
present a detailed review and analysis of eight very recent studies on the broad topic of security and
privacy related attacks. Methodologies including Blockchain, Named Data Networking, Intrusion
Detection System, Cognitive Engine, Adversarial Objects, and others have been investigated in the
literature and problem- and context-specific models have been proposed by their respective authors.
Similar to Detection of Sybil attack in vehicular ad hoc networks by analyzing network performance (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Detection of Sybil attack in vehicular ad hoc networks by analyzing network performance
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 12, No. 2, April 2022, pp. 1703~1710
ISSN: 2088-8708, DOI: 10.11591/ijece.v12i2.pp1703-1710 1703
Journal homepage: http://ijece.iaescore.com
Detection of Sybil attack in vehicular ad hoc networks by
analyzing network performance
Nirbhay Kumar Chaubey1
, Dhananjay Yadav2
1
Department of Computer Science, GanpatUniversity, Mehsana, Gujarat, India
2
Department of Computer Science, Gujarat Technological University,Ahmedabad, India
Article Info ABSTRACT
Article history:
Received Apr 18, 2021
Revised Sep 18, 2021
Accepted Oct 11, 2021
Vehicular ad hoc network (VANET) is an emerging technology which can
be very helpful for providing safety and security as well as for intelligent
transportation services. But due to wireless communication of vehicles and
high mobility it has certain security issues which cost the safety and security
of people on the road. One of the major security concerns is the Sybil attack
in which the attacker creates dummy identities to gain high influence in the
network that causes delay in some services and fake voting in the network to
misguide others. The early detection of this attack can prevent people from
being misguided by the attacker and save them from getting into any kind of
trap. In this research paper, Sybil attack is detected by first applying the
Poisson distribution algorithm to predict the traffic on the road and in the
second approach, analysis of the network performance for packet delivery
ratio (PDR) is performed in malign and benign environment. The simulation
result shows that PDR decreases in presence of fake vehicles in the network.
Our approach is simple and effective as it does not require high
computational overhead and also does not violate the privacy issues of
people in the network.
Keywords:
Intrusion detection
Packet delivery ratio
Security
Sybil attack
Vehicular ad hoc networks
This is an open access article under the CC BY-SA license.
Corresponding Author:
Dhananjay Yadav
Department of Computer Science, Gujarat Technological University
Nigam Nagar, Chandkheda, Ahmedabad, Gujarat 382424, India
Email: yadavdhananjay1@gmail.com
1. INTRODUCTION
Vehicular ad hoc networks (VANET) are an emerging wireless communication technology for
vehicles on the road. It is mainly used for the communication between vehicles on the road as a part of
intelligent transportation services. VANET plays a major role in providing early warning messages,
intelligent transportation services, and safe driving. People can know about traffic scenario on road in
advance, can pass warning messages in case of accidents and also enjoy other internet services. VANET is
becoming the primary need for providing safety of people on the road as the number of vehicles on road is
increasing day by day. The communication between vehicles is performed through wireless media. As shown
in Figure 1, the VANET architecture includes road side unit (RSU), application unit (AU), and on-board unit
(OBU). RSU is placed alongside the road which provides infrastructure communication for vehicles. AU is
like PDA which helps in accessing the internet and is also used with OBU to provide vehicle-to-vehicle
(V2V) communication. AU and OBU are equipped with vehicles, RSU connected with each other through
wired and wireless media. The communication between vehicles is performed through wireless media using
dedicated short-range communication (DSRC) protocol identified as IEEE802.11P [1].
Figure 1 shows the architecture of VANET. Each vehicle is equipped with AU and OBU. OBU
provides vehicle to vehicle and vehicle to RSU communication. RSU’s are equipped alongside the road
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 2, April 2022: 1703-1710
1704
which has a communication range of approximately 1,000 meters. Each RSU connects with another RSU,
and it helps in weather forecasting and informs other vehicles about traffic situations in the network. The
communication in VANET is performed through wireless media so due to high speed and frequent topology
change of vehicles security is always a major concern in VANET. The various security threats like black hole
attack, bogus information attack and denial of service attack. In the paper, Mejri et al. [2] one of the major
security attacks is Sybil attack in which a vehicle impersonates its identity to multiple vehicles and succeeds
to convince roadside unit that there is high traffic on the road. The architecture of the Sybil attack is shown in
Figure 2 where in the malicious vehicle creates illusion of presence of multiple vehicles in the network by
changing its id or by changing its position [3].
Figure 1. VANET architecture
Figure 2. Sybil attack
In VANET, RSU periodically determines the traffic scenario on the road by receiving the polling
responses from vehicles in the network and informs other vehicles about the current traffic situation [4]. The
attacker by creating the illusion of heavy traffic forces RSU to send fallacious messages about traffic
situations to the legitimate vehicles. Hence, the legitimate vehicles are bound to divert their route with the
intention of malicious vehicles, making the route clear for the attacker. The attacker can now inject attacks
like bogus information attack, masquerading attack and denial of service (DOS) attack [5]. This attack is the
most dangerous attack in VANET as it costs safety and security of people on the road.
3. Int J Elec & Comp Eng ISSN: 2088-8708
Detection of sybil attack in vehicular ad hoc networks by analyzing network … (Nirbhay Kumar Chaubey)
1705
The Sybil attack can be performed at network layer or at the application layer. At network layer, the
attack can be performed by frequent change of internet protocol (IP) addresses where, as at application layer,
attack is performed by changing the identity [6]. The attacker can send multiple polling responses by
changing its id or position and creates an illusion of the heavy traffic in the network. The RSU after getting
large numbers of responses from different ids assumes that there is high traffic in the network and starts
informing upcoming vehicles about heavy traffic on the road. Now the upcoming vehicle starts changing its
route and is caught in a trap created by the attacker [7].
In this work, we have detected the Sybil attack by first predicting the number of vehicles on the road
and then measuring the network performance by calculating the packet delivery ratio (PDR) in the network.
PDR depends upon many factors such as transmission power, the actual physical phenomena, and topology
change due to the high speed of vehicles. RSU is always fixed alongside the road making its transmission
power and physical phenomena fixed so it gives less impact on the calculation of PDR. We have taken the
constant vehicle speed for our simulation with the assumption that vehicles also follow some constant speed
on highways and in rural areas.
In vehicle-to-vehicle communication PDR calculation is affected more because both are in motion
but in RSU to vehicle communication speed has very less impact as RSU is stationary and it can send packets
to all vehicles in its range. To determine the probability of the number of vehicles passing through the road
within certain duration of time, we have used the Poisson distribution algorithm. When RSU finds a number
of vehicles greater than the probable number of vehicles then it sends confirmation messages in the network
and calculates the packet delivery ratio. Tarapiah et al. [8] suggested that ad hoc on-demand distance vector
routing (AODV) routing protocol gave better performance results and also proved that with an increasing
number of vehicles the PDR increases. In our simulation setup, we have used the AODV routing protocol and
results show that with increase of number of vehicle PDR increases but in case of attack PDR decreases. The
cause of decrease in PDR is the presence of large number of fake vehicles as they can’t receive packets at
same time. The rest of the paper is organized as follows: in section 2 related work is presented. Section 3
includes the algorithm, method and simulation parameters used for detection of Sybil attack. The
experimental evaluation has been discussed in section 4 followed by conclusion in section 5.
2. RELATED WORK
The related research work to detect Sybil attack can be classified as encryption and cryptography,
received signal strength-based indication (RSSI), resource testing, data mining and speed and position
verification-based approaches. Table 1 gives a brief description of these approaches. In cryptography
approach, only the authorized vehicle can send the encrypted messages in networks and the receiver first
verifies the authenticity of the vehicle by some signature verification. Only after verification, the vehicles are
able to send or receive messages [5]. Panchal et al. [9] propose the RSU based identification. Kamal et al.
[10] proposed a session key-based certification method to detect the Sybil attack.
RSSI is a measurement of power present in received radio signals. Singh et al. [11] use the signal
strength to detect the Sybil attack in VANET. Yao et al. [12] proposes an algorithm to detect Sybil attack
without the use of RSU and base station. Dutta et al. [13] use data clustering of vehicles to detect the Sybil
attack in VANET. Their idea is based on the fact that two vehicles can’t be in the same cluster for a longer
duration. But this approach is not good enough for highways. In Gu et al. [14] consider that two or more
vehicles can’t have the same driving pattern for some longer time and use K nearest neighbor algorithm for
detection while in [15] uses K-means algorithm.
Some Intrusion detection algorithms have been developed to detect attacks in vehicular ad hoc
networks using machine learning. These detection algorithms are classified as signature based and anomaly
based [16]. Liang et al. [17] used a feature extraction and classifier method to detect the attack. A hybrid data
driven model is proposed in [18]. Bovenzi et al. [19] instruction detection algorithm is developed to detect
attacks in IoT systems. Speed and position verification of vehicles are also used to detect Sybil attack. In
Ayaida et al. [20] use a macroscopic traffic model to detect the attack. They found the difference between the
probable speed of vehicles and measured speed and if there is a deviation in both then they considered it as an
attack. Saggi et al. [21] is also based on certification and speed of vehicles in the network. Hamdan et al. [22]
use a combination of two algorithms for detection. Privacy-preserving detection of abuses of pseudonyms
(P2DAP) algorithm is used when speed is low, otherwise they use footprint algorithms. Baza et al. [23] verified
the position of vehicles to detect the attack.
Resource testing is the first approach applied by J. Douceur to detect the Sybil attack in the point to
point (P2P) network. In this approach, they tested resources by sending requests and accepting replies from
each node. But it is difficult in VANET as malicious nodes can reply with multiple fake IDs. Newsome et al. [24]
claimed that the above method is not suitable in wireless sensor networks as all replies converging to verifier
will result in network congestion in that part, also there is time boundation for accepting replies. Newsome
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 2, April 2022: 1703-1710
1706
proposes radio resource testing, registration, and position verification for detecting attacks in sensor
networks. Yan et al. [25] claimed that radio resource testing proposed by [25] is not valid in VANET as
nodes can attain multiple channels, registration is also not valid as nodes can attain multiple identities and
position verification relies on outside infrastructure as well as maintaining the record of each vehicle which
increases congestion and cost. In Piro et al. [26] uses vehicles medium access control (MAC) and IP
addresses to detect the attack. The attacker can use multiple devices to beat this method. Moreover, privacy is
a major issue with this method as MAC and IP addresses are tracked and recorded. In Zaidi et al. [27] uses a
timestamp to detect the attack. RSU assigns each vehicle a timestamp after verifying its certificate. The
certificate is provided by registering authority. These increases cost due to the requirement of registering
authority. Also, the network remains always busy in generating and verifying timestamp value for each
vehicle.
Table 1. Different approaches used to detect Sybil attack
Approach Methods used Problem associated with approach.
Encryption/Decryption Signature verification for each vehicle.
Certification of vehicles.
Need of central authority.
Increased network congestion due to certification of
each vehicle.
Costly due to need of central authority.
RSSI Determine and identify signal strength. Variation in signal strength at peak hours or passing
through tunnels.
Data mining Clustering.
K nearest neighbour.
K means.
Storage requirement for each vehicle and its
neighbours increases computation cost.
IDS design Machine learning Security concern in data analytics process.
Augmentation of vehicular data do not address well
Speed and position
based
Measure the speed of vehicles.
Verify position of each vehicle and its
neighbour.
Measuring speed of each vehicle and its neighbours
increases computation cost and congestion in network.
Sharing position in network creates privacy issues.
Resource testing Verification of node based on reply message.
Sharing mac and IP addresses.
Increased network congestion problem.
In [8], [28] shows that with increase of number of vehicles the PDR increases. Arora et al. [29]
claimed that with increase of number of vehicles PDR increases but in case of attack with increase of number
of vehicles PDR decreases. Their approach to detect attack is based on resource testing in which they rely on
vehicles' reply to responses. Yan et al. [25] claimed that resource testing is inadequate in vehicular ad hoc
networks, also in this approach each node is required to be certified by RSU using a public private key pair.
Vehicles send its ID with key to RSU to get its location timestamp but there is a chance that an attacker can
get multiple location certificates by using multiple IDs for having multiple keys or some stolen keys. Also
sending messages to every node and counting and verifying each reply message increases the network
congestion problem.
Our research is based on some extent to resource testing as in this approach RSU sends a
verification message to all nodes within range but is not dependent on taking replies from other vehicles.
RSU sends the confirmation message to each vehicle and then calculates the PDR based on which it detects
the attack. We first predict the total number of vehicles at a particular time and then calculate the PDR by
sending messages to each vehicle through RSU and after comparing the PDR value the attack can be easily
detected. We have used a very simple approach with the objective to reduce the congestion due to
computational overhead in the network, detect attacks without the use of vehicle certification and registration
and also without violating the privacy issues of vehicles in the network. This approach is better in the sense
that it does not require certification and registration of vehicles, less congestion as it is not based on requests
and replying to messages, no privacy issues as vehicles are not required to share their information like
position, speed, IP, and detection algorithm needs to be executed only when the number of vehicles exceeds
the threshold value. Our approach is useful to detect Sybil attack performed by both impersonating the ID
and location of vehicles in the network.
3. PROPOSED WORK
In this research, the attack detection is done in two phases. In the first phase prediction of total
number of vehicles passing through road at a particular time is performed by applying the Poisson
distribution algorithm followed by the calculation of the packet delivery ratio in the second phase.
− Poisson distribution algorithm: Poisson distribution algorithm is used to forecast the number of vehicles
passing the road at particular time. The Poisson distribution is a useful algorithm to model the count of
5. Int J Elec & Comp Eng ISSN: 2088-8708
Detection of sybil attack in vehicular ad hoc networks by analyzing network … (Nirbhay Kumar Chaubey)
1707
vehicle arrival i.e., how many vehicles can arrive at particular time duration [30]. The probability of
vehicle count using Poisson distribution can be given as:
P(x) = (e − μ) (μx) / x!
where μ is the flow of traffic, x is the actual number of successes at particular time and P(x) is the
probability that x success occurs.
− Packet delivery ratio (PDR): PDR is defined as the number of data packets successfully received by the
estimations divided by the total number of data packets sent by source [31].
𝑃𝑎𝑐𝑘𝑒𝑡 𝐷𝑒𝑙𝑖𝑣𝑒𝑟𝑦 𝑅𝑎𝑡𝑖𝑜 =
𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑑𝑎𝑡𝑎 𝑝𝑎𝑐𝑘𝑒𝑡𝑠 𝑟𝑒𝑐𝑒𝑖𝑣𝑒𝑑
𝑇𝑜𝑡𝑎𝑙 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑑𝑎𝑡𝑎 𝑝𝑎𝑐𝑘𝑒𝑡𝑠 𝑠𝑒𝑛𝑡 𝑏𝑦 𝑠𝑜𝑢𝑟𝑐𝑒2𝑎
Proposed algorithm
1. Determine the threshold value of number of vehicles on road
2. Check whether the number of vehicles is greater than threshold or not
3. Check if ((veh_count>Threshold) && (Received_alert_msg)) Then
4. Sends confirmation message to vehicles in the network and determine PDR
5. If (High_PDR_Value) Then
6. Print “No Sybil Attak”
7. Else
8. Print “Sybil Attack”
9. End If
10. Check if ((veh_count>Threshold) && (No_alert_msg)) Then
11. Print “Sybil Attack”
12. Check if ((veh_count<Threshold) && (No_alert_msg) Then
13. Print “Smooth Traffic”
3.1. Phase1 vehicle prediction
To generate real-time road traffic scenario a portable, open source and continuous traffic simulation
model, simulation of urban mobility (SUMO) is used. The parameters used to generate the traffic scenario are
shown in Tables 2 and 3. After obtaining the simulated result, the Poisson distribution algorithm is
implemented using Python to forecast the number of vehicles. It is observed from the results that the
maximum probability is found in the range 40 to 45 vehicles, and it is almost equal to zero for 60 or more
vehicles. The probability distribution for vehicles in different range is as given in Table 4.
Table 2. Simulation parameter
Parameters Values
Simulator SUMO
Vehicle Type Car, bus, truck
Max_Speed 35 km/h
Number of attempts 05
Duration 15 minutes
Table 3. Simulated vehicles for particular time
Attempt Duration(minutes) Vehicle count
1 15 40
2 15 48
3 15 44
4 15 46
5 15 49
*Number of vehicles are counted for particular duration at
certain time passing through road
Table 4. Probability of vehicles
Vehicle (in range) P(x)
35-40 0.17
40-45 0.27
45-50 0.26
50-55 0.15
55-60 0.06
60-65 0.01
65-70 0.00
*P(x) shows the probability
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 2, April 2022: 1703-1710
1708
Figures 3 and 4 displays the probability of 45 and 60 vehicles respectively passing through the road.
As stated above we observed minimum probability for 60 vehicles or above. As a result, 60 is considered
threshold value for detecting Sybil attack. In case when RSU encounters responses from more than 60
vehicles then it starts verifying the actual scenario of vehicles on road.
Figure 3. Shows probability of 45 vehicles Figure 4. Shows probability of 60 vehicles
3.2. Phase 2 simulation setup
Here, in this section the simulation setup used to carry out experiment is being shown in the Table 5.
The simulation is done using network simulator NS3.30. To implement this proposed work AODV routing
protocol has been modified, the range of RSU is taken as 500 m and time taken for simulation is 10 seconds.
Total number of vehicles is in the range 40 to 75 and PDR is calculated consequently by adding 5 more
vehicles up to 75.
Table 5. Simulation parameter
Parameters Values
Network Simulator NS3.30
Routing Protocol AODV
Simulation Area 300m*1500m
Transmission Power 20dbm
Vehicle Speed 20m/s
Transmission range 500
Transmission Delay 10ms
Total no of vehicles First scenario=40 and
adding by 5 up to 75 in
each scenario
Mobility Model Random Way point
IEEE 802.11p data rate 2 mbps
Packet size 200 bytes
4. RESULTS AND DISCUSSION
As discussed in previous section, when RSU predicts higher traffic responses compared to the
threshold value in VANET, it is considered as an attack. It is clear from Table 3 that the possibility of
number of vehicles greater than the threshold value is zero. However, in certain unwanted situations on road
causes high traffic due to any mishappening, thus vehicles send alert messages in the network. RSU send
broadcast messages within the range to verify actual scenario. If some incident has happened on road, then
the number of vehicles increases due to obstruction and most of the vehicles should receive the confirmation
message followed by high PDR value. However, PDR value decreases as in case of attack most of the
vehicles have fake ids. Figure 5 shows the PDR value in benign (without attack) and malign (with attack)
network scenario. The upper line shows the PDR value in a normal situation when there is no attack, and the
lower line shows the PDR value with the attack. For same number of vehicles, PDR decreases in case of
attack or due to presence of fake vehicles. So, by comparing the PDR value the attack detected.
7. Int J Elec & Comp Eng ISSN: 2088-8708
Detection of sybil attack in vehicular ad hoc networks by analyzing network … (Nirbhay Kumar Chaubey)
1709
Figure 5. PDR and number of vehicles before and after attack
5. CONCLUSION
In this paper, we proposed a new approach that does not require continuous monitoring and
certifications of vehicles to detect Sybil attack. The vehicles are also not required to share their position or id,
so the privacy of vehicles is preserved. Our simulation result shows that the packet delivery ratio (PDR)
decreases for same number of vehicles in case of attack. The PDR decreases due to the higher packet drop of
non-existent vehicles as all fake ids cannot accept the confirmation message at the same time. Also, in our
approach attack detection algorithm is required to execute only when there is a need i.e., when traffic crosses
the threshold value. But other research that we have gone through requires continuous execution of their
algorithm for storing and extracting vehicle information like id, position, and neighbours’ information. which
makes the network always busy for computation. Detecting attacker vehicle will be the focus of our future
work.
REFERENCES
[1] M. H. Alwan, K. N. Ramli, Y. A. Al-Jawher, A. Z. Sameen, and H. F. Mahdi, “Performance comparison between 802.11 and
802.11p for high speed vehicle in VANET,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 5,
pp. 3687–3694, Oct. 2019, doi: 10.11591/ijece.v9i5.pp3687-3694.
[2] M. N. Mejri, J. Ben-Othman, and M. Hamdi, “Survey on VANET security challenges and possible cryptographic solutions,”
Vehicular Communications, vol. 1, no. 2, pp. 53–66, Apr. 2014, doi: 10.1016/j.vehcom.2014.05.001.
[3] N. K. Chaubey and D. Yadav, “A taxonomy of sybil attacks in vehicular ad-hoc network (VANET),” in IoT and Cloud
Computing Advancements in Vehicular Ad-Hoc Networks, 2020, pp. 174–190.
[4] F. Perry, K. Raboy, E. Leslie, Z. Huang, and D. Van Duren, “dedicated short range communications roadside unit specifications,"
National operations center of excellence. 2017, FHWA-JPO-17-589, Accessed: Dec, 2020. [Online]. Available:
https://transportationops.org/publications/dedicated-short-range-communications-roadside-unit-specifications
[5] M. Rahbari and M. A. Jabreil Jamali, “Efficient detection of sybil attack based on cryptography in VANET,” International
Journal of Network Security & Its Applications, vol. 3, no. 6, pp. 185–195, Nov. 2011, doi: 10.5121/ijnsa.2011.3614.
[6] S. Pal, A. Mukhopadhyay, and P. Bhattacharya, “Defending mechanisms against Sybil attack in next generation mobile ad hoc
networks,” IETE Technical Review, vol. 25, no. 4, pp. 209–215, 2008, doi: 10.4103/0256-4602.42813.
[7] N. K. Chaubey, “Security analysis of vehicular ad hoc networks (VANETs): A comprehensive study,” International Journal of
Security and Its Applications, vol. 10, no. 5, pp. 261–274, May 2016, doi: 10.14257/ijsia.2016.10.5.25.
[8] S. Tarapiah, K. Aziz, and S. Atalla, “Analysis the performance of vehicles ad hoc network,” Procedia Computer Science,
vol. 124, pp. 682–690, 2017, doi: 10.1016/j.procs.2017.12.205.
[9] A. Panchal and D. D. Singh, “Segregation of sybil attack using neighbouring information in VANET,” International Advanced
Research Journal in Science, Engineering and Technology (IARJSET), vol. 4, no. 6, pp. 172–180, Jun. 2017, doi:
10.17148/IARJSET.2017.4631.
[10] R. Prakash and K. Soni, “Improved session key based certificate to detect sybil attack,” International Journal of Engineering
Research and Technology (IJERT), vol. 3, no. 4, pp. 116–119, 2014.
[11] K. Singh and H. Kaur, “Evaluation of proposed technique for detection of Sybil attack in VANET,” International Journal of
Scientific Research in Computer Science and Engineering, vol. 6, no. 5, pp. 10–15, Oct. 2018, doi: 10.26438/ijsrcse/v6i5.1015.
[12] Y. Yao et al., “Multi-channel based sybil attack detection in vehicular ad hoc networks using RSSI,” IEEE Transactions on
Mobile Computing, vol. 18, no. 2, pp. 362–375, Feb. 2019, doi: 10.1109/TMC.2018.2833849.
[13] N. Dutta and S. Chellappan, “A time-series clustering approach for sybil attack detection in vehicular ad hoc networks,” The
Second International Conference on Advances in Vehicular Systems, Technologies and Applications, 2013.
[14] P. Gu, R. Khatoun, Y. Begriche, and A. Serhrouchni, “k-Nearest Neighbours classification based Sybil attack detection in
Vehicular networks,” in 2017 Third International Conference on Mobile and Secure Services (MobiSecServ), Feb. 2017, pp. 1–6,
doi: 10.1109/MOBISECSERV.2017.7886565.
[15] S. Diwakar and D. R. Kashyup, “Detecting sybil attack using hybrid fuzzy K-Means algorithm in WSN,” International Journal of
Engineering Development and Research, vol. 5, no. 2, pp. 1560–1565, 2017.
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 2, April 2022: 1703-1710
1710
[16] H. Bangui, M. Ge, and B. Buhnova, “A hybrid data-driven model for intrusion detection in VANET,” Procedia Computer
Science, vol. 184, pp. 516–523, 2021, doi: 10.1016/j.procs.2021.03.065.
[17] J. Liang, J. Chen, Y. Zhu, and R. Yu, “A novel intrusion detection system for vehicular ad hoc networks (VANETs) based on
differences of traffic flow and position,” Applied Soft Computing, vol. 75, pp. 712–727, Feb. 2019, doi:
10.1016/j.asoc.2018.12.001.
[18] H. Bangui and B. Buhnova, “Recent advances in machine-learning driven intrusion detection in transportation: survey,” Procedia
Computer Science, vol. 184, pp. 877–886, 2021, doi: 10.1016/j.procs.2021.04.014.
[19] G. Bovenzi, G. Aceto, D. Ciuonzo, V. Persico, and A. Pescape, “A hierarchical hybrid intrusion detection approach in IoT
scenarios,” in GLOBECOM 2020 - 2020 IEEE Global Communications Conference, Dec. 2020, pp. 1–7, doi:
10.1109/GLOBECOM42002.2020.9348167.
[20] M. Ayaida, N. Messai, S. Najeh, and K. Boris Ndjore, “A macroscopic traffic model-based approach for sybil attack detection in
VANETs,” Ad Hoc Networks, vol. 90, Jul. 2019, doi: 10.1016/j.adhoc.2019.01.010.
[21] M. K. Saggi and R. Kaur, “Isolation of Sybil attack in VANET using neighboring information,” in 2015 IEEE International
Advance Computing Conference (IACC), Jun. 2015, pp. 46–51, doi: 10.1109/IADCC.2015.7154666.
[22] S. Hamdan, A. Hudaib, and A. Awajan, “Detecting Sybil attacks in vehicular ad hoc networks,” International Journal of Parallel,
Emergent and Distributed Systems, vol. 36, no. 2, pp. 69–79, Mar. 2021, doi: 10.1080/17445760.2019.1617865.
[23] M. Baza et al., “Detecting sybil attacks using proofs of work and location in VANETs,” IEEE Transactions on Dependable and
Secure Computing, 2020, Art. no. 1, doi: 10.1109/TDSC.2020.2993769.
[24] J. Newsome, E. Shi, D. Song, and A. Perrig, “The sybil attack in sensor networks: Analysis & Defenses,” in Proceedings of the
third international symposium on Information processing in sensor networks - IPSN’04, 2004, pp. 168–259, doi:
10.1145/984622.984660.
[25] G. Yan, S. Olariu, and M. C. Weigle, “Providing VANET security through active position detection,” Computer Communications,
vol. 31, no. 12, pp. 2883–2897, Jul. 2008, doi: 10.1016/j.comcom.2008.01.009.
[26] C. Piro, C. Shields, and B. N. Levine, “Detecting the sybil attack in mobile ad hoc networks,” in 2006 Securecomm and
Workshops, Aug. 2006, pp. 1–11, doi: 10.1109/SECCOMW.2006.359558.
[27] S. M. Faisal and T. Zaidi, “Timestamp based detection of sybil attack in VANET,” International Journal of Network Security,
vol. 22, no. 3, pp. 1–12, 2020, doi: 10.6633/IJNS.
[28] D. Garg, R. S. Bali, and A. Kaur, “Performance evaluation of data delivery mechanism for cognitive radio vehicular and vehicular
ad-hoc networks,” Procedia Computer Science, vol. 57, pp. 596–605, 2015, doi: 10.1016/j.procs.2015.07.410.
[29] E. P. Arora, E. P. Singh, and D. N. Dhillon, “An Efficient Detection and Prevention of Sybil Attack by using Different Parameters
in VANET,” International Research Journal of Engineering and Technology (IRJET), vol. 7, no. 10, pp. 683–688, 2020.
[30] T. Mathew, “Vehicle arrival models: count,” NPTEL Transportation System Engineering, IIT Bombay. 2014.
[31] H. Alani, M. Abdelhaq, and R. Alsaqour, “Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless
networks,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 4, pp. 3702–3714, Aug. 2020,
doi: 10.11591/ijece.v10i4.pp3702-3714.
BIOGRAPHIES OF AUTHORS
Nirbhay Kumar Chaubey working as a Dean of Computer Science, Ganpat
University, Gujarat India. He received Ph.D. degree (Computer Science) from the Gujarat
University, Ahmedabad, India. His research interests lie in the areas of Wireless Networks
(Architecture, Protocol Design, QoS, Routing, Mobility and Security), Ad Hoc Network,
Sensor Network, IoT, Cloud Computing and Cyber Physical System. He has authored four (4)
books published by the Springer and IGI Global, published fifty (50) research papers in peered
reviewed Scopus and web of science indexed international journals and conference
proceedings, published five (5) book chapters, and contributed two (2) patents. Prof. Chaubey
is a Senior Member of the IEEE, ACM, and a Life Member of Computer Society of India. He
has received several awards including IEEE Outstanding Volunteer Award- Year 2015(IEEE
Region 10 Asia Pacific), Gujarat Technological University (GTU) Pedagogical Innovation
Awards (PIA) -2015, IEEE Outstanding Branch Counselor Award - Year 2010 (IEEE Region
10 Asia Pacific). He can be contacted at email: nirbhay.chaubey@ganpatuniversity.ac.in.
Dhananjay Yadav pursuing in Computer Science from Gujarat Technological
University, Ahmedabad, India. He Completed MCA from FIT Faridabad in 2007 and M. Tech
(C S) from Jamia Hamdard University New Delhi in 2013, qualified the UGCNET exam in
2018. He has 10+ years of academic experience. He has authored a book chapter and published
three research papers. He can be contacted at email: yadavdhananjay1@gmail.com.