Abstract:- The Vehicle drivers (users) do not want their personal information such as vehicle names, license plate, speed, positions, moving routes, and user information to be revealed, in order to protect them against any illegal tracing or user profiling. Thus, this information must be protected from any kind of misuse or attacks. For this the obscurity of vehicular nodes should be supported to preserve privacy of vehicles and their users. Also, we should be able to investigate for accidents or liabilities from non-repudiation. Hence, we present an enhanced conditional privacy preservation scheme for vehicular ad-hoc networks (VANETs). This scheme includes an ID-based cryptosystem to assure user's obscurity using pseudonyms; however the model provides a backdoor for authorities to track misbehaving and suspicious users
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Dr. Amarjeet Singh
Vehicles in a vehicular ad-hoc network (VANET) broadcast information about the driving environment in the road. Due to the open-access environment, this means that the VANET is susceptible to security and privacy issues. However, none of the related works satisfies all security and privacy requirements. Besides, their proposed has huge overhead in terms of computation and communication. To address the above issues, we will propose the security and privacy scheme based on Elliptic Curve Cryptography (ECC) and one secure hash function. Hence the reliability of each message being signed and checked has been improved. The main aim of this work is to satisfy all aspect requirements of security and privacy and reduce the computational complexity of the system.
Vehicular Ad Hoc Network (VANET) is a more influential network in which vehicles depend on each other to communicate and for the secure exchange of the messages. With the improvement in the technology, mainly the vehicles are equipped with Wi-Fi and GPS devices to improve the traffic handling and road safety. But many vehicles may broadcast the bogus messages for their own purpose, so it needs a trustful environment and an effective trust management schemes to prevent the network from the various malicious attacks. Trust establishment is very challenging as the network is highly mobile and vehicles may come in or depart at any time. In this paper, we first discuss the VANET model to describe the environment, and then the trust management schemes to secure the network and lastly the various cryptography fundamentals for the fast and safe message transfer.
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Dr. Amarjeet Singh
Vehicular Ad-hoc Network (VANET) technology is the basis of Intelligent Transportation System (ITS) connectivity that enables the delivery of useful information to and fro between vehicles in vehicle-to-vehicle communication mode; or between vehicle and infrastructure in vehicle-to-infrastructure mode for safety and comfort. However, due to the openness of the wireless medium used by VANET, the technology is vulnerable to security threats in both communication modes. In this study, the essential background of VANET from architectural point of view and communication types are discussed. Then, the overview of modification attack in VANET is presented. In addition, this paper thoroughly reviews the existing prevention schemes for modification attack in VANET. This review paper reveals that there is still a need for a better and more efficient preventive scheme to address the modification attack in VANET.
Vehicular Ad hoc Network (VANET) is the favorable method to enhance the safety of divers and passengers. It becomes a basic element of the Intelligent Transportation System (ITS). It has created by applying the concepts of Mobile Ad Hoc Networks (MANETs) – which is an application of a wireless network for exchanging the data – to the domain of vehicles. They become a main element of intelligent transportation systems. In existing technique drawback is the Authentication Server (AS) gives all the working to Law Executor (LE) means AS send information to RSU, RSU send this information to law executor and then login process start but if LE behave maliciously then this authentication process fail. In our propose work, we calculate the trust of each vehicle's on the basis of their behavior. Each vehicle calculates the trust of its neighbor and send this value to AS by RSU then AS update these values and then broadcast this value by RSU, now all the vehicles have a trust value of its neighboring vehicles so that send the data by using hashing technique and use trusted path to send data source to a destination so that security enhances.
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Dr. Amarjeet Singh
Vehicles in a vehicular ad-hoc network (VANET) broadcast information about the driving environment in the road. Due to the open-access environment, this means that the VANET is susceptible to security and privacy issues. However, none of the related works satisfies all security and privacy requirements. Besides, their proposed has huge overhead in terms of computation and communication. To address the above issues, we will propose the security and privacy scheme based on Elliptic Curve Cryptography (ECC) and one secure hash function. Hence the reliability of each message being signed and checked has been improved. The main aim of this work is to satisfy all aspect requirements of security and privacy and reduce the computational complexity of the system.
Vehicular Ad Hoc Network (VANET) is a more influential network in which vehicles depend on each other to communicate and for the secure exchange of the messages. With the improvement in the technology, mainly the vehicles are equipped with Wi-Fi and GPS devices to improve the traffic handling and road safety. But many vehicles may broadcast the bogus messages for their own purpose, so it needs a trustful environment and an effective trust management schemes to prevent the network from the various malicious attacks. Trust establishment is very challenging as the network is highly mobile and vehicles may come in or depart at any time. In this paper, we first discuss the VANET model to describe the environment, and then the trust management schemes to secure the network and lastly the various cryptography fundamentals for the fast and safe message transfer.
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Dr. Amarjeet Singh
Vehicular Ad-hoc Network (VANET) technology is the basis of Intelligent Transportation System (ITS) connectivity that enables the delivery of useful information to and fro between vehicles in vehicle-to-vehicle communication mode; or between vehicle and infrastructure in vehicle-to-infrastructure mode for safety and comfort. However, due to the openness of the wireless medium used by VANET, the technology is vulnerable to security threats in both communication modes. In this study, the essential background of VANET from architectural point of view and communication types are discussed. Then, the overview of modification attack in VANET is presented. In addition, this paper thoroughly reviews the existing prevention schemes for modification attack in VANET. This review paper reveals that there is still a need for a better and more efficient preventive scheme to address the modification attack in VANET.
Vehicular Ad hoc Network (VANET) is the favorable method to enhance the safety of divers and passengers. It becomes a basic element of the Intelligent Transportation System (ITS). It has created by applying the concepts of Mobile Ad Hoc Networks (MANETs) – which is an application of a wireless network for exchanging the data – to the domain of vehicles. They become a main element of intelligent transportation systems. In existing technique drawback is the Authentication Server (AS) gives all the working to Law Executor (LE) means AS send information to RSU, RSU send this information to law executor and then login process start but if LE behave maliciously then this authentication process fail. In our propose work, we calculate the trust of each vehicle's on the basis of their behavior. Each vehicle calculates the trust of its neighbor and send this value to AS by RSU then AS update these values and then broadcast this value by RSU, now all the vehicles have a trust value of its neighboring vehicles so that send the data by using hashing technique and use trusted path to send data source to a destination so that security enhances.
Vehicular Networks (VNs) seek to provide, among other applications, safer driving conditions. Vehicles need to periodically broadcast safety messages providing precise position information to nearby vehicles. Recent advances in development of Wireless Communication in Vehicular Adhoc Network (VANET) has provided emerging platform for industrialists and researchers. Vehicular adhoc networks are multi-hop networks with no fixed infrastructure. As a result, the driver’s privacy is at stake. In order to mitigate this threat, while complying with the safety requirements of VNs, the creation of mix-zones security at appropriate places of the VN to prevent the attacks Vehicle. Propose to do so with the use of cryptography algorithm AES with zone based routing protocol, analytically how the combination of mix-zones into mix-networks brings forth location privacy in vehicle node. Finally, show by simulations that the proposed zone based security is effective in various scenarios.
A Novel Sybil Attack Detection Mechanism in Urban Vehicular NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Vehicular Ad Hoc Networks (VANETs) are based on network technology where cars act as mobile nodes to form a communication network. In VANETs, routing protocols have a significance regarding the overall network performance since they determine the way of sending and receiving packets between mobile nodes. Most of the protocols proposed for VANETs are adapted from Mobile ad hoc networks (MANETs) routing protocols. However, due to the specific characteristics of VANETs, especially high mobility, and dynamic topology, the routing protocols in ad hoc networks do not adapt immediately to VANETs. Therefore, secure routing of Vehicular ad hoc networks (VANETs) against attacks, which are of various types, is still a challenging issue. This paper is going to present a synthesis of the most relevant protocols that have addressed the secure routing issue in VANETs. It also establishes a comparison regarding the offered features and the studied performance aspects through which it is notified that a security mechanism depends not only on the level of efficiency but also on the network constraints.
Vehicular Ad Hoc Networks (VANETs) are based on network technology where cars act as mobile nodes to form a communication network. In VANETs, routing protocols have a significance regarding the overall network performance since they determine the way of sending and receiving packets between mobile nodes. Most of the protocols proposed for VANETs are adapted from Mobile ad hoc networks (MANETs) routing protocols. However, due to the specific characteristics of VANETs, especially high mobility, and dynamic topology, the routing protocols in ad hoc networks do not adapt immediately to VANETs. Therefore, secure routing of Vehicular ad hoc networks (VANETs) against attacks, which are of various types, is still a challenging issue. This paper is going to present a synthesis of the most relevant protocols that have addressed the secure routing issue in VANETs. It also establishes a comparison regarding the offered features and the studied performance aspects through which it is notified that a security mechanism depends not only on the level of efficiency but also on the network constraints.
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationIJERA Editor
VANET provide facility for the vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages to other vehicles. However, this raises the issue of security and privacy. Here, we have described various existing solutions/protocols that are used in order to satisfy the security and privacy requirement of the vehicular ad hoc network. We have also described security issues and challenges in VANET. We have presented various security attributes that may be considered as criteria to measure security such as availability, confidentiality, integrity, authentication and non-repudiation. This paper also give the detail information of some of the schemes such as RAISE ,IBV with their pros and cons.
VANET SECURITY AND PRIVACY – AN OVERVIEWIJNSA Journal
Even though vehicular ad-hoc networks (VANETs) bring tremendous benefits to society, yet they raise
many challenges where the security and privacy concerns are the most critical ones. In this paper, we
provide a detailed overview of the state-of-the-art security and privacy requirements in VANET. Also, a
brief of the approachesthat are proposed in the literature to fulfil these requirements is given in this paper.
Besides that, a classification of the various VANET attacks based on the communication system
layersisprovided in this paper. In addition, the different types of VANET adversaries and attackers
arepresented here.In general, this paper aims to provide a good piece of information about VANET
security and privacy, in order to be used as a tool to help researchers in this field in developing secure
privacy-preserving approaches for VANET.
VANET SECURITY AND PRIVACY – AN OVERVIEWIJNSA Journal
Even though vehicular ad-hoc networks (VANETs) bring tremendous benefits to society, yet they raise
many challenges where the security and privacy concerns are the most critical ones. In this paper, we
provide a detailed overview of the state-of-the-art security and privacy requirements in VANET. Also, a
brief of the approachesthat are proposed in the literature to fulfil these requirements is given in this paper.
Besides that, a classification of the various VANET attacks based on the communication system
layersisprovided in this paper. In addition, the different types of VANET adversaries and attackers
arepresented here.In general, this paper aims to provide a good piece of information about VANET
security and privacy, in order to be used as a tool to help researchers in this field in developing secure
privacy-preserving approaches for VANET.
In Vehicular Communication, the security system against the attacker is very important. Sybil attacks have been regarded as a serious security threat to ad hoc networks and sensor networks. It is an attack in which an original identity of the vehicle is corrupted or theft by an attacker to creates multiple fake identities. Detecting such type of attacker and the original vehicle is a challenging task in VANET. This survey paper briefly presents various Sybil attack detection mechanism in VANET.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Brisk and secure ad hoc vehicular communicationeSAT Journals
Abstract The idea of Car-to-Car communication is a revolutionary phenomenon in the automobile industry. This idea will surely change the future of humanity for good. This technology will surely change the perception of how a traditional automotive was initially thought of by adding endless applications as a boon to mankind. The application of cars communicating with each other is enormous and has already been discussed by many researchers by now. But, the important thing here is how to put it in practice with the increasing demand for cars and making it safe to use it, at least improve the current condition by this new technology and not worsen the situation by digital hacking and other flaws. Since the nature of the Communication System is highly dynamic a strict security mechanism is mandatory for its seamless functioning. We propose to encrypt the communication taking place in C2C communication which is not the same as using the Internet security mechanism due to limitation of its speed and residing hardware servers. Symmetric Cryptography thus fails to incorporate the scope of various security disciplines and hence it is ineffective to use such techniques. Asymmetric Cryptography on the other hand provides an ideal trade-off among various security disciplines and hence it is considered as an alternative approach to accomplish a secure system but it fails when applied in an ad-hoc environment. However, the traditional Public Key Infrastructure (PKI) technique fails in several ways so we propose a modified form of communication and authentication technique along with rapid communication and group messages to fasten the speed of communication. Keywords: Protocol, Communication, Security, Privacy
EXAMINING MODERN DATA SECURITY AND PRIVACY PROTOCOLS IN AUTONOMOUS VEHICLESijcsit
A fully automated, self-driving car can perceive its environment, determine the optimal route, and drive
unaided by human intervention for the entire journey. Connected autonomous vehicles (CAVs) have the
potential to drastically reduce accidents, travel time, and the environmental impact of road travel. Such
technology includes the use of several sensors, various algorithms, interconnected network connections,
and multiple auxiliary systems. CAVs have been subjected to attacks by malicious users to gain/deny
control of one or more of its various systems. Data security and data privacy is one such area of CAVs that
has been targeted via different types of attacks. The scope of this study is to present a good background
knowledge of issues pertaining to different attacks in the context of data security and privacy, as well
present a detailed review and analysis of eight very recent studies on the broad topic of security and
privacy related attacks. Methodologies including Blockchain, Named Data Networking, Intrusion
Detection System, Cognitive Engine, Adversarial Objects, and others have been investigated in the
literature and problem- and context-specific models have been proposed by their respective authors
A fully automated, self-driving car can perceive its environment, determine the optimal route, and drive
unaided by human intervention for the entire journey. Connected autonomous vehicles (CAVs) have the
potential to drastically reduce accidents, travel time, and the environmental impact of road travel. Such
technology includes the use of several sensors, various algorithms, interconnected network connections,
and multiple auxiliary systems. CAVs have been subjected to attacks by malicious users to gain/deny
control of one or more of its various systems. Data security and data privacy is one such area of CAVs that
has been targeted via different types of attacks. The scope of this study is to present a good background
knowledge of issues pertaining to different attacks in the context of data security and privacy, as well
present a detailed review and analysis of eight very recent studies on the broad topic of security and
privacy related attacks. Methodologies including Blockchain, Named Data Networking, Intrusion
Detection System, Cognitive Engine, Adversarial Objects, and others have been investigated in the
literature and problem- and context-specific models have been proposed by their respective authors.
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
Vehicles download the data when passing through a drive through the road (RSU) and then share the data after travelling outside the coverage of RSU.A key issue of downloading
cooperative data is how effectively data is shared among them self. Developing an application layer data exchange protocol for the coordination of vehicles to exchange data according to
their geographic locations. Coordinated sharing can avoid medium access control (MAC) layer
collisions and the hidden terminal effect can be avoided in the multi-hop transmission. A salient
feature of the application layer data exchange protocol, in the voluntary services, Vehicles purchase the requested data from service provider via RSUs. In this project, we propose a
cooperative data sharing with secure framework for voluntary services in special vehicles networks (VANETs). We also concentrate on security in the process of downloading data and
sharing. Applicants to ensure exclusive access to data applied and security of the vehicles
involved in the implementation.
Vehicular ad hoc network is one of the most interesting research areas due to flexibility, low cost, high sensing fidelity, fault tolerance, creating many new and exciting application areas for remote sensing. So, it has emerged as a promising tool for monitoring the physical world with wireless sensor that can sense, process and communicate. Being ad-hoc in nature, VANET is a type of networks that is created from the concept of establishing a network of cars for a specific need or situation. VANETs have now been established as reliable networks that vehicles use for communication purpose on highways or urban environments. VANET considered as a distinct type of Mobile Ad Hoc Networks holds the opportunity to make peoples life and death decisions by predicting and helping the drivers and other people about the road safety and other critical conditions.
A Lightweight Message Authentication Framework in the Intelligent Vehicles Sy...theijes
Intelligent Vehicles System (IVS) supports a wide variety of Advanced Driver Assistance System (ADAS) services such as vehicle visibility detection. In implementing this service, the message authentication is a vital design parameter that protects victim vehicles from being tricked into accepting false messages as legitimate ones and make a false decision based on the incoming message. However, implementing message authentication service is too expensive especially if vehicles, initially, don’t trust each others or there is no certificate of authority in place. In this research, we investigate the use of the Basic Safety Message (BSM) behavior over time as a metric to allow a receiving vehicle to anticipate at what distance it will continue to receive BSMs from within-range vehicles. Therefore, the victim vehicle would reject the BSM messages that fall outside its acceptance window. Simulation experiments are setup to study the realistic behavior of the BSM messages in different environment characteristics including changing the vehicle size, number of road lanes and vehicle speed. Research findings suggested that the lightweight message authentication can assist vehicles in estimating the duration for a trusted relationship among those that are located within range of each others.
Vehicular ad-hoc networks (VANETs) technology has come out as an important research field over the last few years. VANETs are the likely an influencing approach to provide safety of driver and other applications for the traffic conditions as well as passengers. Being dynamic in nature, it establishes the network, according to the situation and need of the users and provides reliable communication among the vehicles. Due to its great benefits, it is highly vulnerable to various attacks and security in VANET should be taken into consideration. This paper presented the security attacks between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). Many research works have been done to improve the performance and security of this network. The main aim of this paper is the security using hashing and techniques to calculate the trust in VANETs.
Predictive Data Mining with Normalized Adaptive Training Method for Neural Ne...IJERDJOURNAL
Abstract:- Predictive data mining is an upcoming and fast-growing field and offers a competitive edge for the benefit of organization. In recent decades, researchers have developed new techniques and intelligent algorithms for predictive data mining. In this research paper, we have proposed a novel training algorithm for optimizing neural networks for prediction purpose and to utilize it for the development of prediction models. Models developed in MATLAB Neural Network Toolbox have been tested for insurance datasets taken from a live data warehouse. A comparative study of the proposed algorithm with other popular first and second order algorithms has been presented to judge the predictive accuracy of the suggested technique. Various graphs have been presented to analyse the convergence behaviour of different algorithms towards point of minimum error.
The development of the Islamic Heritage in Southeast Asia tradition and futur...IJERDJOURNAL
ABSTRACT: This research explores the historical development of Islamic architecture in Southeast Asia from the first idea to design a mosque by the Prophet Mohammad until the development at these days with the various purism passages And as developed up these days with the passages of the development of the traditional type to the postmodern, finally to modern Southeast Asia. The Islamic architecture has been developed in six traditional typologies of types of mosques is renowned throughout the world. Southeast Asia mosques are divided into various types according to the regional culture as Arabic type, Turkish type, the Iranian type, the Indian type, the Chinese type and South East Asian type. This research describes the main characteristics of these types. The main purpose of this research is to draw a correlation between the descriptions of the mosques in Malaysia as presented in the traditional typology that contains in its features in main types, relations in common throughout the Islamic world, however, distinguishes itself with the architectural form according to the local tradition.
More Related Content
Similar to Enhanced Conditional Privacy Preservation In VANETs
Vehicular Networks (VNs) seek to provide, among other applications, safer driving conditions. Vehicles need to periodically broadcast safety messages providing precise position information to nearby vehicles. Recent advances in development of Wireless Communication in Vehicular Adhoc Network (VANET) has provided emerging platform for industrialists and researchers. Vehicular adhoc networks are multi-hop networks with no fixed infrastructure. As a result, the driver’s privacy is at stake. In order to mitigate this threat, while complying with the safety requirements of VNs, the creation of mix-zones security at appropriate places of the VN to prevent the attacks Vehicle. Propose to do so with the use of cryptography algorithm AES with zone based routing protocol, analytically how the combination of mix-zones into mix-networks brings forth location privacy in vehicle node. Finally, show by simulations that the proposed zone based security is effective in various scenarios.
A Novel Sybil Attack Detection Mechanism in Urban Vehicular NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Vehicular Ad Hoc Networks (VANETs) are based on network technology where cars act as mobile nodes to form a communication network. In VANETs, routing protocols have a significance regarding the overall network performance since they determine the way of sending and receiving packets between mobile nodes. Most of the protocols proposed for VANETs are adapted from Mobile ad hoc networks (MANETs) routing protocols. However, due to the specific characteristics of VANETs, especially high mobility, and dynamic topology, the routing protocols in ad hoc networks do not adapt immediately to VANETs. Therefore, secure routing of Vehicular ad hoc networks (VANETs) against attacks, which are of various types, is still a challenging issue. This paper is going to present a synthesis of the most relevant protocols that have addressed the secure routing issue in VANETs. It also establishes a comparison regarding the offered features and the studied performance aspects through which it is notified that a security mechanism depends not only on the level of efficiency but also on the network constraints.
Vehicular Ad Hoc Networks (VANETs) are based on network technology where cars act as mobile nodes to form a communication network. In VANETs, routing protocols have a significance regarding the overall network performance since they determine the way of sending and receiving packets between mobile nodes. Most of the protocols proposed for VANETs are adapted from Mobile ad hoc networks (MANETs) routing protocols. However, due to the specific characteristics of VANETs, especially high mobility, and dynamic topology, the routing protocols in ad hoc networks do not adapt immediately to VANETs. Therefore, secure routing of Vehicular ad hoc networks (VANETs) against attacks, which are of various types, is still a challenging issue. This paper is going to present a synthesis of the most relevant protocols that have addressed the secure routing issue in VANETs. It also establishes a comparison regarding the offered features and the studied performance aspects through which it is notified that a security mechanism depends not only on the level of efficiency but also on the network constraints.
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationIJERA Editor
VANET provide facility for the vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages to other vehicles. However, this raises the issue of security and privacy. Here, we have described various existing solutions/protocols that are used in order to satisfy the security and privacy requirement of the vehicular ad hoc network. We have also described security issues and challenges in VANET. We have presented various security attributes that may be considered as criteria to measure security such as availability, confidentiality, integrity, authentication and non-repudiation. This paper also give the detail information of some of the schemes such as RAISE ,IBV with their pros and cons.
VANET SECURITY AND PRIVACY – AN OVERVIEWIJNSA Journal
Even though vehicular ad-hoc networks (VANETs) bring tremendous benefits to society, yet they raise
many challenges where the security and privacy concerns are the most critical ones. In this paper, we
provide a detailed overview of the state-of-the-art security and privacy requirements in VANET. Also, a
brief of the approachesthat are proposed in the literature to fulfil these requirements is given in this paper.
Besides that, a classification of the various VANET attacks based on the communication system
layersisprovided in this paper. In addition, the different types of VANET adversaries and attackers
arepresented here.In general, this paper aims to provide a good piece of information about VANET
security and privacy, in order to be used as a tool to help researchers in this field in developing secure
privacy-preserving approaches for VANET.
VANET SECURITY AND PRIVACY – AN OVERVIEWIJNSA Journal
Even though vehicular ad-hoc networks (VANETs) bring tremendous benefits to society, yet they raise
many challenges where the security and privacy concerns are the most critical ones. In this paper, we
provide a detailed overview of the state-of-the-art security and privacy requirements in VANET. Also, a
brief of the approachesthat are proposed in the literature to fulfil these requirements is given in this paper.
Besides that, a classification of the various VANET attacks based on the communication system
layersisprovided in this paper. In addition, the different types of VANET adversaries and attackers
arepresented here.In general, this paper aims to provide a good piece of information about VANET
security and privacy, in order to be used as a tool to help researchers in this field in developing secure
privacy-preserving approaches for VANET.
In Vehicular Communication, the security system against the attacker is very important. Sybil attacks have been regarded as a serious security threat to ad hoc networks and sensor networks. It is an attack in which an original identity of the vehicle is corrupted or theft by an attacker to creates multiple fake identities. Detecting such type of attacker and the original vehicle is a challenging task in VANET. This survey paper briefly presents various Sybil attack detection mechanism in VANET.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Brisk and secure ad hoc vehicular communicationeSAT Journals
Abstract The idea of Car-to-Car communication is a revolutionary phenomenon in the automobile industry. This idea will surely change the future of humanity for good. This technology will surely change the perception of how a traditional automotive was initially thought of by adding endless applications as a boon to mankind. The application of cars communicating with each other is enormous and has already been discussed by many researchers by now. But, the important thing here is how to put it in practice with the increasing demand for cars and making it safe to use it, at least improve the current condition by this new technology and not worsen the situation by digital hacking and other flaws. Since the nature of the Communication System is highly dynamic a strict security mechanism is mandatory for its seamless functioning. We propose to encrypt the communication taking place in C2C communication which is not the same as using the Internet security mechanism due to limitation of its speed and residing hardware servers. Symmetric Cryptography thus fails to incorporate the scope of various security disciplines and hence it is ineffective to use such techniques. Asymmetric Cryptography on the other hand provides an ideal trade-off among various security disciplines and hence it is considered as an alternative approach to accomplish a secure system but it fails when applied in an ad-hoc environment. However, the traditional Public Key Infrastructure (PKI) technique fails in several ways so we propose a modified form of communication and authentication technique along with rapid communication and group messages to fasten the speed of communication. Keywords: Protocol, Communication, Security, Privacy
EXAMINING MODERN DATA SECURITY AND PRIVACY PROTOCOLS IN AUTONOMOUS VEHICLESijcsit
A fully automated, self-driving car can perceive its environment, determine the optimal route, and drive
unaided by human intervention for the entire journey. Connected autonomous vehicles (CAVs) have the
potential to drastically reduce accidents, travel time, and the environmental impact of road travel. Such
technology includes the use of several sensors, various algorithms, interconnected network connections,
and multiple auxiliary systems. CAVs have been subjected to attacks by malicious users to gain/deny
control of one or more of its various systems. Data security and data privacy is one such area of CAVs that
has been targeted via different types of attacks. The scope of this study is to present a good background
knowledge of issues pertaining to different attacks in the context of data security and privacy, as well
present a detailed review and analysis of eight very recent studies on the broad topic of security and
privacy related attacks. Methodologies including Blockchain, Named Data Networking, Intrusion
Detection System, Cognitive Engine, Adversarial Objects, and others have been investigated in the
literature and problem- and context-specific models have been proposed by their respective authors
A fully automated, self-driving car can perceive its environment, determine the optimal route, and drive
unaided by human intervention for the entire journey. Connected autonomous vehicles (CAVs) have the
potential to drastically reduce accidents, travel time, and the environmental impact of road travel. Such
technology includes the use of several sensors, various algorithms, interconnected network connections,
and multiple auxiliary systems. CAVs have been subjected to attacks by malicious users to gain/deny
control of one or more of its various systems. Data security and data privacy is one such area of CAVs that
has been targeted via different types of attacks. The scope of this study is to present a good background
knowledge of issues pertaining to different attacks in the context of data security and privacy, as well
present a detailed review and analysis of eight very recent studies on the broad topic of security and
privacy related attacks. Methodologies including Blockchain, Named Data Networking, Intrusion
Detection System, Cognitive Engine, Adversarial Objects, and others have been investigated in the
literature and problem- and context-specific models have been proposed by their respective authors.
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
Vehicles download the data when passing through a drive through the road (RSU) and then share the data after travelling outside the coverage of RSU.A key issue of downloading
cooperative data is how effectively data is shared among them self. Developing an application layer data exchange protocol for the coordination of vehicles to exchange data according to
their geographic locations. Coordinated sharing can avoid medium access control (MAC) layer
collisions and the hidden terminal effect can be avoided in the multi-hop transmission. A salient
feature of the application layer data exchange protocol, in the voluntary services, Vehicles purchase the requested data from service provider via RSUs. In this project, we propose a
cooperative data sharing with secure framework for voluntary services in special vehicles networks (VANETs). We also concentrate on security in the process of downloading data and
sharing. Applicants to ensure exclusive access to data applied and security of the vehicles
involved in the implementation.
Vehicular ad hoc network is one of the most interesting research areas due to flexibility, low cost, high sensing fidelity, fault tolerance, creating many new and exciting application areas for remote sensing. So, it has emerged as a promising tool for monitoring the physical world with wireless sensor that can sense, process and communicate. Being ad-hoc in nature, VANET is a type of networks that is created from the concept of establishing a network of cars for a specific need or situation. VANETs have now been established as reliable networks that vehicles use for communication purpose on highways or urban environments. VANET considered as a distinct type of Mobile Ad Hoc Networks holds the opportunity to make peoples life and death decisions by predicting and helping the drivers and other people about the road safety and other critical conditions.
A Lightweight Message Authentication Framework in the Intelligent Vehicles Sy...theijes
Intelligent Vehicles System (IVS) supports a wide variety of Advanced Driver Assistance System (ADAS) services such as vehicle visibility detection. In implementing this service, the message authentication is a vital design parameter that protects victim vehicles from being tricked into accepting false messages as legitimate ones and make a false decision based on the incoming message. However, implementing message authentication service is too expensive especially if vehicles, initially, don’t trust each others or there is no certificate of authority in place. In this research, we investigate the use of the Basic Safety Message (BSM) behavior over time as a metric to allow a receiving vehicle to anticipate at what distance it will continue to receive BSMs from within-range vehicles. Therefore, the victim vehicle would reject the BSM messages that fall outside its acceptance window. Simulation experiments are setup to study the realistic behavior of the BSM messages in different environment characteristics including changing the vehicle size, number of road lanes and vehicle speed. Research findings suggested that the lightweight message authentication can assist vehicles in estimating the duration for a trusted relationship among those that are located within range of each others.
Vehicular ad-hoc networks (VANETs) technology has come out as an important research field over the last few years. VANETs are the likely an influencing approach to provide safety of driver and other applications for the traffic conditions as well as passengers. Being dynamic in nature, it establishes the network, according to the situation and need of the users and provides reliable communication among the vehicles. Due to its great benefits, it is highly vulnerable to various attacks and security in VANET should be taken into consideration. This paper presented the security attacks between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). Many research works have been done to improve the performance and security of this network. The main aim of this paper is the security using hashing and techniques to calculate the trust in VANETs.
Similar to Enhanced Conditional Privacy Preservation In VANETs (20)
Predictive Data Mining with Normalized Adaptive Training Method for Neural Ne...IJERDJOURNAL
Abstract:- Predictive data mining is an upcoming and fast-growing field and offers a competitive edge for the benefit of organization. In recent decades, researchers have developed new techniques and intelligent algorithms for predictive data mining. In this research paper, we have proposed a novel training algorithm for optimizing neural networks for prediction purpose and to utilize it for the development of prediction models. Models developed in MATLAB Neural Network Toolbox have been tested for insurance datasets taken from a live data warehouse. A comparative study of the proposed algorithm with other popular first and second order algorithms has been presented to judge the predictive accuracy of the suggested technique. Various graphs have been presented to analyse the convergence behaviour of different algorithms towards point of minimum error.
The development of the Islamic Heritage in Southeast Asia tradition and futur...IJERDJOURNAL
ABSTRACT: This research explores the historical development of Islamic architecture in Southeast Asia from the first idea to design a mosque by the Prophet Mohammad until the development at these days with the various purism passages And as developed up these days with the passages of the development of the traditional type to the postmodern, finally to modern Southeast Asia. The Islamic architecture has been developed in six traditional typologies of types of mosques is renowned throughout the world. Southeast Asia mosques are divided into various types according to the regional culture as Arabic type, Turkish type, the Iranian type, the Indian type, the Chinese type and South East Asian type. This research describes the main characteristics of these types. The main purpose of this research is to draw a correlation between the descriptions of the mosques in Malaysia as presented in the traditional typology that contains in its features in main types, relations in common throughout the Islamic world, however, distinguishes itself with the architectural form according to the local tradition.
An Iot Based Smart Manifold Attendance SystemIJERDJOURNAL
ABSTRACT:- Attendance has been an age old procedure employed in different disciplines of educational institutions. While attendance systems have witnessed growth right from manual techniques to biometrics, plight of taking attendance is undeniable. In fingerprint based attendance monitoring, if fingers get roughed / scratched, it leads to misreading. Also for face recognition, students will have to make a queue and each one will have to wait until their face gets recognised. Our proposed system is employing “manifold attendance” that means employing passive attendance, where at a time, the attendance of multiple people can get captured. We have eliminated the need of queue system / paper-pen system of attendance, and just with a single click the attendance is not only captured, but monitored as well, that too without any human intervention. In the proposed system, creation of database and face detection is done by using the concepts of bounding box, whereas for face recognition we employ histogram equalization and matching technique.
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNIJERDJOURNAL
ABSTRACT: In multi-hop ad hoc networks there exists a problem of identifying and isolating misbehaving nodes which refuses to forward packets. Audit-based Misbehavior Detection (AMD) is a comprehensive system that effectively and efficiently isolates both continuous and selective packet droppers. The AMD system integrates reputation management, trustworthy route discovery, and identification of misbehaving nodes based on behavioral audits. Compared to previous methods, AMD evaluates node behavior on a per-packet basis, without employing energy-expensive overhearing techniques or intensive acknowledgment schemes. Moreover, AMD can detect selective dropping attacks even if end-to-end traffic is encrypted and can be applied to multichannel networks or networks consisting of nodes with directional antennas. This work implements the AMD approach by considering the rushing attack. The analysis of the results confirms that AMD based method with rushing attack performs better as compared to the non rushing attack.
Human Resource Competencies: An Empirical AssessmentIJERDJOURNAL
ABSTRACT: Human beings are the essential part of the process. Today, technology and machines are taking over the human resource, as claimed by many people; but technology and machines can never replace human resource entirely. Humans are required for operating and maintaining these machines. Human resource is extremely important for developing or bringing about new and required changes to these machines and technologies. The study of the history and the current Human Resource Management trends points out some important facts
Prospects and Problems of Non-Governmental Organizations in Poverty Alleviati...IJERDJOURNAL
ABSTRACT: The World Bank sponsored Millennium Development Goals (MDGs), launched in 1990 envisaged a world free of poverty by the year 2015. The North-East (where Gombe State is centrally located) is experiencing significantly higher poverty and lack of progress in poverty reduction efforts. With coming to end of 2015, much still need to be done to attain the MDGs. With over 62.6% Nigerian population still very poor, there is need for a continuous search for alternative planning & development options that would help ameliorate poverty and sustained our dream for a world free of poverty and wants. This study examines the prospects and investigates the constraints of Non-Governmental Organizations (NGOs) in poverty alleviation and community development. Literature review, questionnaire and interview methods were used for the study. The findings revealed that: finance, continuity of projects/programmes, conflicts and insecurity were the major problems confronting the NGOs. An interesting revelation is that majority of the respondents indicated that they wait for the NGOs or Government to initiate poverty alleviation programmes/projects. The implication is that the community dwellers need attitudinal change necessary for self reliance. The prospect of NGOs in poverty alleviation and community development in the study area is very bright due to rapid population growth & increasing poverty levels with the attendant positive effects on urban planning and regional development. The study recommends that NGOs should (1) form an association to enable them work together, and utilize social capital in their operation/services. (2) seek to explore avenues for funding from donor agencies. Finally, the Government needs to address some of its short comings.
Development of Regression Model Using Lasso And Optimisation of Process Param...IJERDJOURNAL
ABSTRACT:- Metal Spinning is a concept of describing the forming of metal into seamless, axisymmetric shapes by a combination of rotational motion and force. Sheet metal spinning is one of the metal forming processes, which a flat metal blank is rotated at a high speed and formed into an axisymmetric part by a roller which gradually forces the blank on to a mandrel, bearing the final shape of the spun part. Over the last few decades, sheet metal spinning has developed significantly and spun products have been used in various industries. Nowadays the process has been expanded to new horizons in industries, since tendency to use minimum tool and equipment costs and also using lower forces with the output of excellent surface quality and good mechanical properties. The automation of the process is of greater importance, due to its wider applications like decorative household‟s goods, rocket nose cones, gas cylinders etc. The objective of the current work is to develop the mathematical model for the spinning process with surface roughness as response and the input parameters as Mandrel speed (rpm), geometry of the Roller and Thickness of sheet (mm). Type of mandrel (EN8 Material) considered in the spinning process has the geometrical profile of parabola and single roller and double roller tools (EN8 Material) are used to deform the Al2024-T3 sheet metal paper aims to understand the process parameters that affect the surface finish of the spun component. Full factorial Design of Experiments technique is used to find the minimum number of experimental trials that are required to develop the regression model. A regression model using Least Absolute Shrinkage and Selection Operator (Lasso) is developed to further deepen the understanding between the input parameters and the surface roughness. The model was optimised using Sequential Quadratic Programming.
Use of Satellite Data for Feasibility Study And Preliminary Design Project Re...IJERDJOURNAL
ABSTRACT: In the developing countries like India, need of infrastructure is very high as compared to the available resources. The various organizations put their demands to state and center government for sanction of their project, government depends upon its various department to provide an approximate cost so that priorities can be assigned. The conventional procedure depends upon the land surveying, collection of data from various departments resulting in delay in necessary decision making or some time shelving due to unreasonable cost estimate due to field data being very old. Survey of India, The National Survey and Mapping Organization single handily taking this responsibility thus up gradation of data is far behind the actual development. From the satellite data, which is available in the form of images and terrains (even in 3d LiDAR points for some areas) is very useful for Feasibility Study, and Preliminary Project Report. In the present study natural drain named „Chai Nala‟ meanders through the prime property of Greater Mohali Area Development Authority (GMADA) thus making a big chunk of commercial land inoperative. It was proposed to straighten and channelize to reclaim the land from drain regime. Being the precious land department wanted the most economical and technically sound design without taking any risk. It was decided to counter check the hydraulic data, ground profile, acquired from the Punjab Irrigation Department with the satellite data and Differential Global Positioning System (DGPS). The data from the Google Earth was acquired using Cad Earth software and water shed analysis was carried out using Autodesk Civil 3D software. Comparison of results shows that this technique is quite useful and can be for preliminary feasibility and project preparation. Thus saving huge money and time.
Microwave Assisted Sol Gel Synthesis of Magnesium Oxide(Mgo)IJERDJOURNAL
ABSTRACT: Magnesium oxide (MgO) nanoparticles have been synthesized by Microwave assisted Sol gel synthesis method by using the precursors citric acid (C2O4H2) and magnesium chloride (Mgcl2.6H2O). It is a simple, novel and cost effective method. The structure, morphology and crystalline phase of the magnesium oxide nanocrystals have been investigated by scanning electron microscopy (SEM), transmission electron microscopy (TEM), X-ray diffraction (XRD).Presence of functional groups and optical characters are analyzed by using FTIR and UV- visible techniques
Development of Enhanced Frequency Drive for 3-Phase Induction Motors Submitte...IJERDJOURNAL
ABSTRACT: Three-phase induction motors produce mechanical power by electromagnetic induction and run on a 3-phase ac supply. They require efficient speed control, to enable them do variable speed operations, save power consumption and reduce machine noise. In this dissertation, a new switching device called MosControlled Thyristor (MCT) for frequency drive is introduced. Based on the new switching device and AT89C52 microcontroller, an enhanced frequency drive for controlling the speed and torque of 3-phase 15kW squirrel cage induction motor is modeled. Different voltages ranging from 342V to 415V and frequencies ranging from 50Hz to 60Hz are used in a systematic manner to simulate the system based on the new switching device. The simulation program is written in C language and tested with Proteus 7.6 simulation software. Voltage and frequency have significant impact on the actual speed and torque of the motor. Simulation results show that with the new model, the torque (56.66Nm) developed by the motor which is constant throughout each speed range is directly proportional to the ratio (6.7:1) of the applied voltage and the frequency of the supply and the selected speeds (1450, 1510, 1570, 1630, 1690 and 1750 rpm) are locked irrespective of change in load. This is unlike other models where magnetic saturation and conduction drop of IGBT lead to voltage/frequency imbalance resulting in excessive drawing of current by the motor and overheating. This new control method has a speed regulation of ±2 to 3% of maximum frequency, speed response of 3Hz, speed control range of 1: 40 and efficiency of 88%, as further advantages. Comparison of the system with other speed control techniques shows improved energy-saving, cost effectiveness and safety in operation. The contributions of this research aim to make Volts per Hertz speed control method based on MCT a reliable better alternative to other well known methods in speed control of three-phase induction motors
Short-Term Load Forecasting Using ARIMA Model For Karnataka State Electrical ...IJERDJOURNAL
ABSTRACT: Short-term load forecasting is a key issue for reliable and economic operation of power systems. This paper aims to develop short-term electric load forecasting ARIMA Model for Karnataka Electrical Load pattern based on Stochastic Time Series Analysis. The logical and organised procedures for model development using Autocorrelation Function and Partial Autocorrelation Function make ARIMA Model particularly attractive. The methodology involves Initial Model Development Phase, Parameter Estimation Phase and Forecasting Phase. To confirm the effectiveness, the proposed model is developed and tested using the historical data of Karnataka Electrical Load pattern (2016). The forecasting error of ARIMA Model is computed and results have shown favourable forecasting accuracy.
Optimal Pricing Policy for a Manufacturing Inventory Model with Two Productio...IJERDJOURNAL
ABSTRACT: When a new product is launched, a manufacturer applies the strategy of offering a quantity incentive initially for some time to boost up the demand of the product. The present paper describes a manufacturing inventory model with price sensitive demand enhanced by a quantity incentive. Later on demand becomes time increasing also. Inventory cycle starts with low production rate which is followed by higher production rate when demand is boosted up. Shortages are not allowed in this model. Presentation of numerical examples, tables, graphs and sensitivity analysis describes the model very well. Lastly case without incentive illustrates that usually the quantity incentive offered initially is beneficial.
Analysis of failure behavior of shear connection in push-out specimen by thre...IJERDJOURNAL
ABSTRACT:- This study analyzes the failure mechanism of shear connection by three-dimensional finite element analysis (FEA) of push-out specimens that was practically unaffordable experimentally or by twodimensional FEA. For the analysis of the failure behavior of the compression strut formed in the loaded concrete member, the three-dimensional principal stress space is transformed into two-dimensional space by means of the relation between the hydrostatic stress and the deviatoric stress. The analysis of the stress state in the compression strut revealed that the deviatoric stress increases with larger load particularly in the concrete surrounding the lower part of the shear stud. Accordingly, bearing failure of concrete occurred locally within a limited region in the slab. The steep increase of the deviatoric stress accompanying the increase of the load resulted in the failure of concrete around the lower part of the shear stud, which in turn provoked the deformation and the development of bending moment of the shear stud. Finally, plastic hinge formed in the shear stud leading it to reach its limit state. The proposed finite element model can also be used to model the shear connection of the composite beam and, the proposed stress analysis method can be applied to analyze its composite action behavior.
Discrete Time Batch Arrival Queue with Multiple VacationsIJERDJOURNAL
ABSTRACT:- In this paper we consider a discrete time batch arrival queueing system with multiple vacations. It is assume that the service of customers arrived in the system between a fixed intervals of time after which the service goes on vacations after completion of one service of cycle is taken up at the boundaries of the fixed duration of time. This is the case of late arrival. In case of early arrival i.e. arrival before the start of next cycles of service. If the customer finds the system empty, it is served immediately. We prove the Stochastic decomposition property for queue length and waiting time distribution for both the models.
Regional Rainfall Frequency Analysis By L-Moments Approach For Madina Region,...IJERDJOURNAL
ABSTRACT:- In arid regions, extreme rainfall event frequency predictions are still a challenging problem, because of the rain gauge stations scarcity and the record length limitation, which are usually short to insure reliable quantile estimates. Regional frequency analysis is one of the popular approaches used to compensate the data limitation. In this paper, regional frequency analysis of maximum daily rainfall is investigated for Madinah province in the Western Kingdom of Saudi Arabia (KSA). The observed maximum daily rainfall records of 20 rainfall stations are selected from 1968 to 2015. The rainfall data is evaluated using four tests, namely, Discordance test (Di), Homogeneity test (H), Goodness of fit test (Zdist) and L-moment ratios diagram (LMRD). The Di of L-moments shows that all the sites belong to one group (Di <3.0).><1). Finally, the Zdist is used to evaluate five probability distribution functions (PDFs) including generalized logistic (GLO), generalized extreme value (GEV), generalized normal (GNO), generalized Pareto (GPA), and Pearson Type III (PE3). Zdist and LMRD both showed that PE3 distribution is the best among the other PDFs. The regional parameters of the candidate PDF are computed using L-moments approach and accordingly the regional dimensionless growth curve is developed. The results enhance the accuracy of extreme rainfall prediction at-sites and also they can be used for ungauged catchment in the region.
Implementing Oracle Utility-Meter Data Management For Power ConsumptionIJERDJOURNAL
ABSTRACT: In this digital mobile world, it‟s need of time to streamline and increase efficiency in business processes like effective data collection, measurement, automatic validation, editing and estimation of measurement data, analysis and dashboard for forecasting and ease in end user accessibility with Just in Time. This paper is following two methodology in this process. CEMLI is an extensive framework for developing and implementing for Oracle whereas OUM is business process and use case driven process which supports products, tool, technologies and documentation. This paper have focused on analytical data, system automation functionality along with prototype designing. For this, analysts and administrators will collect and define calculation rule for data collection and measurement, deployment methods, dashboards and security features. This paper gives measure understanding of cloud technologies and their features like services (SaaS), deployment methods, security and ability to reduce overhead cost, downtime, and automate business processes with 360 degree review and analysis. It consolidates data in one system with volumes of analog and interval data which facilitates new customer with offering and effective program. Also it maximizes return on investments and protects revenue through comprehensive exception management.
Business Intelligence - A Gift for Decision Maker for the Effective Decision ...IJERDJOURNAL
ABSTRACT: Business Intelligence is a socio-technical concept emerged to help managers especially in their decision making tasks. A manager with different decision making styles has been started to make use of business intelligence in their own ways. Are the all managers taking benefits of Business intelligence in the same way? Does Business intelligence give each category what they want in the decision making process? If the answer to these questions is – No, then what is the expectation of managers from BI having different decision making style? Will BI could satisfy their needs? If yes, then how? By using well-formed theory in different styles of decision making and taking BI capabilities into consideration this paper highlights the framework which defines appropriate BI capabilities with each decision making style. Study shows in order to serve each style of decision in which BI capabilities changes with respect to style. It is believed that by making BI customized based on decision making styles; BI would be the much more successful in serving all the categories of managers
Effect of Water And Ethyl Alcohol Mixed Solvent System on the Stability of Be...IJERDJOURNAL
ABSTRACT: The stabilities of ternary complexes of metal ions (copper, nickel, zinc and cobalt) with betahydroxy ketone(BHK) derivatives and benzotriazole(BTAZ) derivatives in various mixed solvent systems (Water+Ethyl Alcohol) medium in 0.1 M KNO3 ionic strength at 250C using pH metric titration method have been established. The data reveal that the copper forms more stable complexes, which is followed by zinc and Ni complexes with these ligands. Cobalt form less stable complexes with these ligands. The stabilities of these complexes are further quantified with Δ log K values, intra-molecular equilibrium constants and percentage of stacking interaction in the ternary systems. The observed positive Δ log K values suggest that the flexible side chain alkyl moiety (ethyl group, butyl group) or aromatic moiety (phenyl group) in BHK ligand overlaps with the fixed aromatic moiety of BTAZ ligand in the ternary complex, which results in the enhanced stabilities for the (BHK-Alk)-Metal(II)-BTAZ and (BHK-Ph)-Metal(II)-BTAZ systems. Interestingly, the positive Δ log K values for both BHK-Alk and BHK-Ph ligands in their corresponding ternary complexes are about the same. This suggests the flexible Alkyl or phenyl side chain of BHK is overlapping with the triazole ring, but not the phenoxy ring of the BTAZ ligand.
Design of Synthesizable Asynchronous FIFO And Implementation on FPGAIJERDJOURNAL
ABSTRACT: This paper presents a design of asynchronous FIFO which, along with the regular status signals, consists of some extra status signals for more user-friendly design and added safety. Gray code pointers are used in the design. For synchronisation purpose, two synchroniser modules are used which contain two D-flip-flops each. The design is implemented and synthesised at register transfer level (RTL) using Verilog HDL. Simulation and implementation is done using Xilinx ISE Design Suite. Further, the design is implemented on Basys 2 Spartan-3E FPGA Board. Asynchronous FIFO is used to carry out steady data transmission at high speeds between two asynchronous clock domains.
Prospect and Challenges of Renewable Energy Resources Exploration, Exploitati...IJERDJOURNAL
ABSTRACT: This paper enumerates the status and challenges of exploration, exploitation and development of renewable energy resources and its roles in sustainable development in Africa. A brief review of energy and renewable energy resources in Africa was succinctly done. The concept of sustainable development as it borders on the Renewable Energy Technologies and their roles were also discussed. The challenges facing the acceptance, deployment and promotion of Renewable Energy Technologies in Africa were also highlighted. The barriers were classified as; policy, regulation and institutional; information and technical capacity and financial. Recommendations were made towards solving problems peculiar to exploration, exploitation and development of Renewable Energy in entirety in Africa.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Enhanced Conditional Privacy Preservation In VANETs
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 13, Issue 2 (February 2017), PP.25-29
25
Enhanced Conditional Privacy Preservation In VANETs
Chitra A. Parmar1
, Sunil P. Khachane2
1,2
Rajiv Gandhi Institute of Technology, Mumbai, India
Abstract:- The Vehicle drivers (users) do not want their personal information such as vehicle names, license
plate, speed, positions, moving routes, and user information to be revealed, in order to protect them against any
illegal tracing or user profiling. Thus, this information must be protected from any kind of misuse or attacks.
For this the obscurity of vehicular nodes should be supported to preserve privacy of vehicles and their users.
Also, we should be able to investigate for accidents or liabilities from non-repudiation. Hence, we present an
enhanced conditional privacy preservation scheme for vehicular ad-hoc networks (VANETs). This scheme
includes an ID-based cryptosystem to assure user's obscurity using pseudonyms; however the model provides a
backdoor for authorities to track misbehaving and suspicious users.
Keywords:- Conditional Privacy, Identity-Based Cryptography, Obscurity, Pseudonym, Traceability,
Vehicular Adhoc Network
I. INTRODUCTION
The Vehicular Ad-Hoc Network (VANET) is a technology that uses moving vehicles as nodes in a
network to create a mobile network. VANET turns every participating vehicle into a wireless router or node,
allowing vehicles to connect with each other in range of approximately 100 to 300 meters thus resulting in a
wide range network of vehicles. It is predicted that the first systems that will adapt this technology are cops and
fire vehicles to communicate with each other for safety purposes. In VANET, communication takes place
between vehicles, or between vehicles and fixed equipment‟s which are road side units and certification
authorities. Hence, a VANET generally consists of three network components: road side units (RSUs), on board
units (OBUs) or vehicles and certification authorities (CA).
A geographical area is divided into many regions; each region is served by one certification authority
(CA). This scenario consisting of one CA, specific number of RSUs along roadside and a large number of
vehicles on or by the road is considered as the general urban vehicular communication (UVC) structure.
Vehicular ad-hoc networks (VANETs) are targeted to improve road safety and traffic optimization.
Moreover, they also provide payment services (e.g., toll collection), location-based services (e.g., finding the
closest fuel station), infotainment (e.g., Internet access) and many vehicle-centred applications. Obviously,
security is also required in this application category. The security in VANET is most critical issue because the
information is propagated in open access environment. VANET's are exposed to various threats and attacks. It is
necessary that all the data which is transmitted should not be changed by the attackers [1].
A. Related Work
There are many research works for privacy preservation in VANETs. These approaches have
mechanism for pseudonym generation and updating but they lack tracking mechanisms [2] - [4]. Some privacy
schemes [5], [6] and [7] were such which did not used pseudonyms for privacy preservation. These schemes
were based on group signatures and mostly used ID-based cryptography. For example, in [7] Xiaodong Lin,
Xiaoting Sun, Pin-Han Ho and Xuemin Shen designed a conditional privacy-preserving vehicular
communications protocol based on group signatures and ID-based signatures. The most important benefit of
using group signature schemes is that they assure the unlinkability of the messages because group members can
anonymously sign on behalf of the group. A disadvantage of this model is that if a malicious vehicle is selected
as a group leader, all group members privacy may be leaked by the malicious leader.
Moreover, several proposals suggest the use of a public key infrastructure (PKI) and digital signatures
to secure VANETs. To evict misbehaving vehicles, Raya et al. proposed protocols focusing on revoking
certifications of malicious vehicles [8]. A big challenge arising from the PKI-based schemes in VANETs is the
heavy burden of certificate generation, storage, delivery, verification, and revocation. Most of the ID-based
cryptosystems which were proposed prior to [9] have a Key Generation Center (KGC) as a trusted authority to
distribute private/public keys to vehicles. The KGC uses a master key to generate the user‟s private key. Hence,
the KGC has access to these keys which creates a key escrow problem. To address this problem, the authors of
[9] suggested a new model where private/public RSA keys of each vehicle are generated on board, and changed
often to ensure privacy over a long period of time. A third party referred to as Regional Transport Authority
(RTA) uses the user‟s public key and ID and computes the signature value for users. The V2V and V2I
2. Enhanced Conditional Privacy Preservation In Vanets
26
communications includes these signature values, which is verified based on RTA ID and public parameters
stored in the RTA‟s list. When violations such as car accidents occur, the RTA can trace a user by computing
the Privacy ID (PID) with the public parameters of PID and all IDs registered in the RTA.
B. Security Goals
1) Privacy: The profile or a driver‟s personal information (such as driver‟s name, the license plate, speed,
position, and traveling routes, etc.) must be maintained against any sort of illegal access. We consider the
following two cases:
Communication between OBUs and RSUs: In this case, privacy means that a malicious node must not be
able to determine whether two different messages come from the same vehicle.
Communication between OBUs: Here, privacy means that deciding whether two different valid messages
coming from the same vehicle is sort of burden for all other nodes except an authorized node [10].
2) Non-repudiation: Non-repudiation requirement means that an entity is not able to deny having sent or
received some message, if it has sent or received that message. It is required for the sending node in V2V
warnings and beacons. In this way, if a vehicle sends some malicious data, there will be a proof that could be
used for liability purposes [11].
C. Attacks on Privacy and Non-Repudiation
1) Attacks on privacy: Attacks on privacy in VANETs are mainly related to illegally getting secret/private
information about vehicles. Getting information about a specific vehicle's status could put its driver's privacy at
risk, as there is a direct relation between a vehicle and its driver. These attacks can then be classified as follows:
Identity revealing attack: Obtaining the owner‟s identity of a particular vehicle could put its owner's
privacy at risk as mostly; a vehicle's owner is also its driver, so it would result in obtaining personal data
about that person [12].
Location tracking attack: The location of a vehicle at a specific moment, or the route followed by a
vehicle over a long period of time are considered as its personal data. Access to such information allows
malicious users to build that vehicle‟s profile and thus, that of its driver [12].
2) Attacks on non-repudiation: In VANETs, the non-repudiation means that a vehicle cannot deny of having
sent a specific message if it has sent that message. Typically, by generating a signature for the message in
VANETs, the vehicle cannot later disagree on the sent messages. The attack on non-repudiation is as follows:
Repudiation attack: Repudiation refers to disagreement of participation in all or part of communications in
VANETs. For example, a malevolent driver could disagree of having conducted an operation on a credit
card purchase, or malicious vehicles could abuse anonymous authentication techniques to achieve their
selfish goals or escape from their liabilities [12].
II. SYSTEM DESCRIPTION AND REQUIREMENTS
A. Desired Requirements
The main purpose of this design is to employ an efficient conditional privacy preservation system in
VANETs. The system considers the following aspects:
1) Obscurity: Obscurity is needed to secure the user's privacy. From the OBUs point of view; leaking identities,
locations or profiles information is not tolerable as it puts user's privacy at risk.
2) Traceability: The presence of obscurity raises the need of a tracking mechanism to secure VANETs from
inside attackers. Traceability is also required to allow law enforcement authorities to find the attackers.
B. Proposed System
The main components of VANET – CCA, CAs, RSUs and OBUs are shown below in Fig. 1. The
OBUs communicate with each other (V2V communication) or with RSUs (V2I communication). The RSUs are
immovable and they are in a fix number which do not change frequently. They are connected to each other and
to their regional certification authority through wired connections. The categorization of CAs is hierarchical;
they are categorized over the country, states, cities or regions and they are governed by a Central Certification
Authority (CCA). It is duty of CA to register the OBU's and RSU's. The number of CAs is proportional to the
number of vehicles. It means that with the increase or decrease in number of vehicles the number of CAs also
increases or decreases respectively. Our proposed design consists of three phases: initialization phase, vehicle
(OBU) registration phase and pseudonym update phase.
3. Enhanced Conditional Privacy Preservation In Vanets
27
Fig. 1: Model for Proposed System
1) Initialization Phase: In the initialization phase, the CCA generates and computes public as well as secret
parameters required for communication using ID-based cryptosystem. Then it delivers the secret parameters to
all the CAs and declares the public parameters to all the VANET components (CAs, RSUs, and OBUs). In this
model, we consider that the CAs network is secure.
2) Vehicle Registration Phase: Every VANET entity maintains a table which includes information of all the
CAs along their IDs, public keys, and their respective regions. We know that the CA‟s are distributed regionally
but it is not necessary for a vehicle to register to its regional CA, it can register itself to any CA in the network.
When a vehicle „a‟ wants to register to the VANET network, first it itself generates its RSA public and private
keys. Then it will choose a random CA say CAx, perform encryption using public key of CAx on its own identity
and public key and will send it to CAx as shown below:
Epk(x)(IDa, pka) (1)
where; Epk(x) is encryption by public key of CAx, IDa is identity of vehicle „a‟ and pka is public key of
vehicle „a‟. When CAx receives registration request it computes the first pseudonym and the first signature of
vehicle „a‟ and sends it to vehicle „a‟ including the other necessary parameters such as signature expiration time,
nonce, etc. encrypted using public key of vehicle „a‟ as described in following equation:
Epk(a)(IDa, Pa1, Siga1, Texp1, N1) (2)
where; Epk(a) is encryption by public key of vehicle „a‟, IDa is identity of Vehicle „a‟, Pa1 is new
pseudonym computed by CAx, Siga1 is new signature computed by CAx, Texp1 is the signature expiry time
associated with Siga1 and N1 is nonce value associated with newly computed pseudonym and signature.
On receiving this message, vehicle „a‟ verifies the signature if it is valid it accepts the message. This completes
vehicle registration phase. Note that every CA in the network maintains a table containing the vehicle ID, update
date and the latest pseudonym it generated for each vehicle. This information is helpful in tracing a vehicle
whenever required.
3) Pseudonym Update Phase: There are two different cases in which Pseudonym update can occur. They are as
follows:
(i) Normal pseudonym update case: Normally, a vehicle has to update its pseudonym before its current
signature expires. However, if a vehicle wants to update its pseudonym even if there is long time left for
current signature expiration time, it can do it. A vehicle can update its pseudonym from the same CA where
it generated its current pseudonym or can update it from any other CA. We assume that CA‟s are not being
trusted so following conditions must be met while selecting a CA for updating pseudonym:
A vehicle cannot update its pseudonym back-to-back from the same CA for more than two times in a
sequence.
CA will be selected randomly from the group of remaining CA.
4. Enhanced Conditional Privacy Preservation In Vanets
28
For updating pseudonym, vehicle „a‟ composes following message which includes its identity, current
pseudonym, current signature, current public key, current time, and a nonce encrypted with its private key:
M = Esk(a)(IDa, Pai-1, pka, t, Ni-1) (3)
where; Esk(a) is encryption by private key of vehicle „a‟, Pai-1 is the current pseudonym of vehicle „a‟, t
is current time, Ni-1 is the nonce value when current pseudonym & signature was composed.
Then it sends this message 'M' with some other necessary parameters to a CAx by encrypting it with
public key of CAx as follows:
Epk(x)(IDa, Pai-1, Sigai-1, pka, Texpi-1, t, M) (4)
where; Sigai-1 is current signature, Texpi-1 is expiry time of current signature.
When CAx receives such update request message, it checks the current time and validates the signature
and pseudonym present in the message. If it is found correct, then CAx will generate new pseudonym and
signature and send it to vehicle „a‟. Vehicle „a‟ verifies the signature; if successful then it accepts the
message. Thus, the vehicle‟s pseudonym is updated.
(ii) Special pseudonym update case: There is a special case in the pseudonym update phase; when vehicle „a‟
has updated its RSA public and private keys and wants to update its pseudonym. In this case, vehicle „a‟
needs to send it‟s old as well as the new public key in the update request message to CAx. The update
request message for special pseudonym update case in equation (3) becomes like following:
M = Esk(a)(IDa, Pai-1, pka(new), pka(old), t, Ni-1) (5)
Then, the CAx perform verification by generating the old pseudonym using the old public key. If old
pseudonym received in the message matches with the generated pseudonym, verification is successful. Next, the
CAx generates the new pseudonym and signature by using the new public key.
III. OPERATION OF PROPOSED SYSTEM
A. Broadcasting Safety Message
When a vehicle „a‟ wants to send a safety message „SM‟, it encrypts the message, the current time, and
the expiration time using its private key and then it broadcasts this message in its vicinity along with some other
necessary parameters as shown below:
Pa1, Siga1, pka, Esk(a)(SM, t, Texpi) (6)
The signature is verified by the destination node. If successful, the destination decrypts the message
using the public key of sending vehicle.
B. Traceability
When CCA receives complaint of malevolent behaviour of some vehicle having pseudonym „xyz‟, the
CCA sends a Find Request to all the CAs. This request includes the malevolent pseudonym. As stated earlier,
each CA maintains a list of IDs and their corresponding pseudonyms. The CAs checks for the pseudonym „xyz‟
in their databases. The one that finds it reverts back the corresponding ID to the CCA. The search for the
malevolent pseudonym is done in linear time which minimizes the computational overhead.
C. Revocation
When the CCA makes a determination to revoke a vehicle, it will inquire for the present pseudonym of
this vehicle. For this the CCA circulates the ID of the vehicle to all CAs in the network. Each CA that has
communicated earlier with this vehicle will reply a triplet containing vehicle ID, corresponding pseudonym and
update date. The present pseudonym of this vehicle is the one that has the most recent update date. Once the
CCA figures out the present pseudonym of this vehicle, it sends this present pseudonym along with the ID to all
CAs. Each CA maintains a revocation list that includes the IDs of the revoked vehicles. When a vehicle
approaches to a CA for updating its pseudonym, the CA checks for the ID (contained in the pseudonym update
request) in the revocation list and if it finds it, the CA interrupts the pseudonym update process and ultimately
the current pseudonym and signature will expire. Then, each CA circulates the present pseudonym of the
revoked vehicle to all the vehicles in its vicinity. Each vehicle maintains a list of revoked pseudonyms. Hence, a
revoked vehicle will not be able to communicate with other vehicles.
5. Enhanced Conditional Privacy Preservation In Vanets
29
IV. CONCLUSION
The proposed enhanced conditional privacy preservation scheme considers attacks on privacy as well
as non-repudiation. According to this scheme, the CAs and the RSUs are not considered as trusted parties. The
proposed scheme uses pseudonyms generated using the ID-based cryptosystem for authorities to trace
malevolent vehicles. This scheme preserves conditional privacy along with other security services such as
authentication, confidentiality and non-repudiation.
REFERENCES
[1]. Maxim Raya and Jean-Pierre Hubaux, "Securing vehicular ad hoc networks," Journal of Computer
Security, vol. 15, no. 1, pp. 39–68, 2007.
[2]. Levente Buttyan, Tamas Holczer, Andre Weimerskirch, and William Whyte, “Slow: A practical
pseudonym changing scheme for location privacy in VANETs,” in IEEE Vehicular Networking
Conference (VNC), October 2009.
[3]. Jinyuan Sun, Chi Zhang, Yanchao Zhang, and Yuguang Fang, “An identity-based security system for
user privacy in vehicular ad hoc networks,” IEEE Transactions on Parallel and Distributed Systems,
vol. 21, no. 9, pp. 1227-1239, September 2010.
[4]. Wu Yuntian, Wu Ting, and Zhang Jin, “Multi-PKG id-based signcryption with anonymity and
traceability for ad hoc networks,” in Second International Workshop on Computer Science and
Engineering, October 2009.
[5]. Krishna Sampigethaya, Leping Huang, Mingyan Li and Radha Poovendran, "AMOEBA: Robust
location privacy scheme for VANET," IEEE Journal on Selected Areas Communication, vol. 25, no. 8,
pp.1569-1589, October 2007.
[6]. Leping Huang, Kanta Matsuura, Hiroshi Yamane, and Kaoru Sezaki, "Enhancing Wireless Location
Privacy Using Silent Period" Wireless Communications and Networking Conference, pp. 1187- 1192,
March 2005.
[7]. Xiaodong Lin, Xiaoting Sun, Pin-Han Ho, and Xuemin Shen, "GSIS: A secure and privacy preserving
protocol for vehicular communications," IEEE Transactions on Vehicular Technology, vol. 56, no. 6,
pp. 3442–3456, November 2007.
[8]. Maxim Raya, Panagiotis Papadimitratos, Imad Aad, Daniel Jungels, Jean-Pierre Hubaux, "Eviction of
Misbehaving and Faulty Nodes in Vehicular Networks," IEEE Journal on Selected Areas in
Communications, vol. 25, no. 8, pp. 1557–1568, October 2007.
[9]. Jaeduck Choi and Souhwan Jung, "A security framework with strong non-repudiation and privacy in
VANETs," Consumer Communications and Networking Conference, January 2009.
[10]. Vinh Hoa LA and Ana Rosa Cavalli, "Security attacks and solutions in vehicular ad hoc networks: A
survey," International Journal on Ad Hoc Networking Systems, vol. 4, no. 2, April 2014.
[11]. Namarpreet Kaur and Aman Arora, "A research on various attacks in VANET," International Journal
of Advanced Research in Computer Science, vol. 6, no. 6, pp. 85-88, June-July 2015.
[12]. Jie Li, Huang Lu and Mohsen Guizani, "ACPN: A novel authentication framework with conditional
privacy-preservation and non-repudiation for VANETs," IEEE transactions on parallel and distributed
systems, vol. 26, no. 4, pp. 938-948, April 2015.