In recent years, the number of automobiles on the road has increased tremendously. Due to high density and mobility of vehicles,
possible threats and road accidents are increasing. Wireless communication allows sending safety and other critical information. Due to this
inherent wireless characteristic and periodic exchange of safety packets, Vehicular Ad-hoc Network (VANET) is vulnerable to number of
security threats like Sybil attack or temporal attack. In this paper, a detailed discussion has been done on both the type of attacks. With the
help of already published works, some approaches have also been studied which have proved to be of significance in detection of these
attacks.
Security attacks and solutions in vehicular ad hoc networks a surveypijans
Vehicular Ad hoc Networks (VANETs) have emerged recently as one of the most attractive topics for
researchers and automotive industries due to their tremendous potential to improve traffic safety, efficiency
and other added services. However, VANETs are themselves vulnerable against attacks that can directly
lead to the corruption of networks and then possibly provoke big losses of time, money, and even lives. This
paper presents a survey of VANETs attacks and solutions in carefully considering other similar works as
well as updating new attacks and categorizing them into different classes.
In Vehicular Communication, the security system against the attacker is very important. Sybil attacks have been regarded as a serious security threat to ad hoc networks and sensor networks. It is an attack in which an original identity of the vehicle is corrupted or theft by an attacker to creates multiple fake identities. Detecting such type of attacker and the original vehicle is a challenging task in VANET. This survey paper briefly presents various Sybil attack detection mechanism in VANET.
Compared to wired networks, Ad hoc networks are more vulnerable to security attacks
due to the lack of trusted centralized authority, lack of trust relationships between nodes. This paper
focuses on Sybil attack and its detection. A malicious node can generate and control a large number
of logical identities on a single device. This gives the illusion to network as these are different
legitimate nodes. An algorithm is proposed using position verification to detect the Sybil attack. The
algorithm is implemented in Network Simulator and the throughput, and packet delivery ratio with
and without Sybil attack.
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...Editor IJCATR
Considering the application of wireless sensor networks in critical area, such as battlefields, establishing security in these
networks is of utmost importance. One of the most serious and dangerous attack against these networks is Sybil attack. In this attack, a
malicious hostile node creates multiple fake identities simultaneously. This misleads legitimate nodes and, by mistake, they assume
each of these identifiers as real separate nodes. In this attack, malicious hostile node attracts so heavy traffic that can dramatically
disrupt routing protocols which has devastating effects on the network functions such as data integration, voting, and resource
allocation. The current research proposes a new lightweight algorithm for detecting Sybil attack in Mobile Wireless Sensor Networks
using sink nodes. The proposed algorithm is implemented to be assessed in terms of detection and error rates efficiency in a series of
experiments. Comparison of the experiment results with the results of other available algorithms revealed optimal performance of the
proposed algorithm.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDr.Irshad Ahmed Sumra
In this
respect, the network availability is exposed to many types of attacks.
In this paper, Denial of Service (DOS) attack on network availability
is presented and its severity level in VANET environment is
elaborated. A model to secure the VANET from the DOS attacks has been developed and some possible solutions to overcome the attacks have been discussed.
Security attacks and solutions in vehicular ad hoc networks a surveypijans
Vehicular Ad hoc Networks (VANETs) have emerged recently as one of the most attractive topics for
researchers and automotive industries due to their tremendous potential to improve traffic safety, efficiency
and other added services. However, VANETs are themselves vulnerable against attacks that can directly
lead to the corruption of networks and then possibly provoke big losses of time, money, and even lives. This
paper presents a survey of VANETs attacks and solutions in carefully considering other similar works as
well as updating new attacks and categorizing them into different classes.
In Vehicular Communication, the security system against the attacker is very important. Sybil attacks have been regarded as a serious security threat to ad hoc networks and sensor networks. It is an attack in which an original identity of the vehicle is corrupted or theft by an attacker to creates multiple fake identities. Detecting such type of attacker and the original vehicle is a challenging task in VANET. This survey paper briefly presents various Sybil attack detection mechanism in VANET.
Compared to wired networks, Ad hoc networks are more vulnerable to security attacks
due to the lack of trusted centralized authority, lack of trust relationships between nodes. This paper
focuses on Sybil attack and its detection. A malicious node can generate and control a large number
of logical identities on a single device. This gives the illusion to network as these are different
legitimate nodes. An algorithm is proposed using position verification to detect the Sybil attack. The
algorithm is implemented in Network Simulator and the throughput, and packet delivery ratio with
and without Sybil attack.
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...Editor IJCATR
Considering the application of wireless sensor networks in critical area, such as battlefields, establishing security in these
networks is of utmost importance. One of the most serious and dangerous attack against these networks is Sybil attack. In this attack, a
malicious hostile node creates multiple fake identities simultaneously. This misleads legitimate nodes and, by mistake, they assume
each of these identifiers as real separate nodes. In this attack, malicious hostile node attracts so heavy traffic that can dramatically
disrupt routing protocols which has devastating effects on the network functions such as data integration, voting, and resource
allocation. The current research proposes a new lightweight algorithm for detecting Sybil attack in Mobile Wireless Sensor Networks
using sink nodes. The proposed algorithm is implemented to be assessed in terms of detection and error rates efficiency in a series of
experiments. Comparison of the experiment results with the results of other available algorithms revealed optimal performance of the
proposed algorithm.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDr.Irshad Ahmed Sumra
In this
respect, the network availability is exposed to many types of attacks.
In this paper, Denial of Service (DOS) attack on network availability
is presented and its severity level in VANET environment is
elaborated. A model to secure the VANET from the DOS attacks has been developed and some possible solutions to overcome the attacks have been discussed.
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...Dr.Irshad Ahmed Sumra
Road accident and traffic congestion are global issues faced by many countries around the world. Road accident led to fatalities and injuries, while traffic congestion led to inconvenient driving and fuel energy wastage. Vehicular Ad hoc Network (VANET), as part of Intelligent Transportation System (ITS), has the ability to provide safety and non-safety applications to users on roads for safe, reliable and comfort driving. In this paper, propose an integrated multi-level Security model and core purpose of this model is to provide the resiliency against malicious attack and aim to reduce incidents of road accidents, as well as to ease traffic congestion.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANETIJNSA Journal
Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed key infrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular ad hoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationIJERA Editor
VANET provide facility for the vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages to other vehicles. However, this raises the issue of security and privacy. Here, we have described various existing solutions/protocols that are used in order to satisfy the security and privacy requirement of the vehicular ad hoc network. We have also described security issues and challenges in VANET. We have presented various security attributes that may be considered as criteria to measure security such as availability, confidentiality, integrity, authentication and non-repudiation. This paper also give the detail information of some of the schemes such as RAISE ,IBV with their pros and cons.
VANET is next generation vehicular network and
its applications will be play key to safe human life while journey
on highway. Security is one of the key prominent factors for
implement VANET in real environment.In this survey paper, discuss in detail the various computing methods and illustrate the relationship with vehicular network. Using these computing
methods to secure the vehicular network from attackers and
attacks.
Vehicular Ad Hoc Networks (VANETs) are based on network technology where cars act as mobile nodes to form a communication network. In VANETs, routing protocols have a significance regarding the overall network performance since they determine the way of sending and receiving packets between mobile nodes. Most of the protocols proposed for VANETs are adapted from Mobile ad hoc networks (MANETs) routing protocols. However, due to the specific characteristics of VANETs, especially high mobility, and dynamic topology, the routing protocols in ad hoc networks do not adapt immediately to VANETs. Therefore, secure routing of Vehicular ad hoc networks (VANETs) against attacks, which are of various types, is still a challenging issue. This paper is going to present a synthesis of the most relevant protocols that have addressed the secure routing issue in VANETs. It also establishes a comparison regarding the offered features and the studied performance aspects through which it is notified that a security mechanism depends not only on the level of efficiency but also on the network constraints.
VANET SECURITY AND PRIVACY – AN OVERVIEWIJNSA Journal
Even though vehicular ad-hoc networks (VANETs) bring tremendous benefits to society, yet they raise
many challenges where the security and privacy concerns are the most critical ones. In this paper, we
provide a detailed overview of the state-of-the-art security and privacy requirements in VANET. Also, a
brief of the approachesthat are proposed in the literature to fulfil these requirements is given in this paper.
Besides that, a classification of the various VANET attacks based on the communication system
layersisprovided in this paper. In addition, the different types of VANET adversaries and attackers
arepresented here.In general, this paper aims to provide a good piece of information about VANET
security and privacy, in order to be used as a tool to help researchers in this field in developing secure
privacy-preserving approaches for VANET.
VANET SECURITY AND PRIVACY – AN OVERVIEWIJNSA Journal
Even though vehicular ad-hoc networks (VANETs) bring tremendous benefits to society, yet they raise
many challenges where the security and privacy concerns are the most critical ones. In this paper, we
provide a detailed overview of the state-of-the-art security and privacy requirements in VANET. Also, a
brief of the approachesthat are proposed in the literature to fulfil these requirements is given in this paper.
Besides that, a classification of the various VANET attacks based on the communication system
layersisprovided in this paper. In addition, the different types of VANET adversaries and attackers
arepresented here.In general, this paper aims to provide a good piece of information about VANET
security and privacy, in order to be used as a tool to help researchers in this field in developing secure
privacy-preserving approaches for VANET.
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Dr.Irshad Ahmed Sumra
in this slide, it will discuss two new types of attacks which are called road side traffic signal attack and also Internet attack in vehicular network. The authors will explain an attacker‟s behaviour and how he/she will launch an attack on a road side traffic signal and Internet services and create problems for other users of network. Through different scenarios, it will explain the
effect of these attacks on other components of network.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...IJCI JOURNAL
ith the recent advancements in and popularity of wireless ne
tworks, the security based issues are also
increasing considerably. In this paper, we look at the data s
ecurity and situational security vulnerabilities
in the communication network for fishermen at sea being develope
d by our research center. We are
proposing certain solutions and algorithms for avoiding some of the si
tuations. They are Adaptive Context-
aware Transmission Power Control (ACTPC) as a proposed solution
for preventing unauthorized users at
the maritime border, along with border alert and distress alert. Th
e algorithms are implemented using a
network of MICAz mote
A Survey on Vehicle to Infrastructure Communication SystemIOSR Journals
Abstract: Vehicle-to-Infrastructure (V2I) Communications for Safety is the wireless exchange of critical safety
and operational data between vehicles and roadway infrastructure, intended primarily to avoid motor vehicle
crashes. Vehicle-to-infrastructure (V2I) communication based on wireless local area network (WLAN) IEEE
802.11 standard technology can support user in-motion to achieve preferable Internet connectivity. This
standard is created for urgent short message transmission.The IEEE 802.11 standard defines an infracture
mode with at least one central access point connected to a wired network. In this paper we present an
experimental study of IEEE802.11g using off-the-shelf devices in vehicle-to-infrastructure small scale scenario.
In order to evaluate the V2I the type of communication in large scale scenario and intelligent transportation
systems (ITS) will necessitate wireless vehicle-to-infrastructure (V2I) communica-tions. This wireless link can
be implemented by several technolo-gies, such as digital broadcasting, cellular communication, or dedicated
short range communication (DSRC) systems. Analyses of the coverage and capacity requirements are presented
when each of the three systems are used to implement the V2I link
Keywords: Short Range Vehicle Network; 802.11g; wireless network; goodput; network performance;
transport; mobile stations; auto traffic; vehicle speed
In this Slide, the role of the end user in a vehicular network will be discussed in detail and three levels of trust grades for users will be proposed. It is necessary for secure vehicular communication that the user’s role in the network should be in a positive direction, and other users should take more benefits from this new future technology.
In vehicular ad hoc network (VANETs), the applications mainly focused on the road challenging subclass of Mobile Ad-hoc Network, which empowers smart transmission among vehicles and between vehicles and roadside frameworks. It is an optimistic methodology for the Intelligent Transport System (ITS). There are numerous difficulties to be tended while utilizing VANET. It is flexible and has a high dynamic topology and flexibility which makes the conventional MANET protocols unacceptable for VANET. Trust is a principal element which is used to create a trustful environment to improve the security in vehicular networks. Trust can be calculated by observing the human behavior which creates a trusted communicating environment. In this paper, we define the architecture of VANET, then the communication establishment and various challenges. Some trust models had been defined in this paper to enforce honest information sharing between communicating nodes. Trust establishment is compulsory among communicating vehicles to build a secure messages exchange and reliability.
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...Dr.Irshad Ahmed Sumra
Road accident and traffic congestion are global issues faced by many countries around the world. Road accident led to fatalities and injuries, while traffic congestion led to inconvenient driving and fuel energy wastage. Vehicular Ad hoc Network (VANET), as part of Intelligent Transportation System (ITS), has the ability to provide safety and non-safety applications to users on roads for safe, reliable and comfort driving. In this paper, propose an integrated multi-level Security model and core purpose of this model is to provide the resiliency against malicious attack and aim to reduce incidents of road accidents, as well as to ease traffic congestion.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANETIJNSA Journal
Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed key infrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular ad hoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationIJERA Editor
VANET provide facility for the vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages to other vehicles. However, this raises the issue of security and privacy. Here, we have described various existing solutions/protocols that are used in order to satisfy the security and privacy requirement of the vehicular ad hoc network. We have also described security issues and challenges in VANET. We have presented various security attributes that may be considered as criteria to measure security such as availability, confidentiality, integrity, authentication and non-repudiation. This paper also give the detail information of some of the schemes such as RAISE ,IBV with their pros and cons.
VANET is next generation vehicular network and
its applications will be play key to safe human life while journey
on highway. Security is one of the key prominent factors for
implement VANET in real environment.In this survey paper, discuss in detail the various computing methods and illustrate the relationship with vehicular network. Using these computing
methods to secure the vehicular network from attackers and
attacks.
Vehicular Ad Hoc Networks (VANETs) are based on network technology where cars act as mobile nodes to form a communication network. In VANETs, routing protocols have a significance regarding the overall network performance since they determine the way of sending and receiving packets between mobile nodes. Most of the protocols proposed for VANETs are adapted from Mobile ad hoc networks (MANETs) routing protocols. However, due to the specific characteristics of VANETs, especially high mobility, and dynamic topology, the routing protocols in ad hoc networks do not adapt immediately to VANETs. Therefore, secure routing of Vehicular ad hoc networks (VANETs) against attacks, which are of various types, is still a challenging issue. This paper is going to present a synthesis of the most relevant protocols that have addressed the secure routing issue in VANETs. It also establishes a comparison regarding the offered features and the studied performance aspects through which it is notified that a security mechanism depends not only on the level of efficiency but also on the network constraints.
VANET SECURITY AND PRIVACY – AN OVERVIEWIJNSA Journal
Even though vehicular ad-hoc networks (VANETs) bring tremendous benefits to society, yet they raise
many challenges where the security and privacy concerns are the most critical ones. In this paper, we
provide a detailed overview of the state-of-the-art security and privacy requirements in VANET. Also, a
brief of the approachesthat are proposed in the literature to fulfil these requirements is given in this paper.
Besides that, a classification of the various VANET attacks based on the communication system
layersisprovided in this paper. In addition, the different types of VANET adversaries and attackers
arepresented here.In general, this paper aims to provide a good piece of information about VANET
security and privacy, in order to be used as a tool to help researchers in this field in developing secure
privacy-preserving approaches for VANET.
VANET SECURITY AND PRIVACY – AN OVERVIEWIJNSA Journal
Even though vehicular ad-hoc networks (VANETs) bring tremendous benefits to society, yet they raise
many challenges where the security and privacy concerns are the most critical ones. In this paper, we
provide a detailed overview of the state-of-the-art security and privacy requirements in VANET. Also, a
brief of the approachesthat are proposed in the literature to fulfil these requirements is given in this paper.
Besides that, a classification of the various VANET attacks based on the communication system
layersisprovided in this paper. In addition, the different types of VANET adversaries and attackers
arepresented here.In general, this paper aims to provide a good piece of information about VANET
security and privacy, in order to be used as a tool to help researchers in this field in developing secure
privacy-preserving approaches for VANET.
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Dr.Irshad Ahmed Sumra
in this slide, it will discuss two new types of attacks which are called road side traffic signal attack and also Internet attack in vehicular network. The authors will explain an attacker‟s behaviour and how he/she will launch an attack on a road side traffic signal and Internet services and create problems for other users of network. Through different scenarios, it will explain the
effect of these attacks on other components of network.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...IJCI JOURNAL
ith the recent advancements in and popularity of wireless ne
tworks, the security based issues are also
increasing considerably. In this paper, we look at the data s
ecurity and situational security vulnerabilities
in the communication network for fishermen at sea being develope
d by our research center. We are
proposing certain solutions and algorithms for avoiding some of the si
tuations. They are Adaptive Context-
aware Transmission Power Control (ACTPC) as a proposed solution
for preventing unauthorized users at
the maritime border, along with border alert and distress alert. Th
e algorithms are implemented using a
network of MICAz mote
A Survey on Vehicle to Infrastructure Communication SystemIOSR Journals
Abstract: Vehicle-to-Infrastructure (V2I) Communications for Safety is the wireless exchange of critical safety
and operational data between vehicles and roadway infrastructure, intended primarily to avoid motor vehicle
crashes. Vehicle-to-infrastructure (V2I) communication based on wireless local area network (WLAN) IEEE
802.11 standard technology can support user in-motion to achieve preferable Internet connectivity. This
standard is created for urgent short message transmission.The IEEE 802.11 standard defines an infracture
mode with at least one central access point connected to a wired network. In this paper we present an
experimental study of IEEE802.11g using off-the-shelf devices in vehicle-to-infrastructure small scale scenario.
In order to evaluate the V2I the type of communication in large scale scenario and intelligent transportation
systems (ITS) will necessitate wireless vehicle-to-infrastructure (V2I) communica-tions. This wireless link can
be implemented by several technolo-gies, such as digital broadcasting, cellular communication, or dedicated
short range communication (DSRC) systems. Analyses of the coverage and capacity requirements are presented
when each of the three systems are used to implement the V2I link
Keywords: Short Range Vehicle Network; 802.11g; wireless network; goodput; network performance;
transport; mobile stations; auto traffic; vehicle speed
In this Slide, the role of the end user in a vehicular network will be discussed in detail and three levels of trust grades for users will be proposed. It is necessary for secure vehicular communication that the user’s role in the network should be in a positive direction, and other users should take more benefits from this new future technology.
In vehicular ad hoc network (VANETs), the applications mainly focused on the road challenging subclass of Mobile Ad-hoc Network, which empowers smart transmission among vehicles and between vehicles and roadside frameworks. It is an optimistic methodology for the Intelligent Transport System (ITS). There are numerous difficulties to be tended while utilizing VANET. It is flexible and has a high dynamic topology and flexibility which makes the conventional MANET protocols unacceptable for VANET. Trust is a principal element which is used to create a trustful environment to improve the security in vehicular networks. Trust can be calculated by observing the human behavior which creates a trusted communicating environment. In this paper, we define the architecture of VANET, then the communication establishment and various challenges. Some trust models had been defined in this paper to enforce honest information sharing between communicating nodes. Trust establishment is compulsory among communicating vehicles to build a secure messages exchange and reliability.
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
Vehicular ad-hoc networks (VANETs) technology has turned out as a vital research field throughout the most recent couple of years. VANETs are the likely an impacting way to deal with giving security of driver and different applications for the activity conditions and additionally travelers. Being dynamic in nature, it created the network, according to the condition and requirement of the users and provides consistent communication between the vehicles. Due to its excessive advantages, it is highly susceptible to numerous attacks and security in VANET should be taken into consideration. This paper presented the security issues such as authenticity, integrity, availability, confidentiality, anonymity and non-repudiation to provide the secure communication between Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I). Numerous research works have been done to recover the performance and security of this network. The fundamental point of this paper is the several security challenges and the applications of VANETs.
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
Recently, vehicular ad hoc networks (VANETs) have been garnering
significant inter-est from the people involved in transportation field.
Nowadays automotive manufactur-ers have already supplying vehicles with
multitude of road sensors that provides many useful characteristics. VANET
communication not only offers the drivers and passen-gers with the various
safety related services but also provides a wide range of valuable
applications. However, the inherent openness of the wireless communication
medium used by VANETs exposes vehicles to various security and privacy
issues. Researchers have proposed many security schemes to solve the issues
mentioned above for the widespread deployment of VANETs. However,
these schemes failed to fulfill all as-pects of security and privacy
requirements. Besides, these schemes have not provided the performance
parameters such as computation and communication costs. The pri-mary
emphasis of this paper is on the taxonomy of security schemes based
conditional privacy-preserving with respect to strengths and limitations.
Besides, a comparison be-tween these schemes related to the model of
security and privacy requirements, attacks, and performance parameters is
provided. Finally, this paper critically reviews the re-lated works by taking
into consideration the design and development of all VANETs security and
privacy schemes, this paper could serve as a guide and reference.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes.
Challenging Issues in VANET Network and its Routing Algorithms-An Analysisidescitation
Vehicular Ad hoc Network (VANET), a rapidly
deployed wireless network, is a subclass of mobile ad hoc
networks (MANET) that uses multi-hop routing to provide
network connectivity among vehicles (V2V) or vehicle to road-
side equipments (V2R). VANETs have received increasing
research attention in recent years because of its vast
applications like safety, comfort and entertainment. Variations
with time in network topology impose new challenges for
routing protocols in such networks as traditional routing
protocols are not suitable for VANETs. This work is an attempt
to figure out the challenges in VANET comprehensively in
conjunction with the recommended routing protocols by
comparing the existing routing protocols with respect to
existing challenges.
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
Designing a protocol structure which contains the control system, VANET device and the type of communication message structures which will implement the message packets for v2v or v2I infrastructure . The different message packets contain the information required to transfer from one node to another in vehicular network for communication. Design various algorithm required for Control, Alert and Infotainment messages. Time stamping lowering data rate efficient packet delivery and proper communication of required messages. Implementation of proposed algorithms and comparison of them with existing algorithms and study of different factors affecting the working of theses algorithms. Analysis of proposed design approach and improvements in results if required.
Recent advances in wireless networks have led to the introduction of a new type of networks called Vehicular Networks. Vehicular Ad Hoc Network (VANET) is a form of Mobile Ad Hoc Networks (MANET). VANETs provide us with the infrastructure for developing new systems to enhance drivers’ and passengers’ safety and comfort. VANETs are distributed self organizing networks formed between moving vehicles equipped with wireless communication devices. This type of networks is developed as part of the Intelligent Transportation Systems (ITS) to bring significant improvement to the transportation systems performance. One of the main goals of the ITS is to improve safety on the roads, and reduce traffic congestion, waiting times, and fuel consumptions. The integration of the embedded computers, sensing devices, navigation systems (GPS), digital maps, and the wireless communication devices along with intelligent algorithms will help to develop numerous types of applications for the ITS to improve safety on the roads. The up to date information provided by the integration of all these systems helps drivers to acquire real-time information about road conditions allowing them to react on time. For example, warning messages sent by vehicles involved in an accident enhances traffic safety by helping the approaching drivers to take proper decisions before entering the crash dangerous zone (ElBatt et al., 2006) (Xu et al., 2007). And Information about the current transportation conditions facilitate driving by taking new routes in case of congestion, thus saving time and adjusting fuel consumption (Dashtinezhad et al., 2004) (Nadeem et al., 2004). In addition to safety concerns, VANET can also support other non-safety applications that require a Quality of Service (QoS) guarantee. This includes Multimedia (e.g., audio/video) and data (e.g., toll collection, internet access, weather/maps/ information) applications.
Vehicular networks are composed of mobile nodes, vehicles equipped with On Board Units (OBU), and stationary nodes called Road Side Units (RSU) attached to infrastructure that will be deployed along the roads.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETIJNSA Journal
Vehicular Ad hoc Networks (VANETs) are the promising approach to provide safety and other applications
to the drivers as well as passengers. It becomes a key component of the intelligent transport system. A lot of
works have been done towards it but security in VANET got less attention. In this article, we have discussed
about the VANET and its technical and security challenges. We have also discussed some major attacks
and solutions that can be implemented against these attacks. We have compared the solution using different
parameters. Lastly we have discussed the mechanisms that are used in the solutions.
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETIJNSA Journal
Vehicular Ad hoc Networks (VANETs) are the promising approach to provide safety and other applications to the drivers as well as passengers. It becomes a key component of the intelligent transport system. A lot of works have been done towards it but security in VANET got less attention. In this article, we have discussed about the VANET and its technical and security challenges. We have also discussed some major attacks and solutions that can be implemented against these attacks. We have compared the solution using different parameters. Lastly we have discussed the mechanisms that are used in the solutions.
Abstract: Vehicular Ad hoc Networks (VANETs), a subclass of mobile ad hoc network (MANET), is a
promising approach for the intelligent transport system (ITS). VANET allows vehicles to form a self-organized
network without the need for a permanent infrastructure. As the VANET has a potential in improving road
safety, real time traffic update and other travel comforts, it turns attention of the researcher. Though VANET
and MANET shares some common characteristics like self-organized network, dynamic topology, ad hoc nature
etc, VANET differs from MANET by challenges, application, architecture, power constraint and mobility
patterns, so routing protocols used in MANET are not applicable with VANET. New routing strategy for VANET
has been proposed by many researchers in recent year. This paper provides focus on the various aspects of
VANET like architecture, characteristic, challenges, glimpse of routing protocols, and simulation models used
for VANET.
Keywords: Vehicular Ad hoc Networks; routing; position based routing; characteristics; transmission strategies
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This study focused on the practice of using computing resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements. Studies have shown that costs of power utilized by IT departments can approach 50% of the overall energy costs for an organization. While there is an expectation that green IT should lower costs and the firm’s impact on the environment, there has been far less attention directed at understanding the strategic benefits of sustainable IT services in terms of the creation of customer value, business value and societal value. This paper provides a review of the literature on sustainable IT, key areas of focus, and identifies a core set of principles to guide sustainable IT service design.
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
Computers today are an integral part of individuals’ lives all around the world, but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment -friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Nigeria and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Nigeria to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
The optimal sizing and placement of Distributed Generation units (DG) are becoming very attractive to researchers these days. In this paper a two stage approach has been used for allocation and sizing of DGs in distribution system with time varying load model. The strategic placement of DGs can help in reducing energy losses and improving voltage profile. The proposed work discusses time varying loads that can be useful for selecting the location and optimizing DG operation. The method has the potential to be used for integrating the available DGs by identifying the best locations in a power system. The proposed method has been demonstrated on 9-bus test system.
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
Early detection of diabetes mellitus (DM) can prevent or inhibit complication. There are several laboratory test that must be done to detect DM. The result of this laboratory test then converted into data training. Data training used in this study generated from UCI Pima Database with 6 attributes that were used to classify positive or negative diabetes. There are various classification methods that are commonly used, and in this study three of them were compared, which were fuzzy KNN, C4.5 algorithm and Naïve Bayes Classifier (NBC) with one identical case. The objective of this study was to create software to classify DM using tested methods and compared the three methods based on accuracy, precision, and recall. The results showed that the best method was Fuzzy KNN with average and maximum accuracy reached 96% and 98%, respectively. In second place, NBC method had respective average and maximum accuracy of 87.5% and 90%. Lastly, C4.5 algorithm had average and maximum accuracy of 79.5% and 86%, respectively.
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
Study in the Competitive field of Intelligent, and studies in the field of Web Scraping, have a symbiotic relationship mutualism. In the information age today, the website serves as a main source. The research focus is on how to get data from websites and how to slow down the intensity of the download. The problem that arises is the website sources are autonomous so that vulnerable changes the structure of the content at any time. The next problem is the system intrusion detection snort installed on the server to detect bot crawler. So the researchers propose the use of the methods of Mining Data Records and the method of Exponential Smoothing so that adaptive to changes in the structure of the content and do a browse or fetch automatically follow the pattern of the occurrences of the news. The results of the tests, with the threshold 0.3 for MDR and similarity threshold score 0.65 for STM, using recall and precision values produce f-measure average 92.6%. While the results of the tests of the exponential estimation smoothing using ? = 0.5 produces MAE 18.2 datarecord duplicate. It slowed down to 3.6 datarecord from 21.8 datarecord results schedule download/fetch fix in an average time of occurrence news.
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
Most of the existing semantic similarity measures that use ontology structure as their primary source can measure semantic similarity between concepts/classes using single ontology. The ontology-based semantic similarity techniques such as structure-based semantic similarity techniques (Path Length Measure, Wu and Palmer’s Measure, and Leacock and Chodorow’s measure), information content-based similarity techniques (Resnik’s measure, Lin’s measure), and biomedical domain ontology techniques (Al-Mubaid and Nguyen’s measure (SimDist)) were evaluated relative to human experts’ ratings, and compared on sets of concepts using the ICD-10 “V1.0” terminology within the UMLS. The experimental results validate the efficiency of the SemDist technique in single ontology, and demonstrate that SemDist semantic similarity techniques, compared with the existing techniques, gives the best overall results of correlation with experts’ ratings.
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
The techniques and tests are tools used to define how measure the goodness of ontology or its resources. The similarity between biomedical classes/concepts is an important task for the biomedical information extraction and knowledge discovery. However, most of the semantic similarity techniques can be adopted to be used in the biomedical domain (UMLS). Many experiments have been conducted to check the applicability of these measures. In this paper, we investigate to measure semantic similarity between two terms within single ontology or multiple ontologies in ICD-10 “V1.0” as primary source, and compare my results to human experts score by correlation coefficient.
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
This is an effective way to improve the storage access performance of small files in Openstack Swift by adding an aggregate storage module. Because Swift will lead to too much disk operation when querying metadata, the transfer performance of plenty of small files is low. In this paper, we propose an aggregated storage strategy (ASS), and implement it in Swift. ASS comprises two parts which include merge storage and index storage. At the first stage, ASS arranges the write request queue in chronological order, and then stores objects in volumes. These volumes are large files that are stored in Swift actually. During the short encounter time, the object-to-volume mapping information is stored in Key-Value store at the second stage. The experimental results show that the ASS can effectively improve Swift's small file transfer performance.
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
Efficient management and control of government's cash resources rely on government banking arrangements. Nigeria, like many low income countries, employed fragmented systems in handling government receipts and payments. Later in 2016, Nigeria implemented a unified structure as recommended by the IMF, where all government funds are collected in one account would reduce borrowing costs, extend credit and improve government's fiscal policy among other benefits to government. This situation motivated us to embark on this research to design and implement an integrated system for vehicle clearance and registration. This system complies with the new Treasury Single Account policy to enable proper interaction and collaboration among five different level agencies (NCS, FRSC, SBIR, VIO and NPF) saddled with vehicular administration and activities in Nigeria. Since the system is web based, Object Oriented Hypermedia Design Methodology (OOHDM) is used. Tools such as Php, JavaScript, css, html, AJAX and other web development technologies were used. The result is a web based system that gives proper information about a vehicle starting from the exact date of importation to registration and renewal of licensing. Vehicle owner information, custom duty information, plate number registration details, etc. will also be efficiently retrieved from the system by any of the agencies without contacting the other agency at any point in time. Also number plate will no longer be the only means of vehicle identification as it is presently the case in Nigeria, because the unified system will automatically generate and assigned a Unique Vehicle Identification Pin Number (UVIPN) on payment of duty in the system to the vehicle and the UVIPN will be linked to the various agencies in the management information system.
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
The Supermarket Management System deals with the automation of buying and selling of good and services. It includes both sales and purchase of items. The project Supermarket Management System is to be developed with the objective of making the system reliable, easier, fast, and more informative.
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
Energy is a key component in the Wireless Sensor Network (WSN)[1]. The system will not be able to run according to its function without the availability of adequate power units. One of the characteristics of wireless sensor network is Limitation energy[2]. A lot of research has been done to develop strategies to overcome this problem. One of them is clustering technique. The popular clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH)[3]. In LEACH, clustering techniques are used to determine Cluster Head (CH), which will then be assigned to forward packets to Base Station (BS). In this research, we propose other clustering techniques, which utilize the Social Network Analysis approach theory of Betweeness Centrality (BC) which will then be implemented in the Setup phase. While in the Steady-State phase, one of the heuristic searching algorithms, Modified Bi-Directional A* (MBDA *) is implemented. The experiment was performed deploy 100 nodes statically in the 100x100 area, with one Base Station at coordinates (50,50). To find out the reliability of the system, the experiment to do in 5000 rounds. The performance of the designed routing protocol strategy will be tested based on network lifetime, throughput, and residual energy. The results show that BC-MBDA * is better than LEACH. This is influenced by the ways of working LEACH in determining the CH that is dynamic, which is always changing in every data transmission process. This will result in the use of energy, because they always doing any computation to determine CH in every transmission process. In contrast to BC-MBDA *, CH is statically determined, so it can decrease energy usage.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
Report handling on "LAPOR!" (Laporan, Aspirasi dan Pengaduan Online Rakyat) system depending on the system administrator who manually reads every incoming report [3]. Read manually can lead to errors in handling complaints [4] if the data flow is huge and grows rapidly, it needs at least three days to prepare a confirmation and it sensitive to inconsistencies [3]. In this study, the authors propose a model that can measure the identities of the Query (Incoming) with Document (Archive). The authors employed Class-Based Indexing term weighting scheme, and Cosine Similarities to analyse document similarities. CoSimTFIDF, CoSimTFICF and CoSimTFIDFICF values used in classification as feature for K-Nearest Neighbour (K-NN) classifier. The optimum result evaluation is pre-processing employ 75% of training data ratio and 25% of test data with CoSimTFIDF feature. It deliver a high accuracy 84%. The k = 5 value obtain high accuracy 84.12%
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
Application of 3D Printing in EducationEditor IJCATR
This paper provides a review of literature concerning the application of 3D printing in the education system. The review identifies that 3D Printing is being applied across the Educational levels [1] as well as in Libraries, Laboratories, and Distance education systems. The review also finds that 3D Printing is being used to teach both students and trainers about 3D Printing and to develop 3D Printing skills.
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
In underwater environment, for retrieval of information the routing mechanism is used. In routing mechanism there are three to four types of nodes are used, one is sink node which is deployed on the water surface and can collect the information, courier/super/AUV or dolphin powerful nodes are deployed in the middle of the water for forwarding the packets, ordinary nodes are also forwarder nodes which can be deployed from bottom to surface of the water and source nodes are deployed at the seabed which can extract the valuable information from the bottom of the sea. In underwater environment the battery power of the nodes is limited and that power can be enhanced through better selection of the routing algorithm. This paper focuses the energy-efficient routing algorithms for their routing mechanisms to prolong the battery power of the nodes. This paper also focuses the performance analysis of the energy-efficient algorithms under which we can examine the better performance of the route selection mechanism which can prolong the battery power of the node
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
The designing of routing algorithms faces many challenges in underwater environment like: propagation delay, acoustic channel behaviour, limited bandwidth, high bit error rate, limited battery power, underwater pressure, node mobility, localization 3D deployment, and underwater obstacles (voids). This paper focuses the underwater voids which affects the overall performance of the entire network. The majority of the researchers have used the better approaches for removal of voids through alternate path selection mechanism but still research needs improvement. This paper also focuses the architecture and its operation through merits and demerits of the existing algorithms. This research article further focuses the analytical method of the performance analysis of existing algorithms through which we found the better approach for removal of voids
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
In this paper we consider the initial value problem for a plate type equation with variable coefficients and memory in
1 n R n ), which is of regularity-loss property. By using spectrally resolution, we study the pointwise estimates in the spectral
space of the fundamental solution to the corresponding linear problem. Appealing to this pointwise estimates, we obtain the global
existence and the decay estimates of solutions to the semilinear problem by employing the fixed point theorem
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
How world-class product teams are winning in the AI era by CEO and Founder, P...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Challenges, and Impacts
1. International Journal of Computer Applications Technology and Research
Volume 3– Issue 5, 284 - 291, 2014
www.ijcat.com 284
A Study of Sybil and Temporal Attacks in Vehicular Ad
Hoc Networks: Types, Challenges, and Impacts
Deepika Shrivastava Ankur Pandey
DCEA, NITTTR DCEA, NITTTR
Bhopal, India Bhopal, India
Abstract: In recent years, the number of automobiles on the road has increased tremendously. Due to high density and mobility of vehicles,
possible threats and road accidents are increasing. Wireless communication allows sending safety and other critical information. Due to this
inherent wireless characteristic and periodic exchange of safety packets, Vehicular Ad-hoc Network (VANET) is vulnerable to number of
security threats like Sybil attack or temporal attack. In this paper, a detailed discussion has been done on both the type of attacks. With the
help of already published works, some approaches have also been studied which have proved to be of significance in detection of these
attacks.
Keywords: attacks; malicious; OBU; RSU; VANET
1 INTRODUCTION
During the past few years, there has been very rapid growth in
wireless communication which has provided number of
opportunity in computer networking aiming for data transfer
where wired communication cannot be imagined in the real
world. Wireless communication has provided the ability to
communicate with the mobile devices in the continuously
changing topology. This wireless communication of mobile
devices has led to the creation of the term MANETs (Mobile Ad
Hoc Networks).
Vehicular Ad Hoc Networks (VANET) is a special class of
MANET where communicating nodes are vehicles. An ad hoc
network [1] consists of group of nodes that can transmit and
receive information with each other through wireless medium,
either with a fixed infrastructure with or without any centralized
management. Each node performs the functioning of router also.
VANET differs from MANET due to its unique characteristics.
Connections between vehicles are short lived. Network topology
is dynamic, nodes move in and out of the range of neighboring
nodes very quickly. Density of network also changes
dynamically.
1.1 VANET vs. MANET
Unlike MANETs, the vehicle's mobility in VANETs is restricted
by predefined roads. Vehicle's velocities are also restricted due
to level of congestion on the roads, speed limitation, and traffic
control mechanisms. In addition, given the fact that future
vehicles can be equipped with devices with potentially longer
transmission ranges, rechargeable source of energy, and
extensive onboard storage capacities, processing power and
storage efficiency are not an issue in VANETs whereas, this
issues exits in MANETs. From these features, VANETs are
considered as an extremely flexible and relatively “easy-to-
manage” network pattern of MANETs.
1.2 VANET Model
A Vehicle deployed in the network contains following
components. These components are displayed in Figure 1.
Figure 1. VANET Model
A GPS navigation system
Microwave radar that can detect objects at certain
distance
A computing unit, which will provide data processing,
computing and storage
A wireless transceiver, which provides standard
communication for VANET
A unique ID, such as an electronic license plate
1.3 Features of VANET
Some of the important features of the VANET are listed below:
The movements of these nodes are very fast
The movements of nodes are restricted by road topology
Vehicle acts as transceiver i.e. sending and receiving at the
same time while creating a highly dynamic and continuously
changing network.
The vehicular density varies from time to time. For example,
density gets increased during day time and decrease at night.
2. International Journal of Computer Applications Technology and Research
Volume 3– Issue 5, 284 - 291, 2014
www.ijcat.com 285
2 APPLICATIONS OF VANET
The safety and security approaches of VANET have led its
existence into number of applications. Figure 2 shows some of
the most common applications of the VANET.
Figure 2. Applications of VANET
2.1 Increase Traveler Safety
VANET senses and provides information like intersection
collision warning, lane change warning, emergency brake
applied by the front vehicle warning, curve turn warning, etc,
which effects the travelers safety. Traveler can take the proper
measures to avoid unwanted situations like slowdown the
vehicle.
2.2 Traffic Information
Warning related to traffic jams ahead, traffic signals, emergency
vehicle approaching, availability of parking slot, etc, which
certainly reduces the travel time and fuel consumption.
2.3 Road Condition and weather Info.
Notification of damaged road, spreading of oil, speed breaker,
slippery road, weather information, landslides in the mountain
regions assists the passenger to handle the unknowing situation.
2.4 Internet Access via RSUs
One can browse internet, check mail, find restaurants, gas
stations, etc, in the nearby area along the road. A Roadside
Services Database will be installed from the local area that will
be connected to the corresponding RSUs. It thus increases the
onboard luxury. Passengers may share some common interests,
chat and children can play online games etc.
2.5 Electronic Toll Collection
Non-safety applications increase the overall comfort of the
driver. Electronic toll collection and parking lot payment are few
possible non-safety applications. Instead of driver having to stop
at each and every toll booth to make a payment, the payment
will be made electronically through the network. Also, a number
of entertainment features have been proposed for vehicular
networks, such as transferring of music and video files for in-car
entertainment.
3 COMMUNICATION IN VANET
VANET communication is used to improve vehicle's passenger
safety by means of inter-vehicle communication. In Vehicular
Ad Hoc Network, communication is based on Dedicated Short
Range Communication (DSRC) band [5]. The two types of
communication devices employed in VANETs are as shown in
Figure 3 –
Figure 3. Communication Devices Deployed in VANET
Vehicles or On Board Units (OBUs)
Road Side Units (RSUs) are fixed infrastructure on the
road
3.1 VANET Architecture
An instance of the architecture of vehicular network is as shown
in Figure 4.
Figure 4. VANET Architecture
Vehicle to Vehicle (V2V): Vehicles communicates
with each other through wireless medium.
Vehicle to Road side unit (V2R): Vehicles
communicates with fixed infrastructure via wireless
communication.
Road side unit to Road side unit (R2R): A RSU
communicates with another RSU through wired
channel.
3.2 Safety Message Transmission
VANET is needed for automated and intelligent Transportation
Systems (ITS). In the case of an accident, inter vehicle
communication can be used to warn other vehicles approaching
Communication
Devices
On Board
Units (OBU)
Road Side Units
(RSU)
3. International Journal of Computer Applications Technology and Research
Volume 3– Issue 5, 284 - 291, 2014
www.ijcat.com 286
the site. Each node in VANET periodically broadcasts beacon
packets to announce its presence to neighboring nodes. Each
beacon packet contains sender identity, position, time-stamp and
speed etc. A safety message is shown in Figure 5. The difference
between the beacon packets and safety packets is that the former
does not have warning field and safety packets are sent only on
the occurrence of specific event.
Figure 5. A Safety Message Format
Two kinds of message transmission take place in VANET –
Periodic messages or Beacon Packets: They are sent
with the intention of providing non-critical
information (e.g. Sender-ID, GPS position, speed,
direction etc). These packets are broadcasted at a
regular time interval.
Event-driven messages or Safety Packets: Event-
driven messages are those messages which are
generated on the occurrence of certain life critical
incident (e.g. lane change or braking of the front
vehicle)
3.3 Wireless Radio Channel
The wireless radio channel makes a great impact on the
reception of packets. Path loss and shadowing causes the
fluctuation in the received signal strength. Path loss [6] is caused
by dissipation of the power radiated by the transmitter as well as
due to the effects of the propagation channel. Shadowing is due
to obstacles between receiver and transmitter that attenuate
signal power through reflection, absorption, scattering and
refraction. Both path loss and shadowing are caused due to long
distances therefore they are considered as large-scale
propagation effects.
Multipath is due to the receiving of multiple components of the
signal. These components may be attenuated, delayed, shifted in
phase and/or frequency from the LOS (Line of Sight) signal path
at the receiver. Variations due to multipath are considered as
small-scale propagation effects as they are on the order of the
wave length. There exists number of different models for signal
propagation between the receiver and the transmitter. Some
models are mentioned below:
Free Space Model
Ground Reflection Model
Shadowing Model
Empirical Path Model
4 WIRELESS TECHNOLOGY IN VANET
Here the wireless technologies have been divided into two broad
categories. On one side, there are large area technologies as
GSM, GPRS or UMTS, which have moderate bandwidth. On the
other side, there is much higher bandwidth than the local area
technologies such as WLAN (Wireless Local Area Network).
There exist two different standards for Wireless LAN i.e.
HIPERLAN from European Telecommunications Standards
Institute (ETSI) and 802.11 from Institute of Electrical and
Electronics Engineers (IEEE).
Nowadays, the 802.11 standard totally dominates the market and
the implementing hardware is well engineered. Local Area
Networks (LAN) and Metropolitan Area Networks (MAN) are
standardized under the IEEE 802.11 WLAN protocols, which is
the part of the IEEE 802 family. The IEEE 802 family has
Internet Protocol (IP) layer with its routing protocols, e.g.
AODV or DSR for mobile ad hoc networks, Logical Link
Control layer (LLC), MAC (Medium Access Control) layer and
finally PHY (Physical) layer. Figure 6 shows the OSI layered
model of VANET.
Figure 6. OSI Model for Wireless Communications
The IEEE 802.11 standard is constructed for wireless local area
network technology (WLAN). Currently, 802.11 describe two
specific operational modes. These modes are infrastructural and
infrastructure-less based networks. The infrastructure-less based
networks has been generally termed as Ad-hoc networks. Ad-
hoc networks use Wi-Fi technology for Internet connectivity. It
relies on the information distributed through a cluster of
interconnected vehicles to transport, share, and receive
information. The IEEE 802.11p standard is the adaption of the
802.11 protocol for WAVE (Wireless Access in Vehicular
Environments).
5 SECURITY CONSTRAINTS IN VANET
There are number of challenges in implementing security
techniques in VANET. Few of the significant ones are listed
below:
5.1 Equilibrium between Authentication
and Privacy
For authentication of all message transmission, the identification
of the vehicle from which message has been sent is required to
track down. In general, people will not like to reveal their
privacy to others; therefore this has to come in equilibrium.
Therefore a system needs to be introduced which keeps the
balance between the authentication of message and privacy of an
individual.
4. International Journal of Computer Applications Technology and Research
Volume 3– Issue 5, 284 - 291, 2014
www.ijcat.com 287
5.2 High Mobility
Due to high mobility and rapidly changing topology, the
protocol cannot be based on handshaking. So, it's a real
challenge to implement and maintain the network.
5.3 Real-time Guarantees
As the major VANET applications are used for collision
avoidance, hazard warning and accident warning information, so
applications require strict deadlines for message delivery.
5.4 Central Authority
All the VANET nodes i.e. the vehicles are required to register
with a central authority and already have a unique identity in the
form of a license plate. Central Authority is a kind of
infrastructure which maintains records of all vehicles.
6 SAFETY REQUIREMENTS FOR VANET
There are many safety requirements which should be taken in
order to ensure safety of the passengers and the vehicle. Few
significant safety requirements are discussed below:
6.1 Authentication
Authentication is required in VANET to assure that the
messages are sent by the actual nodes. So, the effect of attack by
greedy drivers and other adversaries can be reduced to a greater
extent. Basic authentication scheme include attaching the
sender's identity, it raises privacy concerns, as it would allow
tracking of vehicles.
6.2 Message Integrity
This is required to ensure that the packet/data has not been
tampered or altered after it was generated. Integrity is not only
concerned with the original source of data but also whether it
has been modified since its creation.
6.3 Message Non-repudiation
In this security based system a sender cannot deny the fact
having sent the message. But that doesn't mean that everyone
can identify the sender only specific authorities should be
allowed to identify a vehicle from the authenticated messages it
sends [2].
6.4 Entity Authentication
It is required to ensures that the message received is not very old
i.e. the message is send within a very short period. It ensures
that the sender who has generated the message is still inside the
network.
6.5 Access Control
It specifies the roles and privileges to be given to the nodes in
the network and what each node can do in the network and what
messages can be generated by it.
6.6 Message Confidentiality
It is a system which is required when certain information need to
be kept private. This can only be done by the law enforcement
authority vehicles to communicate with each other to convey
private information. An example would be, to find the location
of a criminal or a terrorist.
6.7 Privacy
This system is used to ensure that the information is not leaked
to the unauthorized people who are not allowed to view the
information.
6.8 Real-time Guarantees
It is essential in a VANET, as many safety related applications
depend on strict time guarantees. This can be built into protocols
to ensure that the time sensitivity of safety related applications
such as collision avoidance is met.
7 ATTACKS ON VANET
Incorrect information sent by a malfunctioning or attacker node
might jeopardize the security and safety of the vehicles and
endangers other vehicle's approaching the site. Emergency
vehicle warning would have to be compromised without
assurance that transmission is done from an actual emergency
vehicle. Thus, it is challenging job to identify if the node
spreading traffic safety information is malicious or not.
7.1 Bogus Information
Attacker sends inaccurate information into the network in order
to achieve personal benefit. Selfish vehicles may attempt to clear
up the path ahead with false traffic reports to reach his
destination in the shortest possible time; criminals being chased
by the police may disseminate the bogus information to other
vehicles in order to block police cars, and terrorists may produce
serious traffic collisions with contradictory traffic
announcements.
7.2 Imposture
Attackers pretend or use other vehicle's identity to create
illusion. For example, a vehicle may pretend to be a fire brigade
or police car or ambulance van to free the traffic flow for its
benefits. This type of attack is usually performed to impersonate
a legitimate vehicle or RSU.
7.3 Denial-of-Service
Attacker may deny the other vehicles to use the VANET
network by channel jamming or aggressive injection of dummy
message.
8 TEMPORAL ATTACKS
Temporal attacks stands for time related attacks like, delay in
packet forwarding and repeating the packet sent at earlier time
interval. There are three types of temporal attacks. Each type of
temporal attack is explained below:
8.1 Replay Attack
An attacker can replay the received packets apart from acting as
a normal node (forwards all the received packets). In this attack,
packets are fraudulently repeated. This operation is carried out
by a malicious node that intercepts the safety packet and
retransmits it. This type of attack is usually performed to
impersonate a legitimate vehicle or RSU. Since, Basic 802.11
security does not contain sequence numbers; therefore it
provides no protection against replay. Because of keys can be
reused, it is possible to replay stored messages with the same
key without detection to insert bogus messages into the system.
5. International Journal of Computer Applications Technology and Research
Volume 3– Issue 5, 284 - 291, 2014
www.ijcat.com 288
A typical replay attack scenario in VANET is shown in Figure 7.
Attacker is repeatedly sending the message send by vehicle V1
to vehicle V2.
Figure 7. Packet Replay Attack
8.2 Delay Attack
In this attack, a vehicle delays the packet being forwarded by
certain time duration in the network. It is more harmful than
replay attack as vehicles may not get enough time to respond to
particular emergency situation. For Example: Attacker node Na
observes „CLEAR ROAD‟ ahead at time t0. Instead of
forwarding the „ROAD IS CLEAR‟ message to the other
vehicles in the road; it introduces the delay of time td. Suppose
after td time there is congestion in the road, but the attacker node
Na will forward the packet observed at time t0. The other vehicle
instead of decreasing the speed they will increase their speed
after receiving the delay message „TRAFFIC JAM‟. This will
lead to severe results like loss of life and property. Figure 8
shows the delay attack on VANET.
Figure 8. Packet Delay Attack
8.3 Suppression Attack
In this attack, an attacker selectively drops packets received
from the neighbors, these packets may hold critical safety
related information for the receiver, the attacker suppress or
block these packets and can use them again at later time [10].
Such type of attack can prevent warning messing to be
forwarded. For instance, an attacker may block a congestion
warning, so vehicles will not receive the warning and forced to
wait in the traffic for the long time. Figure 9 shows the
suppression attack on VANET.
Figure 9. Packet Suppression Attack
8.4 Related Work
This section explores the previous work done on temporal
attacks and their detection approaches in VANET. It is a normal
phenomenon to forward each received packet to neighboring
nodes VANET. Malicious nodes can adversely impact this
process by purposely interfering in-between the packet transfer
among the vehicles.
In [3] Aijaz et. al. have presented various types of attacks on
inter-vehicle communication systems. They analyzed how an
attacker can modify the sensor readings and the input of an on-
board unit (OBU). Here, the authors proposed plausibility
checks using constant system examinations, but no detailed
discussion on implementation of plausibility check is presented.
In [13] M. Raya and J.P. Hubaux have discussed number of
unique challenges in VANETs. They describe how adversaries
use safety applications to create various attacks and security
problems.
In [4] Nai-Wei et. al. have presented an illusion attack in
VANET. In this attack, a malicious node creates a particular
traffic situation and sends fraud traffic warning messages to
other nodes for convincing them that a traffic event has
occurred. To detect and defend against the illusion network,
plausibility validation network model is introduced in this paper.
However, they did not implement this attack and its defense
approach in any simulator. In [27] Yan et. al. have proposed a
position verification approach for detection of position related
misbehaviors.
In [28][29] Raya et. al. have suggested the use of VPKI
(Vehicular Public Key Infrastructure) as a solution, where each
node will have a public/private key. When a vehicle sends a
safety message, it signs it with its own private key and adds the
Certificate Authority (CAs) certificate. In [30] Ren et. al. have
proposed the use of the group signature, but the biggest
disadvantage of this method is its overhead because every time
any vehicle enters the group area, the group public key and the
vehicle session key for each vehicle that belongs to the group
must be changed and transmitted. Another issue is that VANET
mobility prevents the network from making a static group, as
topology is dynamic in nature.
In [14] Golle et. al. have proposed an approach to detect and
correct malicious data in VANET. They assume that vehicular
6. International Journal of Computer Applications Technology and Research
Volume 3– Issue 5, 284 - 291, 2014
www.ijcat.com 289
node is maintaining a model which consists of all the
information that nodes has about the network. When a node
receives a message, it compares received message with VANET
model. If the received message does not comply with the
VANET model, it is considered an invalid message. This
approach requires gathering of sufficient messages to perform
fraud message detection and suspicious data correction. The
VANET model used in this paper is predefined and not flexible
to switch to a new one. It is not feasible to design a model based
on global knowledge of the network. Schmidt et. al. [33]
constructs reputation models for other vehicles based on the
claims from sending vehicles. In this way, they create a model
of normal behavior of nodes in VANET. If the behavior of a
node differs from the normal behavior, it is marked as
suspicious.
9 SYBIL ATTACK
A Sybil attack is a type of attack in which a malicious node
illegitimately fabricates multiple vehicle identities. In a Sybil
attack, there are two types of nodes that are malicious node or
Sybil attacker and Sybil node as shown in Figure 10.
Figure 10. Nodes Participates in Sybil Attack
Malicious node/Sybil attacker: The node which spoofs
the identities of other nodes.
Sybil node: Additional identities created by the
malicious node are known as Sybil nodes.
Figure 11 shows the typical Sybil attack in VANET scenario.
Sybil attacker is spoofing the identities of A, B, and C. The
impact of Sybil attack gets severe when all identities created by
attacker participate simultaneously in the network. Sybil attack
is classified into two categories. Both of them are explained
below:
Case 1: When Sybil attacker creates the identities of actually
existing node in the network. Let N is the set of all vehicles in
VANET and S is the set of all Sybil nodes. In this case S⊆N.
Case 2: When Sybil attacker creates the identities from outside
the network. Let N is the set of all vehicles in VANET and S is
the set of all Sybil nodes. In this case S⊄N.
Figure 11. Sybil Attack in VANET
As messages are broadcast over the shared communication
media, it is easy for a malicious node to get additional identities
either by stealing or fabricating them. The main motive of Sybil
attack detection approach is to ensure that each physical node is
bound with only one valid identity.
9.1 Related Work
VANETs are vulnerable to many security threats and attacks.
Various types of attacks in VANET are presented in [3][4]. An
opponent or attacker may secretly listen on the channel easily
and modify or insert the wrong information in the network. It is
a normal phenomenon to forward each received packet to
neighboring nodes VANET. Malicious nodes can adversely
impact this process by purposely interfering in-between the
packet transfer among the vehicles. Sybil attack is one of the
major concerns in the VANET scenario. In Sybil attack, a
malicious node illegitimately spoofs the identities of other
nodes. It pretends or impersonates the original node to benefit
itself.
In [11], Douceur et. al. was the first to describe and
formalize the Sybil attack in the context of peer to peer
networks. It can easily defeat reputation and threshold protocols
intended to protect against it. In [12] resource testing was one of
the methods proposed to defend a Sybil attack. It is assumed that
physical resources of each node are limited. Unfortunately, this
method is not suitable for Ad Hoc networks because an attacker
can have more resources than honest nodes. Some papers such
as [13][14] introduced the use of Public Key Infrastructure
(PKI) algorithms for VANETs in which public key
cryptography is used to provide solution to the security problem
in VANETs.
In [15] a multi-factor authentication scheme is used in addition
to public key information. A certificate is issued to all vehicles.
These contain not only the public key information but also
contain a set of physical attribute values of a vehicle, such as
transmitter coverage, radio frequency fingerprint and so on,
recorded by CA. In [16] Hubaux et. al. have introduced
verifiable multilateration method for performing distance
bounding. In this approach, two or three fixed units (RSUs) are
used to perform distance bounding. This method is not a very
appropriate method to detect Sybil attack as it involves RSUs as
a key player in detection mechanism. This method is more
infrastructures dependent.
Nodes in Sybil
Attack
Malicious
Node
Sybil Node
7. International Journal of Computer Applications Technology and Research
Volume 3– Issue 5, 284 - 291, 2014
www.ijcat.com 290
In [17] Demirbas et. al. have presented a Sybil attack detection
scheme in wireless sensor networks using multiple sensors
Received Signal Strength Indicator (RSSI) measurements.
However, it does not mention how to identify honest
neighboring nodes. This scheme cannot be applied in situations
where nodes are moving, not trusted or may collude in hostile
environment. The method suggested in [18][19] requires some
trusted monitors for observing the behavior of nodes in a
network. This is not realistic in VANET because the Sybil
attacker may penetrate these trusted observing nodes and these
Sybil nodes will report fake data. A secure hardware based
method is proposed in [20] which are built on trusted platform
module (TPM). Secure information is stored in shielded
locations of the module, where any type of forging or
modification of data is impossible. Hence, communication
between TPMs of the vehicles is protected from the Sybil attack.
In [21] Guette et. al. have analyzed the effectiveness of Sybil
attack in various assumptions of transmission signal tuning and
antenna. They showed the limitation of RSS based Sybil attack
detection in VANET. In [22] Xiao et. al. have proposed a
localized and distributed scheme to detect Sybil attacks in
VANETs. The approach takes advantage of VANET traffic
patterns and road side base stations. In [23] Zhou et. al. have
proposed a privacy preserving method for detecting a Sybil
attack with trustable roadside boxes and pseudonyms. Vehicles
are assigned a pool of pseudonyms from a centralized unit,
which are used for generating traffic messages instead of real
identities for privacy reason. Pseudonym belonging to a vehicle
is hashed to a unique value. Vehicles cannot abuse these
pseudonyms for a Sybil attack. This scheme provides privacy
but it is based on the assumption that individual vehicles are
registered and managed by trusted authorities.
In the approach discussed in [24][25], RSUs are the only
components that issue the certificates to all vehicles passing
across them. It is very rare to have two vehicles passing by
multiple RSUs at exactly the same time due to the difference of
moving dynamics of multiple vehicles. Two messages will be
treated as a Sybil attack issued by one vehicle if they have
similar time-stamp series issued by RSUs. In [26] Shaohe et. al.
have proposed a cooperative RSS based Sybil attack detection
for static sensor networks where all nodes have fixed
transmission power either it are honest or malicious. This
approach does not rely on the accurate position of the nodes
rather relative distance among the nodes is used. Each node
overhears packets and computes the distance to other nodes
using received signal strength. In [7] Jyoti et. al. have proposed
and implemented RSS-based Sybil attack detection technique in
VANETs. The detection method was based on the similarity in
RSS value received by the RSUs.
10 CONCLUSION
Malicious nodes are harmful for proper functioning of VANET
applications. If correct traffic information is not delivered to the
drivers before the vehicle approaches to the location of occurred
event, critical problems can significantly alleviate. In Sybil
attack, a malicious node forges multiple or fake identities (either
present in the network or not), in order to disrupt the proper
functioning of VANET applications. It creates an illusion on
road, leading to disruption in the network scenario. In Temporal
attacks, a malicious node either impedes or delays the
forwarding of critical safety messages received from
neighboring nodes. It can also perform replay attack by
repeatedly sending the information of events occurred earlier. In
this paper, both the attacks are discussed in detail and their
solutions which have been proposed in previous studies are
mentioned.
11 REFERENCES
[1] C. Siva Ram Murthy, B.S. Manoj, Advanced
Information Networking and Applications, 2007.
AINA '07. 21st
International Conference. In Ad Hoc
Wireless Networks: Architectures and Protocols,
2007.
[2] Antonios Stampoulis, Zheng Chai, “A Survey of
Security in Vehicular Networks”.
[3] Amer Aijaz, Bernd Bochow, Florian Dtzer, Andreas
Festag, Matthias Gerlach, Rainer Kroh, and Tim
Leinmller, “Attacks on Inter Vehicle Communication
Systems - an Analysis”, In Proc. of WIT, pp. 189-194,
2006.
[4] Nai-Wei Lo, Hsiao-Chien Tsai, “Illusion Attack on
VANET Applications - A Message Plausibility
Problem”, In Proc. of IEEE Globecom Workshops, pp.
1-8, 2007.
[5] Jiang, L. Delgrossi, “IEEE 802.11p: Towards an
International Standard for Wireless Access in
Vehicular Environments”, In Proc. of Vehicular
Technology Conference (VTC), pp. 2036-2040, 2008.
[6] A. Goldsmith, Wireless communications. In
Cambridge University Press, 2005.
[7] Jyoti Grover, Nitesh Prajapati, Manoj Singh Gaur, and
Vijay Laxmi, “RSS-based Sybil Attack Detection in
VANETs”, In IEEE Proc. of the International
Conference (TENCON), pp. 2278-2283, 2010.
[8] Nitesh Kr. Prajapati, Jyoti Grover, and M.S Gaur,
“Implementation of Temporal Attacks in Vehicular Ad
Hoc Networks”, International Conference on
Electronic, Information and Communication Systems
Engineering (ICEICE2020) 28-30 March, Jodhpur,
India.
[9] Jyoti Grover, V.Laxmi, M.S Gaur and Nitesh Kr.
Prajapati, “A Distributed Sybil Attack Detection
Approach using Neighboring Vehicles in VANET”,
The Computer Journal (Oxford), Special Issue on
Security and Privacy in Innovative Communication
and Services.
[10] B. Parno and A. Perrig, “Challenges in Securing
Vehicular Networks”, In Proc. of HotNets-IV, 2005.
[11] John R. Douceur, “The Sybil Attack”, In IPTPS 01:
Revised Papers from the First International Workshop
on Peer-to-Peer Systems, pp. 251-260, London, UK,
2002. Springer-Verlag.
[12] James Newsome, Elaine Shi, Dawn Song, and Adrian
Perrig, “The Sybil Attack in Sensor Networks:
Analysis & Defenses”, In IPSN '04: Proceedings of
the 3rd
International Symposium on Information
processing in Sensor Networks, New York, USA.
ACM.
8. International Journal of Computer Applications Technology and Research
Volume 3– Issue 5, 284 - 291, 2014
www.ijcat.com 291
[13] M. Raya and J.P. Hubaux, “Securing Vehicular Ad-
hoc Networks”, Transactions of Journal of Computer
Security, Vol. 15, Issue 1, pp. 39-68, 2007.
[14] Philippe Golle, Dan Greene, and Jessica Staddon,
“Detecting and Correcting Malicious Data in
VANETs”, In Proc. of 1st
ACM International
workshop on Vehicular Ad-hoc Networks, pp. 29-37,
New York, USA, 2004, ACM.
[15] S. Pal, A.K. Mukhopadhyay, and P.P. Bhattacharya,
“Defending Mechanisms against Sybil Attack in Next
Generation Mobile Ad Hoc Networks”, Vol. 25, pp.
209-214. IEEE Technical Review, 2008.
[16] Jean-Pierre Hubaux, Srdjan Capkun, and Jun Luo,
“The Security and Privacy of Smart Vehicles”, In
IEEE Proc. of Security and Privacy, pp. 49-55, 2004.
[17] Murat Demirbas and Youngwhan Song, “An RSSI-
based Scheme for Sybil Attack Detection in Wireless
Sensor Networks”, In Proc. of International
Symposium on World of Wireless, Mobile and
Multimedia Networks (WOWMOM), pp. 564-570,
2006.
[18] Chris Piro, Clay Shields, and Brian Neil Levine,
“Detecting Sybil Attack in Mobile Ad hoc Networks”,
In Proc. of Securecomm and Workshops, pp. 1-11,
Sept. 2006.
[19] Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons,
and Abraham D. Flaxman, “SybilGuard: Defending
against Sybil Attacks via Social Networks”,
Transactions of IEEE/ACM Transition Networks, Vol.
16, Issue 3, pp. 576-589, 2008.
[20] Gilles Guette and Ciaran Bryce, “Using TPMs to
Secure Vehicular Ad-Hoc Networks (VANETs)”, pp.
106-116, 2008.
[21] Gilles Guette and Bertrand Ducourthial, “On the Sybil
Attack Detection in VANET”, In IEEE Proc. of
International Conference on Mobile Ad-hoc Networks
and Sensor Systems, pp. 1-6, 2007.
[22] Bo Yu Bin Xiao and Chuanshan Gao, “Detection and
Localization of Sybil Nodes in VANETs”, In Proc. of
the Workshop on Dependability Issues in Wireless
Ad-hoc Networks and Sensor Networks, pp. 1-8, New
York, USA, 2006, ACM.
[23] Tong Zhou, R.R. Choudhury, Peng Ning, and K.
Chakrabarty, “Privacy-Preserving Detection of Sybil
Attacks in Vehicular Ad Hoc Networks”, In Proc. of
Fourth Annual International Conference on Mobile
and Ubiquitous Systems: Networking and Services
(MobiQuitous), pp. 1-8, Aug. 2007.
[24] B.Turgut, D.Zou, C.C. Soyoung, and Park Aslam,
“Defense against Sybil Attack in Vehicular Ad-hoc
Network based on Roadside Unit Support”, In IEEE
Proc. of Military Communications Conference
(MILCOM), pp. 1-7, 2009.
[25] Chen Chen, Xin Wang, Weili Han, and Binyu Zang,
“A Robust Detection of the Sybil Attack in Urban
VANETs”, In IEEE Proc. of ICDCS Workshops, pp.
270-276, 2009.
[26] Xin Zhao, Shaohe Lv, Xiaodong Wang, and Xingming
Zhou, “Detecting the Sybil Attack Cooperatively in
Wireless Sensor Networks”, In IEEE Proc. of
International Conference on Computational
Intelligence and Security (CIS), 2008.
[27] Gongjun Yan, Stephan Olariu, and Michele C. Weigle,
“Providing VANET Security through Active Position
Detection”, Transactions of Computer
Communications, Vol. 31, Issue 12, 2008.
[28] M Raya, P Papadimitratos, and J.P. Hubaux,
“Securing Vehicular Communications”, In IEEE
Transactions of Wireless Communications, Vol. 13,
Oct. 2006.
[29] M. Raya and J. P. Hubaux, “The security of
VANETs”, In Proc. of 2nd
ACM International
Workshop on Vehicular Ad-hoc Networks, 2005.
[30] W Ren, K Ren, W Lou, and Y Zhang, “Efficient User
Revocation for Privacy-aware PKI”, In Proc. of 5th
International Conference (ICST), 2005.
[31] R. K Schmidt, T. Leinmuller, E. Schoch, A. Held, and
G. Schafer, “Vehicle Behavior Analysis to Enhance
Security in VANETs”, In Proc. of Vehicle to Vehicle
Communication (V2VCOM), 2008.