Vehicular Ad-Hoc Network (VANET) is an indispensable part of the Intelligent Transportation System (ITS) due to its abilities to enhance traffic management and safety. Many researchers have been focused on specific areas involving management and storage data, protocols standardization, network fragmentation, monitoring, and quality of service. The benchmarks of security of VANET are studied and figured out in this paper. VANET provides the driver and passenger with the safety application as well as entertainment service. However, the communication between nodes in VANET is susceptible to security threats in both communication modes, which indicates the main hazard. In this paper, we identified different Man-In-The-Middle (MITM) attacks with various behaviors such as message tampering, message delaying, and message dropping, according to the literature. In this study, the essential background of VANET from architectural point of view and communication types are discussed. Then, the overview of MITM attack in VANET is presented. In addition, this paper thoroughly reviews the existing prevention schemes for MITM attack in VANET. This review paper reveals that there is still a need for a better and more efficient preventive scheme to address the MITM attack in VANET. This review paper could serve as evidence and reference in the development of any new security schemes for VANETs.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Dr. Amarjeet Singh
Vehicular Ad-hoc Network (VANET) technology is the basis of Intelligent Transportation System (ITS) connectivity that enables the delivery of useful information to and fro between vehicles in vehicle-to-vehicle communication mode; or between vehicle and infrastructure in vehicle-to-infrastructure mode for safety and comfort. However, due to the openness of the wireless medium used by VANET, the technology is vulnerable to security threats in both communication modes. In this study, the essential background of VANET from architectural point of view and communication types are discussed. Then, the overview of modification attack in VANET is presented. In addition, this paper thoroughly reviews the existing prevention schemes for modification attack in VANET. This review paper reveals that there is still a need for a better and more efficient preventive scheme to address the modification attack in VANET.
Vehicular Ad Hoc Networks (VANETs) are based on network technology where cars act as mobile nodes to form a communication network. In VANETs, routing protocols have a significance regarding the overall network performance since they determine the way of sending and receiving packets between mobile nodes. Most of the protocols proposed for VANETs are adapted from Mobile ad hoc networks (MANETs) routing protocols. However, due to the specific characteristics of VANETs, especially high mobility, and dynamic topology, the routing protocols in ad hoc networks do not adapt immediately to VANETs. Therefore, secure routing of Vehicular ad hoc networks (VANETs) against attacks, which are of various types, is still a challenging issue. This paper is going to present a synthesis of the most relevant protocols that have addressed the secure routing issue in VANETs. It also establishes a comparison regarding the offered features and the studied performance aspects through which it is notified that a security mechanism depends not only on the level of efficiency but also on the network constraints.
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationIJERA Editor
VANET provide facility for the vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages to other vehicles. However, this raises the issue of security and privacy. Here, we have described various existing solutions/protocols that are used in order to satisfy the security and privacy requirement of the vehicular ad hoc network. We have also described security issues and challenges in VANET. We have presented various security attributes that may be considered as criteria to measure security such as availability, confidentiality, integrity, authentication and non-repudiation. This paper also give the detail information of some of the schemes such as RAISE ,IBV with their pros and cons.
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Dr. Amarjeet Singh
Vehicles in a vehicular ad-hoc network (VANET) broadcast information about the driving environment in the road. Due to the open-access environment, this means that the VANET is susceptible to security and privacy issues. However, none of the related works satisfies all security and privacy requirements. Besides, their proposed has huge overhead in terms of computation and communication. To address the above issues, we will propose the security and privacy scheme based on Elliptic Curve Cryptography (ECC) and one secure hash function. Hence the reliability of each message being signed and checked has been improved. The main aim of this work is to satisfy all aspect requirements of security and privacy and reduce the computational complexity of the system.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Dr. Amarjeet Singh
Vehicular Ad-hoc Network (VANET) technology is the basis of Intelligent Transportation System (ITS) connectivity that enables the delivery of useful information to and fro between vehicles in vehicle-to-vehicle communication mode; or between vehicle and infrastructure in vehicle-to-infrastructure mode for safety and comfort. However, due to the openness of the wireless medium used by VANET, the technology is vulnerable to security threats in both communication modes. In this study, the essential background of VANET from architectural point of view and communication types are discussed. Then, the overview of modification attack in VANET is presented. In addition, this paper thoroughly reviews the existing prevention schemes for modification attack in VANET. This review paper reveals that there is still a need for a better and more efficient preventive scheme to address the modification attack in VANET.
Vehicular Ad Hoc Networks (VANETs) are based on network technology where cars act as mobile nodes to form a communication network. In VANETs, routing protocols have a significance regarding the overall network performance since they determine the way of sending and receiving packets between mobile nodes. Most of the protocols proposed for VANETs are adapted from Mobile ad hoc networks (MANETs) routing protocols. However, due to the specific characteristics of VANETs, especially high mobility, and dynamic topology, the routing protocols in ad hoc networks do not adapt immediately to VANETs. Therefore, secure routing of Vehicular ad hoc networks (VANETs) against attacks, which are of various types, is still a challenging issue. This paper is going to present a synthesis of the most relevant protocols that have addressed the secure routing issue in VANETs. It also establishes a comparison regarding the offered features and the studied performance aspects through which it is notified that a security mechanism depends not only on the level of efficiency but also on the network constraints.
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationIJERA Editor
VANET provide facility for the vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages to other vehicles. However, this raises the issue of security and privacy. Here, we have described various existing solutions/protocols that are used in order to satisfy the security and privacy requirement of the vehicular ad hoc network. We have also described security issues and challenges in VANET. We have presented various security attributes that may be considered as criteria to measure security such as availability, confidentiality, integrity, authentication and non-repudiation. This paper also give the detail information of some of the schemes such as RAISE ,IBV with their pros and cons.
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Dr. Amarjeet Singh
Vehicles in a vehicular ad-hoc network (VANET) broadcast information about the driving environment in the road. Due to the open-access environment, this means that the VANET is susceptible to security and privacy issues. However, none of the related works satisfies all security and privacy requirements. Besides, their proposed has huge overhead in terms of computation and communication. To address the above issues, we will propose the security and privacy scheme based on Elliptic Curve Cryptography (ECC) and one secure hash function. Hence the reliability of each message being signed and checked has been improved. The main aim of this work is to satisfy all aspect requirements of security and privacy and reduce the computational complexity of the system.
A Survey on Vehicle to Infrastructure Communication SystemIOSR Journals
Abstract: Vehicle-to-Infrastructure (V2I) Communications for Safety is the wireless exchange of critical safety
and operational data between vehicles and roadway infrastructure, intended primarily to avoid motor vehicle
crashes. Vehicle-to-infrastructure (V2I) communication based on wireless local area network (WLAN) IEEE
802.11 standard technology can support user in-motion to achieve preferable Internet connectivity. This
standard is created for urgent short message transmission.The IEEE 802.11 standard defines an infracture
mode with at least one central access point connected to a wired network. In this paper we present an
experimental study of IEEE802.11g using off-the-shelf devices in vehicle-to-infrastructure small scale scenario.
In order to evaluate the V2I the type of communication in large scale scenario and intelligent transportation
systems (ITS) will necessitate wireless vehicle-to-infrastructure (V2I) communica-tions. This wireless link can
be implemented by several technolo-gies, such as digital broadcasting, cellular communication, or dedicated
short range communication (DSRC) systems. Analyses of the coverage and capacity requirements are presented
when each of the three systems are used to implement the V2I link
Keywords: Short Range Vehicle Network; 802.11g; wireless network; goodput; network performance;
transport; mobile stations; auto traffic; vehicle speed
A review on various security attacks in vehicular ad hoc networksjournalBEEI
Ad hoc vehicle networks (VANET) are being established as a primary form of mobile ad hoc networks (MANET) and a critical infrastructure to provide vehicle passengers with a wide range of safety applications. VANETs are increasingly common nowadays because it is connecting to a wide range of invisible services. The security of VANETs is paramount as their future use must not jeopardize their users' safety and privacy. The security of these VANETs is essential for the benefit of secure and effective security solutions and facilities, and uncertainty remains, and research in this field remains fast increasing. We discussed the challenges in VANET in this survey. Were vehicles and communication in VANET are efficient to ensure communication between vehicles to vehicles (V2V), vehicles to infrastructures (V2I). Clarified security concerns have been discussed, including confidentiality, authentication, integrity, availableness, and non-repudiation. We have also discussed the potential attacks on security services. According to analysis and performance evaluations, this paper shows that the ACPN is both feasible and appropriate for effective authentication in the VANET. Finally, the article found that in VANETs, encryption and authentication are critical.
The Ad Hoc mobile network (MANET) is a wireless network with properties which may constitute
challenges and weaknesses before the security progress in MANET network. It causes weakness in security,
which leads to increased attacks on MANET. In this paper the challenges and attacks likely to threaten
MANET will be investigated. As a corollary, security solutions will be discussed, the relationship between
them will be concluded and architectural security solutions in MANET will beproposed.
Ad-hoc networks are an emerging area of mobile computing and an efficient paradigm for multicast communication. The security challenges faced by the network due to their inherent unique characteristics are exacerbated in case of multicast communication. Group communication in ad hoc network is susceptible to a host of outsider and insider attacks. The security solutions proposed for the outsider attack cannot be directly applied to the insider attack due to their disparate behavior. The compromise and subversion of the authenticated, trusted and participating node in the network leads to Byzantine attack or behavior. Attacks where adversaries have full control of a number of authenticated devices and behave arbitrarily to disrupt the multicast routing are referred to as Byzantine attacks. Online auction network inherently embracing multicast technology has been taken as the case study. The implications of the Byzantine attack in the online auction Network have been studied. Besides the existing network performance parameters like delay, jitter, throughput, Packet Delivery Ratio (PDR) another parameter
by name Immediate Neighbor Aware Vouch Count ( INAVC) is included to proactively select a fault free multicast route. This proactive parameter is dynamic and reflects the true multicast architecture in adhoc network thereby enabling to instantly prune the Byzantine adversary. Providing robust and resilient defense solutions to subvert this attack in auction Network becomes the focus of this paper.
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)Dr. Amarjeet Singh
Vehicles in a vehicular ad-hoc network (VANET) broadcast information about the driving environment in the road. Due to the open-access environment, this means that the VANET is susceptible to security and privacy issues. However, none of the related works satisfies all security and privacy requirements. Besides, their proposed has huge overhead in terms of computation and communication. The present paper is a provide a thorough background on VANETs and their entities; different security attacks; and all requirements of the privacy and security for VANETs. This paper may serve as a guide and reference for VANETs in the design and implementation of any new techniques for protection and privacy.
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...Eswar Publications
Routing in VANETs (pure ad hoc architectures) with dynamic nature of the network becomes a challenging task for finding and maintaining routes. So, detecting the misbehaving vehicles is an important task in for improving the efficiency of the vehicles and to incorporate the reliable and secure routing in the transport system. Due to the self -configure (mobility) characteristic of the VANETS, it is very difficult to the road side and base station units to keep track of the actions happening among the vehicles. Obviously the attackers will have the fraudulent nature that same will persist over time with them that will be effected to the normal vehicles which is travelling in the
network from the non trustworthy vehicles. So detection and proper action is needed to improve the efficient routing of the vehicles in the network. Earlier we have many techniques for detecting and preventing the misbehaving vehicles depending upon the threshold values, mobility factors, power ratios etc., now we are proposing a new technique called Bloom-Filter based IP Choke Mechanism for locating the harmful vehicle. In
this paper we will discuss about the proposed technique on how to identify the malicious vehicle and how to defend the attacked vehicle by blocking it form the routing process.
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
Designing a protocol structure which contains the control system, VANET device and the type of communication message structures which will implement the message packets for v2v or v2I infrastructure . The different message packets contain the information required to transfer from one node to another in vehicular network for communication. Design various algorithm required for Control, Alert and Infotainment messages. Time stamping lowering data rate efficient packet delivery and proper communication of required messages. Implementation of proposed algorithms and comparison of them with existing algorithms and study of different factors affecting the working of theses algorithms. Analysis of proposed design approach and improvements in results if required.
Cyber DoS attack-based security simulator for VANET IJECEIAES
At the late years, researches focused on the cyber denial of service (DoS) attacks in the vehicle ad hoc networks (VANETS). This is due to high importance of ensuring the save receiving of information in terms of vehicle to vehicle (V2V), vehicle to infrastructure (V2I) and Vehicle to Road side unit (V2R). In this paper, a cyber-security system is proposed to detect and block the DoS attacks in VANET. In addition, a simulator for VENAT based on lightweight authentication and key exchange is presented to simulate the network performance and attacks. The proposed system consists of three phases: registration, authentication as well as communications and DoS attack detection. These phases improve the system ability to detect the attacks in efficient way. Each phase working is based in a proposed related algorithm under the guidance of lightweight protocol. In order to test the proposed system, a prototype is considered includes six cars and we adopt police cars due to high importance of exchanged information. Different case studies have been considered to evaluate the proposed system and the obtained results show a high efficiency of performance in terms of information exchange and attack detection.
Congestion and overload control techniques in massive M2M systems: a surveyapnegrao
Lilatul Ferdouse1, Alagan Anpalagan1* and Sudip Misra2
1 WINCORE Lab, Department of Electrical and Computer Engineering, Ryerson University, Toronto, Canada
2 School of Information Technology, Indian Institute of Technology, Kharagpur, India
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
Recently, vehicular ad hoc networks (VANETs) have been garnering
significant inter-est from the people involved in transportation field.
Nowadays automotive manufactur-ers have already supplying vehicles with
multitude of road sensors that provides many useful characteristics. VANET
communication not only offers the drivers and passen-gers with the various
safety related services but also provides a wide range of valuable
applications. However, the inherent openness of the wireless communication
medium used by VANETs exposes vehicles to various security and privacy
issues. Researchers have proposed many security schemes to solve the issues
mentioned above for the widespread deployment of VANETs. However,
these schemes failed to fulfill all as-pects of security and privacy
requirements. Besides, these schemes have not provided the performance
parameters such as computation and communication costs. The pri-mary
emphasis of this paper is on the taxonomy of security schemes based
conditional privacy-preserving with respect to strengths and limitations.
Besides, a comparison be-tween these schemes related to the model of
security and privacy requirements, attacks, and performance parameters is
provided. Finally, this paper critically reviews the re-lated works by taking
into consideration the design and development of all VANETs security and
privacy schemes, this paper could serve as a guide and reference.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes.
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
Vehicular ad-hoc networks (VANETs) technology has turned out as a vital research field throughout the most recent couple of years. VANETs are the likely an impacting way to deal with giving security of driver and different applications for the activity conditions and additionally travelers. Being dynamic in nature, it created the network, according to the condition and requirement of the users and provides consistent communication between the vehicles. Due to its excessive advantages, it is highly susceptible to numerous attacks and security in VANET should be taken into consideration. This paper presented the security issues such as authenticity, integrity, availability, confidentiality, anonymity and non-repudiation to provide the secure communication between Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I). Numerous research works have been done to recover the performance and security of this network. The fundamental point of this paper is the several security challenges and the applications of VANETs.
MALICIOUS NODE DETECTION THROUGH AODV IN VANET ijasuc
VANET is a subset of MANET which offers communication between the nodes. VANET is a collection of
various dynamic nodes that can change it and configure itself on the network. In Vanet, various routing
protocols may be implemented to route the packet and Ad-hoc On-Demand Distance Vector (AODV) is one
of the protocol that floods the packets to discover route. In Ad hoc On Demand Vector (AODV) routing
protocol for VANET, malicious nodes may distrupt the network and make it difficult for the nodes to
communicate. In this paper, AODV Routing Protocol is analysed in vanet with and without malicious
attack. The malicious node disrupts the limit and floods the network with false packets. Malicious node will
affect the performance of the entire network as it consumes more bandwidth and drops packets which in
turn reduce the performance of AODV routing protocol and vanet.
VANET SECURITY AND PRIVACY – AN OVERVIEWIJNSA Journal
Even though vehicular ad-hoc networks (VANETs) bring tremendous benefits to society, yet they raise
many challenges where the security and privacy concerns are the most critical ones. In this paper, we
provide a detailed overview of the state-of-the-art security and privacy requirements in VANET. Also, a
brief of the approachesthat are proposed in the literature to fulfil these requirements is given in this paper.
Besides that, a classification of the various VANET attacks based on the communication system
layersisprovided in this paper. In addition, the different types of VANET adversaries and attackers
arepresented here.In general, this paper aims to provide a good piece of information about VANET
security and privacy, in order to be used as a tool to help researchers in this field in developing secure
privacy-preserving approaches for VANET.
A Survey on Vehicle to Infrastructure Communication SystemIOSR Journals
Abstract: Vehicle-to-Infrastructure (V2I) Communications for Safety is the wireless exchange of critical safety
and operational data between vehicles and roadway infrastructure, intended primarily to avoid motor vehicle
crashes. Vehicle-to-infrastructure (V2I) communication based on wireless local area network (WLAN) IEEE
802.11 standard technology can support user in-motion to achieve preferable Internet connectivity. This
standard is created for urgent short message transmission.The IEEE 802.11 standard defines an infracture
mode with at least one central access point connected to a wired network. In this paper we present an
experimental study of IEEE802.11g using off-the-shelf devices in vehicle-to-infrastructure small scale scenario.
In order to evaluate the V2I the type of communication in large scale scenario and intelligent transportation
systems (ITS) will necessitate wireless vehicle-to-infrastructure (V2I) communica-tions. This wireless link can
be implemented by several technolo-gies, such as digital broadcasting, cellular communication, or dedicated
short range communication (DSRC) systems. Analyses of the coverage and capacity requirements are presented
when each of the three systems are used to implement the V2I link
Keywords: Short Range Vehicle Network; 802.11g; wireless network; goodput; network performance;
transport; mobile stations; auto traffic; vehicle speed
A review on various security attacks in vehicular ad hoc networksjournalBEEI
Ad hoc vehicle networks (VANET) are being established as a primary form of mobile ad hoc networks (MANET) and a critical infrastructure to provide vehicle passengers with a wide range of safety applications. VANETs are increasingly common nowadays because it is connecting to a wide range of invisible services. The security of VANETs is paramount as their future use must not jeopardize their users' safety and privacy. The security of these VANETs is essential for the benefit of secure and effective security solutions and facilities, and uncertainty remains, and research in this field remains fast increasing. We discussed the challenges in VANET in this survey. Were vehicles and communication in VANET are efficient to ensure communication between vehicles to vehicles (V2V), vehicles to infrastructures (V2I). Clarified security concerns have been discussed, including confidentiality, authentication, integrity, availableness, and non-repudiation. We have also discussed the potential attacks on security services. According to analysis and performance evaluations, this paper shows that the ACPN is both feasible and appropriate for effective authentication in the VANET. Finally, the article found that in VANETs, encryption and authentication are critical.
The Ad Hoc mobile network (MANET) is a wireless network with properties which may constitute
challenges and weaknesses before the security progress in MANET network. It causes weakness in security,
which leads to increased attacks on MANET. In this paper the challenges and attacks likely to threaten
MANET will be investigated. As a corollary, security solutions will be discussed, the relationship between
them will be concluded and architectural security solutions in MANET will beproposed.
Ad-hoc networks are an emerging area of mobile computing and an efficient paradigm for multicast communication. The security challenges faced by the network due to their inherent unique characteristics are exacerbated in case of multicast communication. Group communication in ad hoc network is susceptible to a host of outsider and insider attacks. The security solutions proposed for the outsider attack cannot be directly applied to the insider attack due to their disparate behavior. The compromise and subversion of the authenticated, trusted and participating node in the network leads to Byzantine attack or behavior. Attacks where adversaries have full control of a number of authenticated devices and behave arbitrarily to disrupt the multicast routing are referred to as Byzantine attacks. Online auction network inherently embracing multicast technology has been taken as the case study. The implications of the Byzantine attack in the online auction Network have been studied. Besides the existing network performance parameters like delay, jitter, throughput, Packet Delivery Ratio (PDR) another parameter
by name Immediate Neighbor Aware Vouch Count ( INAVC) is included to proactively select a fault free multicast route. This proactive parameter is dynamic and reflects the true multicast architecture in adhoc network thereby enabling to instantly prune the Byzantine adversary. Providing robust and resilient defense solutions to subvert this attack in auction Network becomes the focus of this paper.
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)Dr. Amarjeet Singh
Vehicles in a vehicular ad-hoc network (VANET) broadcast information about the driving environment in the road. Due to the open-access environment, this means that the VANET is susceptible to security and privacy issues. However, none of the related works satisfies all security and privacy requirements. Besides, their proposed has huge overhead in terms of computation and communication. The present paper is a provide a thorough background on VANETs and their entities; different security attacks; and all requirements of the privacy and security for VANETs. This paper may serve as a guide and reference for VANETs in the design and implementation of any new techniques for protection and privacy.
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...Eswar Publications
Routing in VANETs (pure ad hoc architectures) with dynamic nature of the network becomes a challenging task for finding and maintaining routes. So, detecting the misbehaving vehicles is an important task in for improving the efficiency of the vehicles and to incorporate the reliable and secure routing in the transport system. Due to the self -configure (mobility) characteristic of the VANETS, it is very difficult to the road side and base station units to keep track of the actions happening among the vehicles. Obviously the attackers will have the fraudulent nature that same will persist over time with them that will be effected to the normal vehicles which is travelling in the
network from the non trustworthy vehicles. So detection and proper action is needed to improve the efficient routing of the vehicles in the network. Earlier we have many techniques for detecting and preventing the misbehaving vehicles depending upon the threshold values, mobility factors, power ratios etc., now we are proposing a new technique called Bloom-Filter based IP Choke Mechanism for locating the harmful vehicle. In
this paper we will discuss about the proposed technique on how to identify the malicious vehicle and how to defend the attacked vehicle by blocking it form the routing process.
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
Designing a protocol structure which contains the control system, VANET device and the type of communication message structures which will implement the message packets for v2v or v2I infrastructure . The different message packets contain the information required to transfer from one node to another in vehicular network for communication. Design various algorithm required for Control, Alert and Infotainment messages. Time stamping lowering data rate efficient packet delivery and proper communication of required messages. Implementation of proposed algorithms and comparison of them with existing algorithms and study of different factors affecting the working of theses algorithms. Analysis of proposed design approach and improvements in results if required.
Cyber DoS attack-based security simulator for VANET IJECEIAES
At the late years, researches focused on the cyber denial of service (DoS) attacks in the vehicle ad hoc networks (VANETS). This is due to high importance of ensuring the save receiving of information in terms of vehicle to vehicle (V2V), vehicle to infrastructure (V2I) and Vehicle to Road side unit (V2R). In this paper, a cyber-security system is proposed to detect and block the DoS attacks in VANET. In addition, a simulator for VENAT based on lightweight authentication and key exchange is presented to simulate the network performance and attacks. The proposed system consists of three phases: registration, authentication as well as communications and DoS attack detection. These phases improve the system ability to detect the attacks in efficient way. Each phase working is based in a proposed related algorithm under the guidance of lightweight protocol. In order to test the proposed system, a prototype is considered includes six cars and we adopt police cars due to high importance of exchanged information. Different case studies have been considered to evaluate the proposed system and the obtained results show a high efficiency of performance in terms of information exchange and attack detection.
Congestion and overload control techniques in massive M2M systems: a surveyapnegrao
Lilatul Ferdouse1, Alagan Anpalagan1* and Sudip Misra2
1 WINCORE Lab, Department of Electrical and Computer Engineering, Ryerson University, Toronto, Canada
2 School of Information Technology, Indian Institute of Technology, Kharagpur, India
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
Recently, vehicular ad hoc networks (VANETs) have been garnering
significant inter-est from the people involved in transportation field.
Nowadays automotive manufactur-ers have already supplying vehicles with
multitude of road sensors that provides many useful characteristics. VANET
communication not only offers the drivers and passen-gers with the various
safety related services but also provides a wide range of valuable
applications. However, the inherent openness of the wireless communication
medium used by VANETs exposes vehicles to various security and privacy
issues. Researchers have proposed many security schemes to solve the issues
mentioned above for the widespread deployment of VANETs. However,
these schemes failed to fulfill all as-pects of security and privacy
requirements. Besides, these schemes have not provided the performance
parameters such as computation and communication costs. The pri-mary
emphasis of this paper is on the taxonomy of security schemes based
conditional privacy-preserving with respect to strengths and limitations.
Besides, a comparison be-tween these schemes related to the model of
security and privacy requirements, attacks, and performance parameters is
provided. Finally, this paper critically reviews the re-lated works by taking
into consideration the design and development of all VANETs security and
privacy schemes, this paper could serve as a guide and reference.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes.
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
Vehicular ad-hoc networks (VANETs) technology has turned out as a vital research field throughout the most recent couple of years. VANETs are the likely an impacting way to deal with giving security of driver and different applications for the activity conditions and additionally travelers. Being dynamic in nature, it created the network, according to the condition and requirement of the users and provides consistent communication between the vehicles. Due to its excessive advantages, it is highly susceptible to numerous attacks and security in VANET should be taken into consideration. This paper presented the security issues such as authenticity, integrity, availability, confidentiality, anonymity and non-repudiation to provide the secure communication between Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I). Numerous research works have been done to recover the performance and security of this network. The fundamental point of this paper is the several security challenges and the applications of VANETs.
MALICIOUS NODE DETECTION THROUGH AODV IN VANET ijasuc
VANET is a subset of MANET which offers communication between the nodes. VANET is a collection of
various dynamic nodes that can change it and configure itself on the network. In Vanet, various routing
protocols may be implemented to route the packet and Ad-hoc On-Demand Distance Vector (AODV) is one
of the protocol that floods the packets to discover route. In Ad hoc On Demand Vector (AODV) routing
protocol for VANET, malicious nodes may distrupt the network and make it difficult for the nodes to
communicate. In this paper, AODV Routing Protocol is analysed in vanet with and without malicious
attack. The malicious node disrupts the limit and floods the network with false packets. Malicious node will
affect the performance of the entire network as it consumes more bandwidth and drops packets which in
turn reduce the performance of AODV routing protocol and vanet.
VANET SECURITY AND PRIVACY – AN OVERVIEWIJNSA Journal
Even though vehicular ad-hoc networks (VANETs) bring tremendous benefits to society, yet they raise
many challenges where the security and privacy concerns are the most critical ones. In this paper, we
provide a detailed overview of the state-of-the-art security and privacy requirements in VANET. Also, a
brief of the approachesthat are proposed in the literature to fulfil these requirements is given in this paper.
Besides that, a classification of the various VANET attacks based on the communication system
layersisprovided in this paper. In addition, the different types of VANET adversaries and attackers
arepresented here.In general, this paper aims to provide a good piece of information about VANET
security and privacy, in order to be used as a tool to help researchers in this field in developing secure
privacy-preserving approaches for VANET.
VANET SECURITY AND PRIVACY – AN OVERVIEWIJNSA Journal
Even though vehicular ad-hoc networks (VANETs) bring tremendous benefits to society, yet they raise
many challenges where the security and privacy concerns are the most critical ones. In this paper, we
provide a detailed overview of the state-of-the-art security and privacy requirements in VANET. Also, a
brief of the approachesthat are proposed in the literature to fulfil these requirements is given in this paper.
Besides that, a classification of the various VANET attacks based on the communication system
layersisprovided in this paper. In addition, the different types of VANET adversaries and attackers
arepresented here.In general, this paper aims to provide a good piece of information about VANET
security and privacy, in order to be used as a tool to help researchers in this field in developing secure
privacy-preserving approaches for VANET.
In vehicular ad hoc network (VANETs), the applications mainly focused on the road challenging subclass of Mobile Ad-hoc Network, which empowers smart transmission among vehicles and between vehicles and roadside frameworks. It is an optimistic methodology for the Intelligent Transport System (ITS). There are numerous difficulties to be tended while utilizing VANET. It is flexible and has a high dynamic topology and flexibility which makes the conventional MANET protocols unacceptable for VANET. Trust is a principal element which is used to create a trustful environment to improve the security in vehicular networks. Trust can be calculated by observing the human behavior which creates a trusted communicating environment. In this paper, we define the architecture of VANET, then the communication establishment and various challenges. Some trust models had been defined in this paper to enforce honest information sharing between communicating nodes. Trust establishment is compulsory among communicating vehicles to build a secure messages exchange and reliability.
Vehicular Ad Hoc Networks (VANETs) are based on network technology where cars act as mobile nodes to form a communication network. In VANETs, routing protocols have a significance regarding the overall network performance since they determine the way of sending and receiving packets between mobile nodes. Most of the protocols proposed for VANETs are adapted from Mobile ad hoc networks (MANETs) routing protocols. However, due to the specific characteristics of VANETs, especially high mobility, and dynamic topology, the routing protocols in ad hoc networks do not adapt immediately to VANETs. Therefore, secure routing of Vehicular ad hoc networks (VANETs) against attacks, which are of various types, is still a challenging issue. This paper is going to present a synthesis of the most relevant protocols that have addressed the secure routing issue in VANETs. It also establishes a comparison regarding the offered features and the studied performance aspects through which it is notified that a security mechanism depends not only on the level of efficiency but also on the network constraints.
Security issues and challenges in MANET,VANET and FANET: A SurveyDr.Irshad Ahmed Sumra
VANET and FANET are next generation network and due to safety applications more attractions for end users in these networks. In this slide, it will provide the survey on security issues and challenges in the field of MANET, VANET and FANET. The successful implementation of these networks in real environment, it is require the network will be secure and end user can take benefit from their life safety applications.
A survey on security and privacy issues in IoV IJECEIAES
As an up-and-coming branch of the Internet of things, internet of vehicles (IoV) is imagined to fill in as a fundamental information detecting and processing platform for astute transportation frameworks. Today, vehicles are progressively being associated with the Internet of Things which empower them to give pervasive access to data to drivers and travelers while moving. Be that as it may, as the quantity of associated vehicles continues expanding, new prerequisites, (for example, consistent, secure, vigorous, versatile data trade among vehicles, people, and side of the road frameworks) of vehicular systems are developing. Right now, the unique idea of vehicular specially appointed systems is being changed into another idea called the internet of vehicles (IoV). We talk about the issues faced in implementing a secure IoV architecture. We examine the various challenges in implementing security and privacy in IoV by reviewing past papers along with pointing out research gaps and possible future work and putting forth our on inferences relating to each paper.
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Dr.Irshad Ahmed Sumra
in this slide, it will discuss two new types of attacks which are called road side traffic signal attack and also Internet attack in vehicular network. The authors will explain an attacker‟s behaviour and how he/she will launch an attack on a road side traffic signal and Internet services and create problems for other users of network. Through different scenarios, it will explain the
effect of these attacks on other components of network.
Today, a growing number of vehicles are equipped with communication devices to facilitate vehicle to vehicle and vehicle to infrastructure communication and increase the safety of passengers. A new type of network called Vehicular Network VANET provides us with the infrastructure for developing new systems to enhance drivers' and passengers' safety and comfort. Vehicular networks are special types of mobile ad hoc networks that are used to help drivers access necessary information. This paper provides an introduction to vehicular networks. Matthew N. O. Sadiku | Uwakwe C. Chukwu | Abayomi Ajayi-Majebi | Sarhan M. Musa "Vehicular Networking" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd46451.pdf Paper URL : https://www.ijtsrd.com/engineering/electrical-engineering/46451/vehicular-networking/matthew-n-o-sadiku
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
Vehicular ad hoc network is one of the most interesting research areas due to flexibility, low cost, high sensing fidelity, fault tolerance, creating many new and exciting application areas for remote sensing. So, it has emerged as a promising tool for monitoring the physical world with wireless sensor that can sense, process and communicate. Being ad-hoc in nature, VANET is a type of networks that is created from the concept of establishing a network of cars for a specific need or situation. VANETs have now been established as reliable networks that vehicles use for communication purpose on highways or urban environments. VANET considered as a distinct type of Mobile Ad Hoc Networks holds the opportunity to make peoples life and death decisions by predicting and helping the drivers and other people about the road safety and other critical conditions.
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...Editor IJCATR
In recent years, the number of automobiles on the road has increased tremendously. Due to high density and mobility of vehicles,
possible threats and road accidents are increasing. Wireless communication allows sending safety and other critical information. Due to this
inherent wireless characteristic and periodic exchange of safety packets, Vehicular Ad-hoc Network (VANET) is vulnerable to number of
security threats like Sybil attack or temporal attack. In this paper, a detailed discussion has been done on both the type of attacks. With the
help of already published works, some approaches have also been studied which have proved to be of significance in detection of these
attacks.
A Broadcasting Scheme for Message Dissemination in VANETIJERA Editor
Vehicular Ad hoc Networks [VANET] is one of the fastest emerging technologies for research as there are many issues and challenges to be addressed by the researchers before the technology becomes commercialized. Vehicular communication systems developed largely by the growing interest in intelligent transportation systems [ITS]. Cooperative driving can improve safety and efficiency by enabling vehicles to exchange emergency messages to each other in the neighborhood and to assist driver in making proper decision to avoid vehicle collisions and congestion. Broadcast transmission is usually used for disseminating safety related information among vehicles. Message Broadcast over wireless networks poses many challenges due to link unreliability, hidden terminal, message redundancy, and broadcast storm, etc., which greatly degrade the network performance. In most of the emergency situations, there is less time to make a handshake with other nodes in the networks, as the emergency message is to be delivered fast and efficient. Broadcasting information is usually very costly and without limiting techniques this will result in serious data redundancy, contention and collisions. This work focuses on Broadcasting Scheme for Message Dissemination.
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...ijtsrd
VANET is the largest wireless communications research area. VANETs of rapidly moving vehicles can be inefficient or unreliable. With the passing of time, VANET technology advances via inter vehicle interaction, but many problems need to be resolved in order to strengthen the network. This paper simulates road traffic simulators in a way that ensures safe communication between different types vehicles and prevents traffic based congestion in the cities of India. Ms. Pooja Deshpande | Mrs. Vrushali Uttarwar | Ms. Ekta Choudhari "Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Network for Realistic City Scenario" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29771.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/29771/implementing-secured-and-comport-transportation-using-vehicular-ad-hoc-network-for-realistic-city-scenario/ms-pooja-deshpande
Vehicular ad-hoc networks (VANETs) technology has come out as an important research field over the last few years. VANETs are the likely an influencing approach to provide safety of driver and other applications for the traffic conditions as well as passengers. Being dynamic in nature, it establishes the network, according to the situation and need of the users and provides reliable communication among the vehicles. Due to its great benefits, it is highly vulnerable to various attacks and security in VANET should be taken into consideration. This paper presented the security attacks between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). Many research works have been done to improve the performance and security of this network. The main aim of this paper is the security using hashing and techniques to calculate the trust in VANETs.
Safety and non-safety applications of VANET
provides solutions for road accidents in current traffic system.
Security is one of the key research area for successful
implementation of safety and non-safety applications of VANET
in real environment. Trust and Privacy are two major
components of security and dynamic topology and high mobility
of vehicles make it more challenging task for end users in
network.
Similar to Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular Ad hoc Networks (20)
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...Dr. Amarjeet Singh
In the present paper, we have employed modified Khare-BEB method [Atoms, (2019)] to evaluate total ionization cross sections by the electron impact for ammonia in energy range from the ionization threshold to 10 MeV. The theoretical ionization cross sections have been compared to the available previous theoretical and experimental results. The collision parameters dipole matrix squared M_j^2 and CRP also have been calculated. The present calculations were found in remarkable agreement with the available experimental results.
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., BhiladDr. Amarjeet Singh
Adequately trained Manpower is a problem that affects the IT industry as a whole, but it is particularly acute for Enjay IT Solution. Enjay's location in a semi-urban or rural area makes it even more difficult to find a talented employee with the right skills. As the competition for skilled workers grows, it becomes more difficult to attract and keep those workers who have the requisite training and experience.
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...Dr. Amarjeet Singh
Pink bollworm and Lepidoptera development quickly in numbers which is a typical animal group that produces around 100 youthful ones inside certain days or weeks. This assault influences the harvests broadly in the tropical and sub-tropical temperature areas. Thus, to keep up with the yield of harvests the vermin ought to be kept away by utilizing pesticides. The unnecessary measure of the purpose of pesticides influences the dirt, land, and as well as human well-being, and contaminates the climate. Thus, an ozone-accommodating biopesticide is extracted from the stems of the Gossypium arboreum. Thus, the extraction of biopesticide from the stems of Gossypium arboreum demonstrated that the quantity of pink bollworm and Lepidoptera is diminished step by step in the wake of showering the arrangement on the impacted region of the plant because of the presence of the gossypol.
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...Dr. Amarjeet Singh
E-Commerce has transformed business as we know over the past few decades. The rapid increasing use of the Internet and the strong purchasing power in Saudi Arabia have had a strong impact on the evolution of E-Commerce in the country. Saudi Arabia is yet another country that will release artificial intelligence power to fuel its growth in the economic world. Recently, artificial intelligence (AI) applications that can facilitate e-commerce processes have been widely used. The impact of using artificial intelligence (AI) concepts and techniques on the efficiency of e-commerce, particularly has been overlooked by many prior studies. In this paper, a literature review was conducted to explore and investigate possible applications of AI in E-Commerce that can help Saudi Arabian businesses.
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...Dr. Amarjeet Singh
This study on factors influencing Ownership pattern and its impact on corporate performance has used five industries data viz Automobile industry, IT industry, Banking industry, Oil & Gas industry and pharmaceutical industry for five years from 2017 to 2021. First the factors influencing ownership pattern was identified and later its impact on corporate performance was analysed. Multiple Regression, ANOVA and Correlation was used in SPSS 28. Percentage of independent directors on the board and size of the company has significant impact on Indian Promotor holding and non-institutional ownership has significant impact on corporate performance.
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...Dr. Amarjeet Singh
Every country with a well-developed transportation network has a well-developed economy. The automobile industry is a critical engine of the nation's economic development. The automobile industry has significant backward and forward links with every area of the economy, as well as a strong and progressive multiplier impact. The automotive industry and the auto component industry are both included in the vehicle industry. It includes passenger waggons, light, medium, and heavy commercial vehicles, as well as multi-utility vehicles such as jeeps, three-wheelers, military vehicles, motorcycles, tractors, and auto-components such as engine parts, batteries, drive transmission parts, electrical, suspension and chassis parts, and body and other parts. In the last several years, India's automobile sector has seen incredible growth in sales, production, innovation, and exports. India's car industry has emerged as one of the best in the world, and the auto-ancillary sector is poised to assist the vehicle sector's expansion. Vehicle manufacturers and auto-parts manufacturers account for a significant component of global motorised manufacturing. Vehicle manufacturers from across the world are keeping a close eye on the Indian auto sector in order to assess future demand and establish India as a global manufacturing base. The current research focuses on three automotive behemoths: TATA Motors, MRF, and Mahindra & Mahindra.
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...Dr. Amarjeet Singh
The growth of a country's banking sector has a significant impact on its economic development. The banking sector plays a critical role in determining a country's economic future. A well-planned, structured, efficient, and viable banking system is an essential component of an economy's economic and social infrastructure. In modern society, a strong banking system is required because it meets the financial needs of the modern society. In a country's economy, the banking system plays a crucial role. Because it connects surplus and deficit economic agents, the bank is the most important financial intermediary in the economy. The banking system is regarded as the economy's lifeline. It meets the financial needs of commerce, industry, and agriculture. As a result, the country's development and the banking system are intertwined. They are critical in the mobilisation of savings and the distribution of credit to various sectors of the economy. India's private sector banks play a critical role in the country's economic development. So The financial performance of private sector banks must be evaluated carefully.
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...Dr. Amarjeet Singh
After the United States, China, and Japan, India was the world's fourth biggest consumer of oil and petroleum products. The nation is significantly reliant on crude oil imports, the majority of which come from the Middle East. The Indian oil and gas business is one of the country's six main sectors, with important forward links to the rest of the economy. More than two-thirds of the country's overall primary energy demands are met by the oil and gas industry. The industry has played a key role in placing India on the global map. India is now the world's sixth biggest crude oil user and ninth largest crude oil importer. In addition, the country's portion of the worldwide refining market is growing. India's refining industry is now the world's sixth biggest. With plans for Reliance Petroleum Limited to commission another refinery with a capacity of 29 MTPA next 16 to its 33 MTPA refinery in Jamnagar, Gujarat, this position is projected to be enhanced. As a consequence, the Reliance refinery would be the biggest single-site refinery in the world. Based on secondary data gathered from CMIE, the current research examines the ratios influencing the profitability of selected oil exploration and production businesses in India during a 10-year period.
Since 1991, thanks to economic policy liberalization, the Indian economy has entered an era in which Indian businesses can no longer disregard global markets. Prior to the 1990s, the prices of a variety of commodities, metals, and other assets were carefully regulated. Others, which were not rolled, were primarily dependant on regulated input costs. As a result, there was no uncertainty and, as a result, no price fluctuations. However, in 1991, when the process of deregulation began, the prices of most items were deregulated. It has also resulted in the exchange being partially deregulated, easing trade restrictions, lowering interest rates, and making significant advancements in foreign institutional investors' access to the capital markets, as well as establishing market-based government securities pricing, among other things. Furthermore, portfolio and securities price volatility and instability were influenced by market-determined exchange rates and interest rates. As a result, hedging strategies employing a variety of derivatives were exposed to a variety of risks. The Indian capital market will be examined in this study, with a focus on derivatives.
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...Dr. Amarjeet Singh
SEI S.p.a. presented a project to build a 1320 MW coal-fired power plant in Saline Joniche, on the Southern tip of Calabria Region, Italy, in 2008. A gross early evaluation about the possibility to add CCS (CO2 Capture & Storage) was performed too. The project generated widespread opposition among environmental associations, citizens and local institutions in that period, against the coal use to produce energy, as a consequence of its GHG clima-alterating impact. Moreover the CCS (also named Carbon Capture & Storage or more recently CCUS: Carbon Capture-Usage-Storage) technology was at that time still an unknown and “mysterious” solution for the GHG avoiding to the atmosphere. The present study concerns the sizing of the compression and transportation system of the CCS section, included in the project presented at the time by SEI Spa; the sizing of the compression station and the pipeline connecting the plant to the possible Fosca01 offshore injection site previously studied as a possible storage solution, as part of a coarse screening of CO2 storage sites in the Calabria Region. This study takes into account the costs of construction, operation and maintenance (O&M) of both the compression plant and the sound pipeline, considering the gross static storage capacity of the Fosca01 reservoir as a whole as previously evaluated.
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological FluidDr. Amarjeet Singh
In this paper, the behavior of MR particles has been systematically investigated within the scope of analytical mechanics. . A magnetorheological fluid belongs to a class of smart materials. In magnetorheological fluids, the motion of magnetic particles is controlled by the action of internal and external forces. This paper presents analytical mechanics for the interaction of system of particles in MR fluid. In this paper, basic principles of Analytical Mechanics are utilized for the construction of equations.
Techno-Economic Aspects of Solid Food Wastes into Bio-ManureDr. Amarjeet Singh
Solid waste is health hazard and cause damage to the environment due to improper handling. Solid waste comprises of Industrial Waste (IW), Hazardous Waste (HW), Municipal Solid Waste (MSW), Electronic waste (E-waste), Bio-Medical Waste (BMW) which depend on their supply & characteristics. Food waste or Bio-waste composting and its role in sustainable development is explained in food waste is a growing area of concern with many costs to our community in terms of waste collection, disposal and greenhouse gases. When rotting food ends up in landfill it turns into methane, a greenhouse gas that is particularly damaging to the environment. Composting is biochemical process in which organic materials are biologically degraded, resulting in the production of organic by products and energy in the form of heat. Heat is trapped within the composting mass, leading to the phenomenon of self-heating. This overall process provide us Bio-Manure.
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?Dr. Amarjeet Singh
The purpose of this study is to examine investors’ perceptions about investing in crypto-currencies. We think that investors trust in crypto-currencies is largely driven by crypto-currency comprehension, trust in government, and transaction speed. This is the first study to examine crypto-currencies from the investor’s perspective. Following that, we discover important antecedents of crypto-currency confidence. Second, we look at the government's role in crypto-currencies. The importance of this study is: first, crypto-currencies have the potential to disrupt the current economic system as the debate is all about impact of decentralization of transactions; thus, further research into how it affects investors trust is essential; and second, access to crypto-currencies. Finally, if Fin-Tech companies or banks want to enter the bitcoin industry may not attract huge advertising costs as well as marketing to soothe clients' concerns about investing in various digital currencies The research sheds light on indecisiveness in the context of marketing aspects adopted by demonstrating investors are aware about the crypto.
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...Dr. Amarjeet Singh
The Island Province of Catanduanes is prone to all types of natural hazards that includes torrential and heavy rains, strong winds and surge, flooding and landslide or slope failures as a result of its geographical location and topography. RA 10121 mandates local DRRM bodies to “encourage community, specifically the youth, participation in disaster risk reduction and management activities, such as organizing quick response groups, particularly in identified disaster-prone areas, as well as the inclusion of disaster risk reduction and management programs as part of youth programs and projects. The study aims to determine the awareness to disaster of the student of the Catanduanes State University. The disaster-based questionnaire was prepared and distributed among 636 students selected randomly from different Colleges and Laboratory Schools in the University
The Catanduanes State University students understood some disaster-related concepts and ideas, but uncertain on issues on preparedness, adaptation, and awareness on the risks inflicted by these natural hazards. Low perception on disaster risks are evidently observed among students. The responses of the students could be based on the efficiency and impact of the integration of DRR education in the senior high school curriculum. Specifically, integration of the concepts about the hazards, hazard maps, disaster preparedness, awareness, mitigation, prevention, adaptation, and resiliency in the science curriculum possibly affect the knowledge and understanding of students on DRR. Preparedness drills and other forms of capacity building must be done to improve awareness of the student towards DRRM.
The study further recommends that teachers and instructor must also be capacitated in handling disaster as they are the prime movers in the implementation of the DRRM in education. Preparedness drills and other forms of capacity building must be done to improve awareness of the student towards DRRM. Core subjects in Earth Sciences must be reinforced with geologic hazards. Learning competencies must also be focused on hazard identification and mapping, and coping with different geologic disaster.
The 1857 war was a watershed moment in the history of the Indian subcontinent. The battle has sparked academic debate among historians and sociologists all around the world. Despite the fact that it has been more than 150 years, this battle continues to pique the interest of historians. The war's causes and events that occurred throughout the conflict, persons who backed the British and anti-British fighters, and the results and ramifications, are all aspects of this conflict. In terms of outcomes, many academics believe that the war was a failure for those who started it. It is often assumed that the Indians who battled the British in this conflict were unable to achieve their goals. Many gains accrued to Indians as a result of the conflict, but these achievements are overshadowed by the dispute over the war's failure. This research effort focuses on the war's achievements for India, and the significance of those achievements.
Haryana's Honour Killings: A Social and Legal Point of ViewDr. Amarjeet Singh
Life is unpredictably unpredictable. Nobody knows what will happen in the next minute of their lives. In this circumstance, every human being has the right and desire to conduct their lives according to their own desires. No one should be forced to live a life solely for the benefit and reputation of others. Honour killing is defined as the assassination of a person, whether male or female, who refuses to accept the family's arranged marriage or decides to move her or his marital life according to her or his wishes solely because it jeopardizes the family's honour. The family's supreme authority looks after the family's name but neglects to consider the love and affection shared among family members. I have discussed honour killing in India in my research work. This sort of murder occurs as a result of particular triggers, which are also examined in relation to the role of the law in honour killing. No one can be released free if they break the law, and in this case, it is a felony that violates various regulations designed to safeguard citizens. This crime is similar to many others, but it is distinct enough to be differentiated in the report. When the husband is of low social standing, it lowers the position and caste of the female family, prompting the male family members to murder the girl. But they forget that the girl is their kid and that while rank may be attained, a girl's life can never be replaced, and that caste is less valuable than the girl's life and love spent with them.
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...Dr. Amarjeet Singh
The impact caused by the Covid-19 Pandemic on Micro and Small and Medium Enterprises (MSMEs) was so severe and fatal
that not a few went out of business. The heavy burden is borne by MSME actors due to social restrictions imposed by the
government, the declining purchasing power of the people, a product that continues to decline until capital runs out. Plus
inadequate knowledge in carrying out marketing strategies and product innovations are the main trigger for the lack of
enthusiasm for MSME actors as well as bankruptcy. MSME digitalization-based e-commerce is an opportunity and the right
solution in dealing with the obstacles caused by the impact of Covid-19, as well as a challenge for MSME actors to design old
ways in new ways through digital business.
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...Dr. Amarjeet Singh
This paper presents the Modal space decoupled control for a hydraulically driven parallel mechanism has been presented. The approach is based on singular values decomposition to the properties of joint-space inverse mass matrix, and mapping of the control and feedback variables from the joint space to the decoupling modal space. The method transformed highly coupled six-input six-output dynamics into six independent single-input single-output (SISO) 1 DOF hydraulically driven mechanical systems. The novelty in this method is that the signals including control errors, control outputs and pressure feedbacks are transformed into decoupled modal space and also the proportional gains and dynamic pressure feedback are tuned in modal space. The results indicate that the conventional controller can only attenuate the resonance peaks of the lower eigenfrequencies of six rigid modes properly, and the peaking points of other relative higher eigenfrequencies are over damped, The further results show that it is very effective to design and tune the system in modal space and that the bandwidth increased substantially except surge (x) and sway (y) motions, each degree of freedom can be almost tuned independently and their bandwidths can be increased near to the undamped eigenfrequencies.
It is a known fact that a large number of Steel Industry Expansion projects in India have been delayed due to regulatory clearances, environmental issues and problems pertaining to land acquisition. Also, there are challenges in the tendering phase that affect viability of projects thus delaying implementation, construction phase is beset with over-runs and disputes and last but not the least; provider skills are weak all across the value chain. Given the critical role of Steel Sector in ensuring a sustained growth trajectory for India, it is imperative that we identify the core issues affecting completion of infrastructure projects in India and chalk out initiatives that need to be acted upon in short term as well as long term.
A blockchain is a decentralised database that is shared across computer network nodes. A blockchain acts as a database, storing information in a digital format. The study primarily aims to explore how in the future, block chain technology will alter several areas of the Indian economy. The current study aims to obtain a deeper understanding of blockchain technology's idea and implementation in India, as well as the technology's potential as a disruptive financial technological innovation.
Secondary sources such as reports, journals, papers, and websites were used to compile all the data. Current and relevant information were utilised to help understand the research goals. All the information is rationally organised to fulfil the objectives. The current research focuses on recommendations for enhancing India's Blockchain ecosystem so that it may become one of the best in the world at utilising this new technology.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Planning Of Procurement o different goods and services
Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular Ad hoc Networks
1. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-10, Issue-3 (June 2020)
www.ijemr.net https://doi.org/10.31033/ijemr.10.3.23
153 This work is licensed under Creative Commons Attribution 4.0 International License.
Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in
Vehicular Ad hoc Networks
Mahmood A. Al-shareeda1
, Mohammed Anbar2
, Selvakumar Manickam3
and Iznan H. Hasbullah4
1
Student, National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia (USM), 11800, Penang, MALAYSIA
2
Senior Lecturer, National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia (USM), 11800, Penang, MALAYSIA
3
Associate Professor, National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia (USM), 11800, Penang, MALAYSIA
4
Research Officer, National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia (USM), 11800, Penang, MALAYSIA
2
Corresponding Author: anbar@nav6.usm.my
ABSTRACT
Vehicular Ad-Hoc Network (VANET) is an
indispensable part of the Intelligent Transportation System
(ITS) due to its abilities to enhance traffic management and
safety. Many researchers have been focused on specific areas
involving management and storage data, protocols
standardization, network fragmentation, monitoring, and
quality of service. The benchmarks of security of VANET
are studied and figured out in this paper. VANET provides
the driver and passenger with the safety application as well as
entertainment service. However, the communication between
nodes in VANET is susceptible to security threats in both
communication modes, which indicates the main hazard. In
this paper, we identified different Man-In-The-Middle
(MITM) attacks with various behaviors such as message
tampering, message delaying, and message dropping,
according to the literature. In this study, the essential
background of VANET from architectural point of view and
communication types are discussed. Then, the overview of
MITM attack in VANET is presented. In addition, this paper
thoroughly reviews the existing prevention schemes for
MITM attack in VANET. This review paper reveals that
there is still a need for a better and more efficient preventive
scheme to address the MITM attack in VANET. This review
paper could serve as evidence and reference in the
development of any new security schemes for VANETs.
Keywords— Vehicular Ad hoc Networks (VANETs),
Security, Man-In-The-Middle (MITM), Authentication and
Attacks
I. INTRODUCTION
With the huge amount of road crashes, traffic
density, consumption of fuel, and pollution of the
environment, these issues have put human life in danger.
To reduce and manage these issues, the Intelligent
Transportation System (ITS) introduced the modern
technology Vehicular Ad-Hoc Network (VANET) which
does not only provide safety application for driver and
passenger but also offer the entertainment service during
travailing in driving environment[1]–[3]. This network is a
class of mobile ad-hoc network (MANET) [4]–[9].
Typically, the structure of VANET contains the
three main components, and one Trusted Authority (TA),
multiple fixed Road-Side Units (RSU), and a large number
of mobility On-Board Units (OBUs) which equipped for
each vehicle. The nodes of VANETs can exchange
information about its status in the driving road with others
by Vehicle-To-Vehicle (V2V) communication and
Vehicle-To-Infrastructure (V2I) communication via
Dedicated Short-Range Communication (DSRC)
technology.
Due to the nature of V2V and V2I
communications, VANET is susceptible to different types
of attacks, which can change, replay, and impersonate the
authentic message during the broadcasting process.
Therefore, security issues should be carefully considered
in VANET. Many researchers have been focused on
specific areas involving management and storage data,
protocols standardization, network fragmentation,
monitoring, and quality of service, but the benchmarks of
security of VANET are studied in this work.
However, the communication between nodes in
VANET is susceptible to various attackers, such as Man-
In-The-Middle (MITM) attacks, which indicates the main
hazard. In this paper, we identified different MITM attacks
with various their behavior, such as message tampering,
message delaying, and message dropping. This study could
serve as evidence and reference in the development of any
new security schemes for VANETs.
The rest of the paper is structured as follows. An
architecture of VANETs is described in Section II. Section
III briefly reviews the MITM attacks. A few current works
are listed in Section IV. Section V provides the conclusion
of this work.
II. THE ARCHITECTURE OF VANETs
2. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-10, Issue-3 (June 2020)
www.ijemr.net https://doi.org/10.31033/ijemr.10.3.23
154 This work is licensed under Creative Commons Attribution 4.0 International License.
Figure 1: The architecture of VANETs
A. VANET Components
As shown in Figure 1, there are three of main
components in VANETs [10][11].
1- Trusted Authority (TA)
Is fully trusted by all components in VANET with
strong resource in terms of computation, communication
and storage. The main responsibility of TA is to register
the other rest components and issue the public parameter
of system [12][13]. The communications between TA and
RSU, RSU, and OBU are wired technology and wireless
technology, respectively. The connection between TA and
RSU is ensured by a secure channel. Besides. The TA has
the ability to disclose the original identity of misbehavior
vehicles. Therefore, it traces the behavior of vehicles
during travailing in VANET[14][15].
2- Road-Side Units (RSUs)
Is installed to the roadside and works as interface
application between TA and vehicles [16][17]. The main
responsibility of RSU is to provide network access to all
the nodes within its range of communication. Moreover,
the RSU also sends the entertainment content to nearby
vehicles.
3- On-Board Units (OBUs)
To enhance traffic management and driving
experience, each vehicle is fitted with OBU, which allows
the vehicle to exchange information with other vehicles or
nearby RSUs within its range of communication. Each
OBU has TPD, which is possible by the attacker to reveal
the sensitive information stored [18]–[20].
B. VANET Communications
As shown in Figure 1, there are two of main mode
communication [21][22].
1- Vehicle-To-Vehicle (V2V) Communications
In communications of V2V [23][24], the vehicle
periodically exchanges the information about its driving
environments such as speed, location, and brake status
among the vehicles within range of communication [25].
Due to vehicle can only get the message from another
vehicle, this communication becomes deficient in
guaranteeing the owner of vehicle safety during travailing
in VANET.
2- Vehicle-To-Infrastructure (V2I) Communications
In communications of V2I [26][27], the vehicle
can exchange the information to nearby infrastructures
such as RSU among the road. The vehicle can request
entertainment service and access the internet [28]. This
type of communication is supplement with V2V
communications. The main aim of V2I communication is
to enhance traffic management and driving environment.
III. Overview of Man-In-The-Middle
(MITM) Attack
"Man-In-the-Middle" is the term used by
basketball players who attempt to intercept the ball in the
middle while two other players are attempting to pass it
[29][30]. In this context, the MITM attacker hazards
communication and alter information sent between
authentic vehicles in VANETs. This type of attack is a
leading creation disaster on the communication in
VANETs especially if information sent content includes
critical information about the statues road during the
driving environment. To lunch the MITM attack by an
adversary, he/she should be meet the following two
situations, (i) the information including important data
should be received by the misbehaving vehicle, and (ii) the
adversary has the ability to interpret the information
content [30]. Figure 2 shows the two types of MITM in
VANETs.
Passive Attacker: Passively, MITM can
eavesdrop on the network among authentic
vehicles.
Active Attacker: Actively, MITM can delays,
drops, or tampers the received message content in
the communication channel.
Figure 2: Man-In-The-Middle Attacks in VANET
Figure 4 shows the explanation of passive and
active MITM attacks in VANET. It can be shown that
passively, MITM can eavesdrop on the network among
authentic vehicles, and actively, MITM can delays, drops,
or tampers the received message content in the
3. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-10, Issue-3 (June 2020)
www.ijemr.net https://doi.org/10.31033/ijemr.10.3.23
155 This work is licensed under Creative Commons Attribution 4.0 International License.
communication channel. we identified different MITM
attacks with various their behavior such as message
tampering, message delaying, and message dropping,
according to [30].
Figure 3: Explanation of Passive and Active MITM
Attacks in VANET [30]
1- MITM as Message Delayed
In MITM as message delayed, the attacker
intentionally delays the messages, i.e., the messages are
sent to the next vehicle with a „delay‟ factor. This delay
causes severe consequences in the communication channel.
Therefore, this case can put the life of a person in hazard
[30].
2- MITM as Message Dropped
MITM as message dropped also indicates to
“black hole” attacks, where adversary deliberately drops
the received authentic information from the vehicle in
VANETs, therefore suppressing the extra propagation of
information[31]. Dropping such safety-related messages
can put the life of a person in hazard as they are prohibited
from receiving the personal message by the adversary [30].
3- MITM as Message Tampered
In MITM as message tampered, the adversary
essentially goals the received information content.
Whenever the attacker can receive a message, he/she alters
the information content. This tampered lead to a severe
impact on communication as the content may include a
personal message [30].
IV. LITERATURE SURVEY
He et al. [32] introduced security scheme based
privacy-preserving for both V2V and V2I communication
in VANETs. This scheme firstly utilizes Elliptic Curve
Cryptography (ECC) rather than bilinear pair operation
during the broadcasting procedure. This scheme supports
the batch verification process to authenticate a large
number of messages related to driving the environment in
VANET. According to a random oracle model related to
authentication of the message, they provide authentication
between the signer and the receiver. Therefore, the MITM
is resisting in their scheme.
Ali and Li [33] introduced an identity security
scheme based privacy-preserving for V2I communication
in VANETs. This scheme utilizes the operation of the
bilinear map to increase the process of message
authentication at RSU. Thus, they support the batch
verification process, which allows the RSU to verify
multiple messages during the broadcasting process. It
utilizes general one-way hash functions instead of map-to-
point hash functions during the verification in density area
with high traffic. The authentication process involves
between the signer and the receiver from a vehicle of
traffic-related messages transmitted. Therefore, the MITM
attack is resisting in V2I communication in their scheme.
Wu et al. [34] proposed a security scheme based
conditional privacy-preserving for V2V and V2I
communication in VANETs. This scheme depends on
location-based to use the position information to assign
partial master key of vehicles. To hide the original identity
of the vehicle, its sign information with unassociated
pseudonyms. This scheme does not utilize the TPDs and
bilinear pairing operations during the deployment of
VANETs. The adversary can set this MITM more easily.
Despite directly communicating with each other, the
MITM cannot relay and alter the communication between
singer and receiver in their scheme. Therefore, they should
be able to withstand the MITM attack.
Ming and Cheng [35] proposed security scheme
based privacy-preserving for V2I communication. This
scheme is based on certificateless cryptography and
(ECC). In their scheme, they do not use operations of
bilinear pairing and map-to-point hash function, which
them time-consumed. By using the verifying equation
from the verifier side, the MITM attack cannot modify any
message sent.
Cui et al. [36] introduced the data downloading
scenario in VANETs; therefore, they proposed a privacy-
preserving data downloading scheme to deal with multiple
huge numbers of data on Social media and real traffic. This
is because it's not fully efficient to plainly download the
form RSU. This scheme is based on the concept of edge
computing for V2V and V2I communication. By utilizing
the Advanced Encryption Standard (AES) algorithm, the
vehicle encrypted the downloading request sent to the
content service provider. Because of the hardness of AES
security, the MITM attack cannot decrypt the vehicle of
encrypted the downloading request sent without obtaining
the key messages of each session. Therefore, MITM may
need to obtain the key messages of each session from the
4. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-10, Issue-3 (June 2020)
www.ijemr.net https://doi.org/10.31033/ijemr.10.3.23
156 This work is licensed under Creative Commons Attribution 4.0 International License.
key agreement phase. Nevertheless, the MITM attack
cannot obtain the key messages of each session due to the
hardness of solving Elliptic Curve Computational Diffie
Hellman Problem (ECCDHP).
Alazzawi et al. [37] proposed a pseudo-ID-
based scheme for V2V and V2I communication. This
scheme based on utilizing a pseudonym rather than the
original identity and supports conditional anonymity,
authentication, and integrity of the message. In their
scheme, the time-consumed bilinear pairing operation is
not used during the signing and verifying the message. The
creation of the mutual authentication process is executed
between the signer and the receiver. If an attacker tries a
MITM attack, he/she requires to forge message-signature
to communicate with the signer and the receiver.
Nevertheless, according to the random oracle model, it is
impossible for an attack to release an MITM attack.
Li et al. [38] presented a provably-secure scheme
based conditional privacy-preserving to cope with the
problem of master key of the system, high overhead in
terms of computation cost during the broadcasting process.
This scheme supports security and privacy needed in the
services of VANET. This scheme also supports the mutual
authentication process to authenticity between the singer
and receiver. Therefore, their scheme is able to resist
MITM attacks in VANETs.
Ali et al. [39] introduced an identity security
scheme based privacy-preserving to secure communication
for V2V communication in VANETs. This scheme based
on ECC and supports the batch verification method. To
migrate the computation complexity, they utilize the
general one-way hash functions rather than Map-To-Point
hash functions. Due to the limit of V2V communication
that guarantees the absence of attackers. Therefore, this
scheme is protected against MITM attacks
V. CONCLUSION
VANET is one of the most important
technologies in ITS due to its role in providing
connectivity between all the components. This allows ITS
to offer of a wide range of services including entertainment
facilities, internet connectivity, and increase traffic safety
and efficiency for drivers and road users. However, the
VANET still confronts many challenges due to its often-
changing network topology due to high mobility of
vehicles on the road, and numerous security attacks such
as MITM attacks. This paper presents the survey of
existing schemes to prevent MITM attacks in VANET.
This review paper shows that there is still a need to address
the growing problems of security in VANET
communication for a robustness preventive scheme to
prevent MITM attack on VANET.
ACKNOWLEDGEMENT
This work is partially supported by National
Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia
and External Grant by UMobile Sdn Bhd (Grant no:
304/PNAV/650958/U154).
REFERENCES
[1] M. Bayat, M. Pournaghi, M. Rahimi, & M.
Barmshoory. (2019). NERA: A new and efficient RSU
based authentication scheme for VANETs. Wirel.
Networks, pp. 1–16.
[2] Z. Afzal & M. Kumar. (2020). Security of vehicular
Ad-hoc networks (VANET): A survey. In Journal of
Physics: Conference Series, 1427(1), 12015.
[3] A. K. Malhi, S. Batra, & H. S. Pannu. (2020). Security
of vehicular ad-hoc networks: A comprehensive survey.
Comput. Secur., 89, 101664.
[4] B. H. Khudayer, M. Anbar, S. M. Hanshi, & T.-C.
Wan. (2020). Efficient route discovery and link failure
detection mechanisms for source routing protocol in
mobile ad-hoc networks. IEEE Access, 8, 24019–24032.
[5] M. Al Shareeda, A. Khalil, & W. Fahs. (2018).
Towards the optimization of road side unit placement
using genetic algorithm. In: International Arab Conference
on Information Technology (ACIT), pp. 1–5.
[6] M. Al-Shalabi, M. Anbar, T.-C. Wan, & A.
Khasawneh. (2018). Variants of the low-energy adaptive
clustering hierarchy protocol: Survey, issues and
challenges. Electronics, 7(8), 136.
[7] M. Al-Shalabi, M. Anbar, T.-C. Wan, & Z. Alqattan.
(2019). Energy efficient multi-hop path in wireless sensor
networks using an enhanced genetic algorithm. Inf. Sci.
(Ny)., 500, 259–273.
[8] M. A. Al-Shalabi, M. Anbar, & A. Obeidat. (2019).
Alternating sensing process to prolong the lifetime of
wireless sensor networks. J. Theor. Appl. Inf.
Technol.(JATIT), 97(7), 2132–2141.
[9] A. K. Al-Ani, M. Anbar, A. Al-Ani, & D. R. Ibrahim.
(2020). Match-prevention technique against denial-of-
service attack on address resolution and duplicate address
detection processes in IPv6 link-local network. IEEE
Access, 8, 27122–27138.
[10] J. Cui, W. Xu, Y. Han, J. Zhang, & H. Zhong. (2020).
Secure mutual authentication with privacy preservation in
vehicular ad hoc networks. Veh. Commun., 21, 100200.
[11] S. Wang, K. Mao, F. Zhan, & D. Liu. (2020). Hybrid
conditional privacy-preserving authentication scheme for
VANETs. Peer-to-Peer Netw. Appl., 1–16.
[12] M. A. Alazzawi, K. Chen, A. A. Yassin, H. Lu, & F.
Abedi. (2019). Authentication and revocation scheme for
VANETs based on Chinese Remainder Theorem. In: IEEE
21st International Conference on High Performance
5. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-10, Issue-3 (June 2020)
www.ijemr.net https://doi.org/10.31033/ijemr.10.3.23
157 This work is licensed under Creative Commons Attribution 4.0 International License.
Computing and Communications; IEEE 17th International
Conference on Smart City; IEEE 5th International
Conference on Data Science and Systems
(HPCC/SmartCity/DSS), pp. 1541–1547.
[13] S. A. Alfadhli, S. Alresheedi, S. Lu, A. Fatani, & M.
Ince. (2019). ELCPH: An efficient lightweight conditional
privacy-preserving authentication scheme based on hash
function and local group secrete key for VANET. In:
Proceedings of the 2019 The World Symposium on
Software Engineering, pp. 32–36.
[14] J. Cui, D. Wu, J. Zhang, Y. Xu, & H. Zhong. (2019).
An efficient authentication scheme based on semi-trusted
authority in VANETs. IEEE Trans. Veh. Technol., 68(3),
2972–2986.
[15] X. Zhang, L. Mu, J. Zhao, & C. Xu. (2019). An
efficient anonymous authentication scheme with secure
communication in intelligent vehicular ad-hoc networks.
TIIS, 13(6), 3280–3298.
[16] M. S. Sheikh, J. Liang, & W. Wang. (2019). A survey
of security services, attacks, and applications for vehicular
ad hoc networks (vanets). Sensors, 19(16), 3589.
[17] I. Ali, A. Hassan, & F. Li. (2019). Authentication and
privacy schemes for vehicular ad hoc networks
(VANETs): A survey. Veh. Commun., 16, 45–61.
[18] H. Zhong, B. Huang, J. Cui, Y. Xu, & L. Liu. (2017).
Conditional privacy-preserving authentication using
registration list in vehicular ad hoc networks. IEEE Access,
6, 2241–2250.
[19] S. M. Pournaghi, B. Zahednejad, M. Bayat, & Y.
Farjami. (2018). NECPPA: A novel and efficient
conditional privacy-preserving authentication scheme for
VANET. Comput. Networks, 134, 78–92.
[20] S. E. Shladover. (2018). Connected and automated
vehicle systems: Introduction and overview. J. Intell.
Transp. Syst., 22(3), 190–200.
[21] J. Zhang, J. Cui, H. Zhong, Z. Chen, & L. Liu. (2019).
PA-CRT: Chinese remainder theorem based conditional
privacy-preserving authentication scheme in vehicular ad-
hoc networks. Available at:
https://leicester.figshare.com/articles/PA-
CRT_Chinese_Remainder_Theorem_Based_Conditional_
Privacy-
preserving_Authentication_Scheme_in_Vehicular_Ad-
hoc_Networks/10237562/1.
[22] J. Cui, L. Wei, J. Zhang, Y. Xu, & H. Zhong. (2018).
An efficient message-authentication scheme based on edge
computing for vehicular ad hoc networks. IEEE Trans.
Intell. Transp. Syst., 20(5), 1621–1632.
[23] M. S. Sheikh, J. Liang, & W. Wang. (2020). Security
and privacy in vehicular ad hoc network and vehicle cloud
computing: A survey. Available at:
https://www.hindawi.com/journals/wcmc/2020/5129620/..
[24] D. Manivannan, S. S. Moni, & S. Zeadally. (2020).
Secure authentication and privacy-preserving techniques in
vehicular ad-hoc NETworks (VANETs). Veh. Commun.,
pp. 100247.
[25] J. B. Kenney. (2011). Dedicated short-range
communications (DSRC) standards in the United States.
Proc. IEEE, 99(7), 1162–1182.
[26] M. A. Alazzawi, H. Lu, A. A. Yassin, & K. Chen.
(2019). Robust conditional privacy-preserving
authentication based on pseudonym root with cuckoo filter
in vehicular ad hoc networks. KSII Trans. Internet Inf.
Syst., 13(12), 6121–6144.
[27] M. Al Shareeda, A. Khalil, & W. Fahs. (2019).
Realistic heterogeneous genetic-based RSU placement
solution for V2I networks. Int. Arab J. Inf. Technol.,
16(3A), 540–547.
[28] X. Yang et al. (2019). A lightweight authentication
scheme for vehicular ad hoc networks based on MSR. Veh.
Commun., 15, 16–27.
[29] G. N. Nayak & S. G. Samaddar. (2010). Different
flavours of man-in-the-middle attack, consequences and
feasible solutions. In: 3rd International Conference on
Computer Science and Information Technology, 5, 491–
495.
[30] F. Ahmad, A. Adnane, V. N. L. Franqueira, F.
Kurugollu, & L. Liu. (2018). Man-in-the-middle attacks in
vehicular ad-hoc networks: Evaluating the impact of
attackers‟ strategies. Sensors, 18(11), 4040.
[31] J. Tobin, C. Thorpe, & L. Murphy. (2017). An
approach to mitigate black hole attacks on vehicular
wireless networks. In: IEEE 85th Vehicular Technology
Conference (VTC Spring), pp. 1–7.
[32] D. He, S. Zeadally, B. Xu, & X. Huang. (2015). An
efficient identity-based conditional privacy-preserving
authentication scheme for vehicular ad hoc networks.
IEEE Trans. Inf. Forensics Secur., 10(12), 2681–2691.
[33] I. Ali & F. Li. (2020). An efficient conditional
privacy-preserving authentication scheme for Vehicle-To-
Infrastructure communication in VANETs. Veh. Commun.,
22, 100228.
[34] L. Wu, J. Fan, Y. Xie, J. Wang, & Q. Liu. (2017).
Efficient location-based conditional privacy-preserving
authentication scheme for vehicle ad hoc networks. Int. J.
Distrib. Sens. Networks, 13(3), 1550147717700899.
[35] Y. Ming & H. Cheng. (2019). Efficient certificateless
conditional privacy-preserving authentication scheme in
VANETs. Available at:
https://www.hindawi.com/journals/misy/2019/7593138/.
[36] J. Cui, L. Wei, H. Zhong, J. Zhang, Y. Xu, & L. Liu.
(2020). Edge computing in VANETs- an efficient and
privacy-preserving cooperative downloading scheme.
IEEE J. Sel. Areas Commun., 38(6), 1191–1204.
[37] M. A. Alazzawi, H. Lu, A. A. Yassin, & K. Chen.
(2019). Efficient conditional anonymity with message
integrity and authentication in a vehicular ad-hoc network.
IEEE Access, 7, 71424–71435.
6. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-10, Issue-3 (June 2020)
www.ijemr.net https://doi.org/10.31033/ijemr.10.3.23
158 This work is licensed under Creative Commons Attribution 4.0 International License.
[38] J. Li et al. (2018). EPA-CPPA: An efficient,
provably-secure and anonymous conditional privacy-
preserving authentication scheme for vehicular ad hoc
networks. Veh. Commun., 13, 104–113.
[39] I. Ali, T. Lawrence, & F. Li. (2020). An efficient
identity-based signature scheme without bilinear pairing
for vehicle-to-vehicle communication in VANETs. J. Syst.
Archit., 103, 101692.