Vehicular Ad hoc Network (VANET) is the furthermost remarkable and an advantageous technique for the research field for improving the security and protection of drivers and passengers. It is an interesting subclass of Mobile Ad-hoc Network, which authorizes smart communication between vehicles furthermore in the middle of the vehicle and roadside frameworks. It is an application of a wireless network for witching the data – to the domain of vehicles. For the creation of trustful surroundings, trust can be practiced to increase the safety in vehicular networks, which is a major section of security. Trust can be considered by directly observing the human actions or indirectly by getting the neighbor's opinion which produces a trusted communicating environment. They turn into a principal component of intelligent transportation systems. There is a transitivity model in the existing work in which the Authentication Server (AS) provides the authority to Law Executor (LE) for authenticating the other vehicles as a trustful vehicle. So in proposed work a new technique in which there is no vehicle in the network to provide the authority. Trust is estimated by the nodes, then this value sends to the AS where this value is calculated and updated regularly. This method enhances the security of the network. NS2 simulator is used for the overall operation of the proposed work and throughput, PDR and routing overhead show the efficiency of the network.
Vehicular ad-hoc networks (VANETs) technology has come out as an important research field over the last few years. VANETs are the likely an influencing approach to provide safety of driver and other applications for the traffic conditions as well as passengers. Being dynamic in nature, it establishes the network, according to the situation and need of the users and provides reliable communication among the vehicles. Due to its great benefits, it is highly vulnerable to various attacks and security in VANET should be taken into consideration. This paper presented the security attacks between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). Many research works have been done to improve the performance and security of this network. The main aim of this paper is the security using hashing and techniques to calculate the trust in VANETs.
Master Thesis on Vehicular Ad-hoc Network (VANET)Prof Ansari
In present, many people during the public died each year in vehicle accidents, therefore in almost countries some safety data i.e. traffic lights & velocity limits are applied, simply however it is not a better solution. Also government and number of automation industries regarded that vehicular safety is real challenging task [1]. Then equally result, to enhance people traffic safety of a new progressed particular technology is formulated i.e. VANET [4]. It is progress type of MANET (Mobile Ad-hoc Network). VANET manages a network within which vehicles are act nodes and applied as mobile nodes to construct a robust infrastructure-less ad-hoc network. In Figure 1 illustrates the basic components of VANET architecture. It builds the network among Inter-Vehicle, Vehicle-to-Roadside and Inter-Roadside communicating networks [4]. Moreover, apart from accidental-safety and security types, there are also broad varieties of applications in VANET are available and potential that can extend passenger comfort like predictable mobility by GPS, web browsing and information modify and so on. Vehicular Ad-hoc Network (VANET) is a novel formulated form of Mobile Ad-hoc Network (MANET), where moving nodes are vehicles same automobiles, cars, buses etc [2].
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
Vehicular ad-hoc networks (VANETs) technology has turned out as a vital research field throughout the most recent couple of years. VANETs are the likely an impacting way to deal with giving security of driver and different applications for the activity conditions and additionally travelers. Being dynamic in nature, it created the network, according to the condition and requirement of the users and provides consistent communication between the vehicles. Due to its excessive advantages, it is highly susceptible to numerous attacks and security in VANET should be taken into consideration. This paper presented the security issues such as authenticity, integrity, availability, confidentiality, anonymity and non-repudiation to provide the secure communication between Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I). Numerous research works have been done to recover the performance and security of this network. The fundamental point of this paper is the several security challenges and the applications of VANETs.
The main aim of this dissertation is to evaluate the performance of Four routing protocols i.e. Destination Sequence Distance Vector Routing (DSDV), Ad hoc On Demand Distance Vector (AODV),survey over vanet routing protocols for vehicle to vehicle communication
Master thesis on Vehicular Ad hoc Networks (VANET)Prof Ansari
The increasing demand for wireless devices and wireless communication tends to research on self-organizing, self-healing networks without the interference of any pre-established or centralized infrastructure/authority [2]. The networks with the absence of any pre-established or centralized authority are known as Ad hoc networks [4]. Ad hoc Networks are the kind of wireless networks that uses multi-hop radio relay.There are many comparative studies and surveys that compare various ad hoc routing in VANET environment. The simulations performed in these comparative studies are very basic do not incorporate with a large number of nodes in real Vehicular Ad hoc Network environment. The main aim of our dissertation work is to firstly investigate the reactive and proactive routeing protocols than examine the performance of selected reactive routing protocols i.e. Destination Sequence Distance Vector Routing (DSDV), Ad hoc On-Demand Distance Vector (AODV), Optimized Link State Routing (OLSR) and Dynamic Source Routing (DSR)by taking three performance metrics like network load, throughput and end-to-end delay with varying number of mobile nodes or vehicle node densityOPNET: Optimized Network Engineering Tool (OPNET) is a commercial network simulator environment used for simulations of both wired and wireless networks [20]. Several different OPNET versions have been released over the last few years; the latest version of OPNET is the OPNET 16.0. At present OPNET is licensed under Riverbed technologies. It allows the user to design and study the network communication devices, protocols, individual applications and also simulate the performance of routing protocol. It supports many wireless technologies and standards such as, IEEE 802.11, IEEE 802.15.1, IEEE 802.16, IEEE 802.20 and satellite networks. OPNET IT Guru Academic Edition is available for free to the academic research and teaching community.
Vehicular ad-hoc networks (VANETs) technology has come out as an important research field over the last few years. VANETs are the likely an influencing approach to provide safety of driver and other applications for the traffic conditions as well as passengers. Being dynamic in nature, it establishes the network, according to the situation and need of the users and provides reliable communication among the vehicles. Due to its great benefits, it is highly vulnerable to various attacks and security in VANET should be taken into consideration. This paper presented the security attacks between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). Many research works have been done to improve the performance and security of this network. The main aim of this paper is the security using hashing and techniques to calculate the trust in VANETs.
Master Thesis on Vehicular Ad-hoc Network (VANET)Prof Ansari
In present, many people during the public died each year in vehicle accidents, therefore in almost countries some safety data i.e. traffic lights & velocity limits are applied, simply however it is not a better solution. Also government and number of automation industries regarded that vehicular safety is real challenging task [1]. Then equally result, to enhance people traffic safety of a new progressed particular technology is formulated i.e. VANET [4]. It is progress type of MANET (Mobile Ad-hoc Network). VANET manages a network within which vehicles are act nodes and applied as mobile nodes to construct a robust infrastructure-less ad-hoc network. In Figure 1 illustrates the basic components of VANET architecture. It builds the network among Inter-Vehicle, Vehicle-to-Roadside and Inter-Roadside communicating networks [4]. Moreover, apart from accidental-safety and security types, there are also broad varieties of applications in VANET are available and potential that can extend passenger comfort like predictable mobility by GPS, web browsing and information modify and so on. Vehicular Ad-hoc Network (VANET) is a novel formulated form of Mobile Ad-hoc Network (MANET), where moving nodes are vehicles same automobiles, cars, buses etc [2].
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
Vehicular ad-hoc networks (VANETs) technology has turned out as a vital research field throughout the most recent couple of years. VANETs are the likely an impacting way to deal with giving security of driver and different applications for the activity conditions and additionally travelers. Being dynamic in nature, it created the network, according to the condition and requirement of the users and provides consistent communication between the vehicles. Due to its excessive advantages, it is highly susceptible to numerous attacks and security in VANET should be taken into consideration. This paper presented the security issues such as authenticity, integrity, availability, confidentiality, anonymity and non-repudiation to provide the secure communication between Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I). Numerous research works have been done to recover the performance and security of this network. The fundamental point of this paper is the several security challenges and the applications of VANETs.
The main aim of this dissertation is to evaluate the performance of Four routing protocols i.e. Destination Sequence Distance Vector Routing (DSDV), Ad hoc On Demand Distance Vector (AODV),survey over vanet routing protocols for vehicle to vehicle communication
Master thesis on Vehicular Ad hoc Networks (VANET)Prof Ansari
The increasing demand for wireless devices and wireless communication tends to research on self-organizing, self-healing networks without the interference of any pre-established or centralized infrastructure/authority [2]. The networks with the absence of any pre-established or centralized authority are known as Ad hoc networks [4]. Ad hoc Networks are the kind of wireless networks that uses multi-hop radio relay.There are many comparative studies and surveys that compare various ad hoc routing in VANET environment. The simulations performed in these comparative studies are very basic do not incorporate with a large number of nodes in real Vehicular Ad hoc Network environment. The main aim of our dissertation work is to firstly investigate the reactive and proactive routeing protocols than examine the performance of selected reactive routing protocols i.e. Destination Sequence Distance Vector Routing (DSDV), Ad hoc On-Demand Distance Vector (AODV), Optimized Link State Routing (OLSR) and Dynamic Source Routing (DSR)by taking three performance metrics like network load, throughput and end-to-end delay with varying number of mobile nodes or vehicle node densityOPNET: Optimized Network Engineering Tool (OPNET) is a commercial network simulator environment used for simulations of both wired and wireless networks [20]. Several different OPNET versions have been released over the last few years; the latest version of OPNET is the OPNET 16.0. At present OPNET is licensed under Riverbed technologies. It allows the user to design and study the network communication devices, protocols, individual applications and also simulate the performance of routing protocol. It supports many wireless technologies and standards such as, IEEE 802.11, IEEE 802.15.1, IEEE 802.16, IEEE 802.20 and satellite networks. OPNET IT Guru Academic Edition is available for free to the academic research and teaching community.
vehicular Ad-Hoc Network:
this report contains a brief description on the VANET which can be considered as an application of MANET...
The report contains a basic overview, ITS, and routing algorithms.
In vehicular ad hoc network (VANETs), the applications mainly focused on the road challenging subclass of Mobile Ad-hoc Network, which empowers smart transmission among vehicles and between vehicles and roadside frameworks. It is an optimistic methodology for the Intelligent Transport System (ITS). There are numerous difficulties to be tended while utilizing VANET. It is flexible and has a high dynamic topology and flexibility which makes the conventional MANET protocols unacceptable for VANET. Trust is a principal element which is used to create a trustful environment to improve the security in vehicular networks. Trust can be calculated by observing the human behavior which creates a trusted communicating environment. In this paper, we define the architecture of VANET, then the communication establishment and various challenges. Some trust models had been defined in this paper to enforce honest information sharing between communicating nodes. Trust establishment is compulsory among communicating vehicles to build a secure messages exchange and reliability.
Vehicular Ad hoc Network (VANET) is the favorable method to enhance the safety of divers and passengers. It becomes a basic element of the Intelligent Transportation System (ITS). It has created by applying the concepts of Mobile Ad Hoc Networks (MANETs) – which is an application of a wireless network for exchanging the data – to the domain of vehicles. They become a main element of intelligent transportation systems. In existing technique drawback is the Authentication Server (AS) gives all the working to Law Executor (LE) means AS send information to RSU, RSU send this information to law executor and then login process start but if LE behave maliciously then this authentication process fail. In our propose work, we calculate the trust of each vehicle's on the basis of their behavior. Each vehicle calculates the trust of its neighbor and send this value to AS by RSU then AS update these values and then broadcast this value by RSU, now all the vehicles have a trust value of its neighboring vehicles so that send the data by using hashing technique and use trusted path to send data source to a destination so that security enhances.
This PowerPoint covers VANET in general and illustrates its Components, standards, applications,Types of communications
Fleet Management Systems, Routing protocols, Challenges, and the deployment of VANET in Real Scenarios
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...pijans
Vehicular ad hoc networks (VANETS) have actually attracted a lot of attention over the last few years as
being used to improve road safety. In this paper, cluster based technique has been introduced in VANET.
As VANET is a new form of MANET, so with this cluster based technique in VANET, several handoff
problems have been removed, which were actually difficult to remove in MANET. For this traffic
infrastructure cluster based routing has been used, with two routing protocols i.e. AODV and AODV+. The
network simulator NS2 has been used for removing unpredictable movements that may arise in the network.
Performance evaluation for vehicular ad-hoc networks based routing protocolsjournalBEEI
VANET is a branch of MANETS, where each vehicle is a node, and a wireless router will run. The vehicles are similar to each other will interact with a wide range of nodes or vehicles and establish a network. VANETs provide us with the infrastructure to build new solutions for improving safety and comfort for drivers and passengers. There are several routing protocols proposed and evaluated for improving VANET's performance. The simulator is preferred over external experience because it is easy, simple, and inexpensive. In this paper, we choose AODV protocol, DSDV protocol, and DSR protocol with five different nodes density. For each protocol, as regards specific parameters like (throughput, packet delivery ratio, and end- to- end delay). On simulators that allow users to build real-time navigation models of simulations using VANET. Tools (SUMO, MOVE, and NS-2) were used for this paper, then graphs were plotted for evaluation using Trace-graph. The results showed the DSR is much higher than AODV and DSDV, In terms of throughput. While DSDV is the best choice because of the low average end to end delay. From the above, we conclude that each strategy has its own negative and positive aspects that make it ideally suited to a particular scenario than other scenarios.
Vehicular Ad Hoc Network (VANET) is a more influential network in which vehicles depend on each other to communicate and for the secure exchange of the messages. With the improvement in the technology, mainly the vehicles are equipped with Wi-Fi and GPS devices to improve the traffic handling and road safety. But many vehicles may broadcast the bogus messages for their own purpose, so it needs a trustful environment and an effective trust management schemes to prevent the network from the various malicious attacks. Trust establishment is very challenging as the network is highly mobile and vehicles may come in or depart at any time. In this paper, we first discuss the VANET model to describe the environment, and then the trust management schemes to secure the network and lastly the various cryptography fundamentals for the fast and safe message transfer.
vehicular Ad-Hoc Network:
this report contains a brief description on the VANET which can be considered as an application of MANET...
The report contains a basic overview, ITS, and routing algorithms.
In vehicular ad hoc network (VANETs), the applications mainly focused on the road challenging subclass of Mobile Ad-hoc Network, which empowers smart transmission among vehicles and between vehicles and roadside frameworks. It is an optimistic methodology for the Intelligent Transport System (ITS). There are numerous difficulties to be tended while utilizing VANET. It is flexible and has a high dynamic topology and flexibility which makes the conventional MANET protocols unacceptable for VANET. Trust is a principal element which is used to create a trustful environment to improve the security in vehicular networks. Trust can be calculated by observing the human behavior which creates a trusted communicating environment. In this paper, we define the architecture of VANET, then the communication establishment and various challenges. Some trust models had been defined in this paper to enforce honest information sharing between communicating nodes. Trust establishment is compulsory among communicating vehicles to build a secure messages exchange and reliability.
Vehicular Ad hoc Network (VANET) is the favorable method to enhance the safety of divers and passengers. It becomes a basic element of the Intelligent Transportation System (ITS). It has created by applying the concepts of Mobile Ad Hoc Networks (MANETs) – which is an application of a wireless network for exchanging the data – to the domain of vehicles. They become a main element of intelligent transportation systems. In existing technique drawback is the Authentication Server (AS) gives all the working to Law Executor (LE) means AS send information to RSU, RSU send this information to law executor and then login process start but if LE behave maliciously then this authentication process fail. In our propose work, we calculate the trust of each vehicle's on the basis of their behavior. Each vehicle calculates the trust of its neighbor and send this value to AS by RSU then AS update these values and then broadcast this value by RSU, now all the vehicles have a trust value of its neighboring vehicles so that send the data by using hashing technique and use trusted path to send data source to a destination so that security enhances.
This PowerPoint covers VANET in general and illustrates its Components, standards, applications,Types of communications
Fleet Management Systems, Routing protocols, Challenges, and the deployment of VANET in Real Scenarios
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...pijans
Vehicular ad hoc networks (VANETS) have actually attracted a lot of attention over the last few years as
being used to improve road safety. In this paper, cluster based technique has been introduced in VANET.
As VANET is a new form of MANET, so with this cluster based technique in VANET, several handoff
problems have been removed, which were actually difficult to remove in MANET. For this traffic
infrastructure cluster based routing has been used, with two routing protocols i.e. AODV and AODV+. The
network simulator NS2 has been used for removing unpredictable movements that may arise in the network.
Performance evaluation for vehicular ad-hoc networks based routing protocolsjournalBEEI
VANET is a branch of MANETS, where each vehicle is a node, and a wireless router will run. The vehicles are similar to each other will interact with a wide range of nodes or vehicles and establish a network. VANETs provide us with the infrastructure to build new solutions for improving safety and comfort for drivers and passengers. There are several routing protocols proposed and evaluated for improving VANET's performance. The simulator is preferred over external experience because it is easy, simple, and inexpensive. In this paper, we choose AODV protocol, DSDV protocol, and DSR protocol with five different nodes density. For each protocol, as regards specific parameters like (throughput, packet delivery ratio, and end- to- end delay). On simulators that allow users to build real-time navigation models of simulations using VANET. Tools (SUMO, MOVE, and NS-2) were used for this paper, then graphs were plotted for evaluation using Trace-graph. The results showed the DSR is much higher than AODV and DSDV, In terms of throughput. While DSDV is the best choice because of the low average end to end delay. From the above, we conclude that each strategy has its own negative and positive aspects that make it ideally suited to a particular scenario than other scenarios.
Vehicular Ad Hoc Network (VANET) is a more influential network in which vehicles depend on each other to communicate and for the secure exchange of the messages. With the improvement in the technology, mainly the vehicles are equipped with Wi-Fi and GPS devices to improve the traffic handling and road safety. But many vehicles may broadcast the bogus messages for their own purpose, so it needs a trustful environment and an effective trust management schemes to prevent the network from the various malicious attacks. Trust establishment is very challenging as the network is highly mobile and vehicles may come in or depart at any time. In this paper, we first discuss the VANET model to describe the environment, and then the trust management schemes to secure the network and lastly the various cryptography fundamentals for the fast and safe message transfer.
Vehicular ad hoc network is one of the most interesting research areas due to flexibility, low cost, high sensing fidelity, fault tolerance, creating many new and exciting application areas for remote sensing. So, it has emerged as a promising tool for monitoring the physical world with wireless sensor that can sense, process and communicate. Being ad-hoc in nature, VANET is a type of networks that is created from the concept of establishing a network of cars for a specific need or situation. VANETs have now been established as reliable networks that vehicles use for communication purpose on highways or urban environments. VANET considered as a distinct type of Mobile Ad Hoc Networks holds the opportunity to make peoples life and death decisions by predicting and helping the drivers and other people about the road safety and other critical conditions.
A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)IAEME Publication
Since Vehicular ad hoc networks (VANETs) are vulnerable to various kinds of attacks, there is a need to fulfill the security requirements like message privacy, integrity, and authentication. The authentication technique is said to be efficient if it detects compromised nodes accurately with less complexity, reduced authentication delay, and keying overhead. In this paper, a threshold-based authentication scheme for cluster-based VANETs is proposed. The vehicles are clustered, and the threshold degree of each node is estimated. The threshold degree is a combination of direct threshold degree and indirect threshold degree. Based on this estimated threshold degree, cluster heads are selected. Then, each vehicle is monitored by a set of verifiers, and the messages are digitally signed by the sender and encrypted using a public/ private key as distributed by a threshold authority and decrypted by the destination. This verifies the identity of sender as well as receiver thus providing authentication to the scheme. By simulation results, we prove that the proposed technique provides high security with less overhead and delay.
Optimization of Quality of Service (QoS) framework for highway based Vehicula...IJERA Editor
The Vehicular Ad-hoc Network is a novel technology. It has the property of higher node mobility. Vehicular Adhoc
networks offer wireless communications between vehicles themselves (V2V) and between vehicles to the
roadside units (V2R). The VANET is an active research area, as it has great prospective to enhance the road and
vehicle safety, efficiency of traffic. Vehicular Ad-hoc Network not only just provides the safety applications, but
also provides communication to the users. The QoS support in VANET is a challenge when the existing routing
paths become no longer are available as a result of changes in the velocity and position of node, and distance
between the vehicular nodes or network topology. In this study we designed a framework which provides us the
facility to enhance various Quality of Service parameters, such as End to End Delay, throughput and packet loss
ratio etc. The proposed model uses layered approach, deep classification as existed QoS components are further
broken down and provides Quality of Experience to the users. NCTUns is used as simulation tool to build up
simulations. After getting the results of simulation we carried out the performance analysis of various routing
protocols. The simulation results indicate that the proposed scheme provides much better performance in terms
of various QoS parameters like End to End Delay, throughput and packet loss ratio
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
Vehicles download the data when passing through a drive through the road (RSU) and then share the data after travelling outside the coverage of RSU.A key issue of downloading
cooperative data is how effectively data is shared among them self. Developing an application layer data exchange protocol for the coordination of vehicles to exchange data according to
their geographic locations. Coordinated sharing can avoid medium access control (MAC) layer
collisions and the hidden terminal effect can be avoided in the multi-hop transmission. A salient
feature of the application layer data exchange protocol, in the voluntary services, Vehicles purchase the requested data from service provider via RSUs. In this project, we propose a
cooperative data sharing with secure framework for voluntary services in special vehicles networks (VANETs). We also concentrate on security in the process of downloading data and
sharing. Applicants to ensure exclusive access to data applied and security of the vehicles
involved in the implementation.
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
Designing a protocol structure which contains the control system, VANET device and the type of communication message structures which will implement the message packets for v2v or v2I infrastructure . The different message packets contain the information required to transfer from one node to another in vehicular network for communication. Design various algorithm required for Control, Alert and Infotainment messages. Time stamping lowering data rate efficient packet delivery and proper communication of required messages. Implementation of proposed algorithms and comparison of them with existing algorithms and study of different factors affecting the working of theses algorithms. Analysis of proposed design approach and improvements in results if required.
The main idea behind trusted computing is the hardware based TPM which contains active security modules that supports web of trust to be built within components of the network. We propose a new model for web of trust within vehicular to handle all types of attacks and maintain the integrity of messages.
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksIJCNCJournal
For creating a mobile network, the moving cars consider as nodes in the Vehicular Ad-Hoc Networks (VANETs). Each participating car is turned into a wireless router in the VANETs that allows the connecting and creating a network. To improve the comfort and safety of driving of automotive users, the vehicular environment system develops in the vehicular environment systems using the wireless access. The channel congestion causes the degradation of quality of service in such cases with higher vehicle density. The real-time and reliable communication is required for various safety applications of VANETs. The dense traffic network has included one of the major challenges as avoiding the communication channels’ degradation. To provide the network with efficient operation, most of the studies are recommended to use the appropriate congestion control methods. It’s important to note that many congestion control mechanisms are not implemented for event-driven real-time safety messages. Based on the congestion probability approach estimation, CFRS-CP-Congestion free route selection is introduced for minimizing the total number of data flow packets that passing through the congested nodes. At each node, the congestion probability is estimated using the proposed technique of CFRS-CP based on link quality, MAC overhead, neighbour density & vehicle velocity. Then, the estimated congestion probability is used for route assessment. The estimated probability value is appended to the control packets for comparison. All the available routes are assessed based on the estimated congestion probability which results in congestion free routing path for every round of data communication. The simulation results prove that the proposed method decreases end to end delay by 32% and improves PDR up to 30% and throughput up to 45% compared to the existing protocols.
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSIJCNCJournal
For creating a mobile network, the moving cars consider as nodes in the Vehicular Ad-Hoc Networks
(VANETs). Each participating car is turned into a wireless router in the VANETs that allows the
connecting and creating a network. To improve the comfort and safety of driving of automotive users, the
vehicular environment system develops in the vehicular environment systems using the wireless access. The
channel congestion causes the degradation of quality of service in such cases with higher vehicle density.
The real-time and reliable communication is required for various safety applications of VANETs. The
dense traffic network has included one of the major challenges as avoiding the communication channels’
degradation. To provide the network with efficient operation, most of the studies are recommended to use
the appropriate congestion control methods. It’s important to note that many congestion control
mechanisms are not implemented for event-driven real-time safety messages. Based on the congestion
probability approach estimation, CFRS-CP-Congestion free route selection is introduced for minimizing
the total number of data flow packets that passing through the congested nodes. At each node, the
congestion probability is estimated using the proposed technique of CFRS-CP based on link quality, MAC
overhead, neighbour density & vehicle velocity. Then, the estimated congestion probability is used for
route assessment. The estimated probability value is appended to the control packets for comparison. All
the available routes are assessed based on the estimated congestion probability which results in congestion
free routing path for every round of data communication. The simulation results prove that the proposed
method decreases end to end delay by 32% and improves PDR up to 30% and throughput up to 45%
compared to the existing protocols.
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Networkpaperpublications3
Abstract: Vehicular ad hoc networks (VANETs) can provide scalable and cost-effective solutions for applications such as traffic safety, dynamic route planning, and context-aware advertisement using short-range wireless communication. To function properly, these applications require efficient routing protocols. However, existing mobile ad hoc network routing and forwarding approaches have limited performance in VANETs. This dissertation shows that routing protocols which account for VANET-specific characteristics in their designs, such as position and mobility of Vehicle, can provide good performance for a large spectrum of applications.
Increased vehicular traffic demands smart vehicles which can interact with each other and roadside infrastructure to prevent accidents. Vehicular Ad-hoc Network (VANET) provides this flexibility to the vehicles. In this desertion we initially analyze the performance of AODV and OLSR, and further we improve the performance of AODV by selecting the node on the basis of trust value of the successive nodes, we also reduce the neighbor hood expiry time and correspondingly update the route table of AODV, with this purposed approach we would be able to reduce the end-to-end delay of AODV sufficiently also the performance of AODV increase in terms of Throughput and packet delivery ratio.Keywords: VANET, AODV, ROUTING, ROUT TABLE.
Title: Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Author: Dalbir Singh, Amit Jain (Asst. Prof.)
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUDIJCI JOURNAL
Vehicular Ad-hoc Networks (VANET’S) have become viable and valuable for their wide variety of novel
applications to improve driver’s experience. The topology of network is highly time varying due to high
mobility of vehicular nodes. This makes challenging to detect and diagnose errors in software
applications used in the vehicles. Software reliability in vehicles is critical factor and significant
challenge to be met. Misbehaving and faulty software applications in vehicle have to be detected and
diagnosed from disrupting operation as it is hard to address in life critical vehicular network
environment. The work proposes an advanced diagnostics system to be loaded in Road Side Units (RSU’s)
so that operating software is periodically transmits the codes generated by the vehicle configured with
OBD to the RSU for test. The software is diagnosed at the RSU accessing the data from cloud servers for
reliability. Later, a fixed patch is transmitted back to the vehicle via RSU’s. The result in this paper shows
the analysis of different temperature variables used in vehicles and are efficiently measured.
SOTM : A Self Organized Trust Management System for VANET csandit
Security and trust management in Vehicular Adhoc NETworks (VANET) is a crucial research domain
which is the scope of many researches and domains. Although, the majority of the proposed trust
management systems for VANET are based on specific road infrastructure, which may not be present in all
the roads. Therefore, road security should be managed by vehicles themselves. In this paper, we propose a
new Self Organized Trust Management system (SOTM). This system has the responsibility to cut with the
spread of false warnings in the network through four principal components: cooperation, trust
management, communication and security.
SOTM: A SELF ORGANIZED TRUST MANAGEMENT SYSTEM FOR VANET cscpconf
Security and trust management in Vehicular Adhoc NETworks (VANET) is a crucial research domain which is the scope of many researches and domains. Although, the majority of the proposed trust management systems for VANET are based on specific road infrastructure, which may not be present in all the roads. Therefore, road security should be managed by vehicles themselves. In this paper, we propose a new Self Organized Trust Management system (SOTM). This system has the responsibility to cut with the spread of false warnings in the network through four principal components: cooperation, trust management, communication and security.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Dr. Amarjeet Singh
Vehicular Ad-hoc Network (VANET) technology is the basis of Intelligent Transportation System (ITS) connectivity that enables the delivery of useful information to and fro between vehicles in vehicle-to-vehicle communication mode; or between vehicle and infrastructure in vehicle-to-infrastructure mode for safety and comfort. However, due to the openness of the wireless medium used by VANET, the technology is vulnerable to security threats in both communication modes. In this study, the essential background of VANET from architectural point of view and communication types are discussed. Then, the overview of modification attack in VANET is presented. In addition, this paper thoroughly reviews the existing prevention schemes for modification attack in VANET. This review paper reveals that there is still a need for a better and more efficient preventive scheme to address the modification attack in VANET.
Similar to VANET for Security using Cryptography (20)
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
1. International Journal of Advanced Science and Technology
Vol.109 (2017), pp.1-12
http://dx.doi.org/10.14257/ijast.2017.109.01
ISSN: 2005-4238 IJAST
Copyright ⓒ 2017 SERSC Australia
Secure Node Communication With Cryptographic Algorithm in
Vehicular Ad Hoc Networks
1
Pallavi Agarwal
Gwalior, India
pallaviagarwal015@gmail.com
Abstract
Vehicular Ad hoc Network (VANET) is the furthermost remarkable and an
advantageous technique for the research field for improving the security and protection of
drivers and passengers. It is an interesting subclass of Mobile Ad-hoc Network, which
authorizes smart communication between vehicles furthermore in the middle of the
vehicle and roadside frameworks. It is an application of a wireless network for switching
the data – to the domain of vehicles. For the creation of trustful surroundings, trust can
be practiced to increase the safety in vehicular networks, which is a major section of
security. Trust can be considered by directly observing the human actions or indirectly by
getting the neighbor's opinion which produces a trusted communicating environment.
They turn into a principal component of intelligent transportation systems. There is a
transitivity model in the existing work in which the Authentication Server (AS) provides
the authority to Law Executor (LE) for authenticating the other vehicles as a trustful
vehicle. So in proposed work a new technique in which there is no vehicle in the network
to provide the authority. Trust is estimated by the nodes, then this value sends to the AS
where this value is calculated and updated regularly. This method enhances the security
of the network. NS2 simulator is used for the overall operation of the proposed work and
throughput, PDR and routing overhead show the efficiency of the network.
Keywords: VANET, OBU, RSU, LE, AS, Security, and Hashing Algorithm
1. Introduction
VANET is likewise perceived as a vehicular sensor network by which safety of driving
is improved through between vehicle interchanges or correspondences with roadside
framework [1]. In VANETs, vehicles are furnished with remote onboard units (OBUs),
which interchange message with each other or with roadside units (RSUs) with a
Dedicated Short Range Correspondence (DSRC) protocol [2]. As indicated by the DSRC
protocol, which applies the IEEE 802.11p standard for wireless communication, every
vehicle in a VANET communicates by broadcasting traffic safety message each 100-300
ms, which keeps the vehicle’s driving-related data, for example, area, speed, turning goal,
and driving status (e.g., normal driving, sitting waiting for traffic light, congested driving
conditions, and so on.), to different vehicles. With the incoming data, different drivers can
make an early reaction on account of remarkable circumstances, for example, accidents,
emergency braking, and congested roads. Despite the various points of interest of
launching a VANET, security concerns must be very much tended to before we set these
application situations in preparation. Premier of all, message respectability must be
guaranteed. Besides, message senders ought to be validated so as to protect attacks of
impersonation [3]. We see a twist phase of VANETs where Road Side Units (RSUs) are
broadly installed, and every vehicle is fitted with an OBU. Specifically, trust authority
Received (August 30, 2017), Review Result (November 13, 2017), Accepted (November 14, 2017)
2. International Journal of Advanced Science and Technology
Vol.109 (2017)
2 Copyright ⓒ 2017 SERSC Australia
(TA), a server, few static RSUs and vehicles traveling on the roads installed with OBUs,
as indicated in Figure 1.
A. TA:
Trust authority plays a significant role in the whole system, which takes charge of
registration of the server, all RSUs, and vehicles.
B. Server:
In general, the server delivers a high storing and computational capability which stores
the feedback data table, trust table and reputation table for the whole organization.
Employing the information in those tables, the server also calculates the trust scores for
other vehicles and reputation scores for vehicles. Specifically, every time when a potential
user’s vehicle requests to link up a platoon, the server will respond this request by
recommending the most trusted vehicle.
C. RSUs:
RSUs are associated with wired lines and protected channels to the server and TA, in
the meantime, they deliver wireless connections to the vehicles. Both the feedbacks of
used vehicles and trip details updates of vehicles will be forwarded through RSUs to TA
or host. From this point of view, RSUs can be regarded as relays of data between vehicles
and TA or between vehicles and server. In our system model, we assume that RSUs are
widely deployed on the roads to compensate the whole area which assures that the
vehicles are able to update the information timely when driving along the roads. In few
regions where RSUs are thinly organized, the update of the feedbacks and traveling data
of vehicles are postponed. Only, in the long run, the system is still proficient [4].
D. Vehicles:
The vehicles can be considered as a group of extremely mobile nodes equipped with
OBUs which permit them to communicate with other vehicles or RSUs. Through V-2-I
communication, a vehicle updates its own traveling information or uploads feedback
scores to the server when passing RSUs. The drivers of the vehicles can demand either to
drive individually or to bring together a platoon.
Figure 1. VANET Framework
3. International Journal of Advanced Science and Technology
Vol.109 (2017)
Copyright ⓒ 2017 SERSC Australia 3
2. Related Work
Hu et al., [2016] in this paper, they proposed a consistent trust-based platoon service
recommendation scheme, named REPLACE, to support the user vehicles to avoid
selecting badly-behaved platoon head vehicles. In particular, at the center of REPLACE, a
reputation system is intended for the platoon head vehicles by gathering and displaying
their user vehicle’s feedbacks. And so an iterative filtering algorithm is designed to share
with the untruthful feedbacks from other vehicles. A detailed security analysis is given to
demonstrate that our proposed REPLACE scheme is safe and robust against badmouthing,
ballot-stuffing, newcomer and on-off attacks existing in VANETs. In summation, we
conduct extensive experiments to illustrate the correctness, accuracy, and validity of our
proposed method [4].
Wenjia Li et al., [2016] proposed ART which is an attack-resistant trust administration
method called ART is proposed to survey the dependability of the two information
activity and vehicle hubs for VANETs. In this framework, the creator had assessed the
reliability of the information and hubs into two separate grids Data Trust and Node Trust
individually. The trustworthiness of nodes further consists of functional trust and
recommendation trust. The data trust is used to appraise whether or not and to what extent
the reported traffic data are trustworthy. On the other hand, node trust indicates how
trustworthy the nodes in VANETs are. The proposed scheme uses the Cosine-based
similarity metric which is utilized to evaluate how similar the two vectors are. It has been
proven that this ART scheme does not incur extra communication overhead & can still
hold out the zigzag attack and achieve high precision and recall even when there are 40%
of malicious nodes [5].
Hind Al Falasi et al., [2015] uses the similarity to assign trust ratings to the vehicles in
the network & then use these trust ratings to recognize the abnormal vehicles. Throughout
the journey, the vehicle listens for beacons sent from its one-hop neighbor. The received
data is processed and stored in the receiving vehicle for handling later. According to this
system, at a given time, a vehicle in the VANET listens to only those vehicles that
preserve the similar speed by itself. The resulting similarity rating is forwarded to the
Decision Maker Module for calculating the Trust rating of the neighborhood vehicles. The
higher the trust rate of the vehicle, more reliable is the data from that vehicle. The author
has designed the system to use data mining techniques to find the highly valuable
information in a highly dynamic network. Merely, this scheme does not regard any other
attribute than Speed in the neighborhood to estimate the similarity rating in the VANET
[6].
Alexandra Rivero-Garcia et. al., [2016] presented a real of event alerts. This scheme is
based on several components like the confirmation votes of the users, their profiles &their
Trust levels. The proposed scheme is founded on the assumption that system will melt on
the mobile device of the drivers. And the smartphones are the connections between the
user and the community through clouds, using audio notification. The basic focus of this
proposal to install VANET to smartphones. The user can accomplish three actions:
Generate, Verify or Deny an event. The author had introduced a collaborative warning
system of road events based on user trust. The main complication in this arrangement is
that they don’t have feedback from and between users, as user tests to measure
satisfaction, user rates between them or even comments or relationship ties. The only
thing system considers is the user behavior in other events [7].
Wu et al., [2011] proposed that an RSU Aided Scheme for Trust Establishment is
offered which lays emphasis on data rather than on the reputation of the providing
entities. This scheme has the power to integrate observed data with feedback information,
when judging the trustworthiness of data, and eventually improves the accuracy of the
evaluation result [8].
4. International Journal of Advanced Science and Technology
Vol.109 (2017)
4 Copyright ⓒ 2017 SERSC Australia
Kothari et al., [2016] the proposed solution based on Information oriented trust [7]. As
according to our method we should concentrate more on evaluating the trustworthiness in
data, because if a node receives a serious information regarding an accident on the road,
and so it is more important to calculate trust on that data rather than centering on which
guest has sent this info. The primary advantage of our approach is that it prevents attacks
which are managed by the trusty nodes, which act maliciously for their own personal
motives. Agreeing to methodology every node also takes into attention similarity
parameter in terms of speed which plays a significant part in evaluating trust value [9].
Sharma et al., [2015] in this work, the utilization of Dempster-Shafer Theory (DST) for
processing trust in the VANET condition for area assurance is exhibited. Trust-based
location finding in VANET is essential to deter the spread of selfish or malicious
messages and also enable other vehicles to filter out such messages. The outcome
indicates that the proposed scheme is operable in the VANET environment [10].
3. Trust
Security and trust are very important factors in the vehicular network and basic user
requirements [11]. The user, vehicle, and RSU are some of the components of the
vehicular network. Trust is the key component of the security framework. At the point
when users get any message from another vehicle or from the framework, it ought to be
trusted because user responds as indicated by the message. To build the trust, it is required
to provide trust between the users in the communication vehicle to vehicle (V2V) and
vehicle to infrastructure (V2I). The attackers change the contents of the message and
break the trust between the vehicles. Figure 3 shows the trust components of the vehicular
network. Trusted Users (TUs) are those who perform their task properly in the network.
The behavior of a trusted user may change upon receiving messages from other vehicles
or from the RSU. When a trusted user receives an accident warning or traffic jam
message, the user is required to modify his/her conduct, that is, slow down his/her vehicle
or route change. Figure 4 describes the state of affairs in which vehicle C sends a warning
message to other vehicles (D, E). As a solution, the users of vehicles D and E slow down
their speeds and may call for an alternative route due to the accident warning message
[12]. VANET is a decentralized, open system, i.e., there is no centralized infrastructure
and peers may get together and give the net any time respectively. If a peer is interacting
with a vehicle right away, it is not guaranteed to interact with the same vehicle in the
hereafter. And in such an environment, there is much uncertainty in determining whom to
believe. Trust refers to the confidence of an entity of VANET on another entity. It is
established on the desire that the other substance will play out a specific activity
accepted/expected/accepted by the originator. Trust depends on the way that the trusted
substance won't act maliciously in a specific circumstance [13]. As nobody can be certain
beyond a doubt of this reality, trust is totally reliant on the conviction of the trustor. An
element is a physical gadget that participates in the correspondence procedure, e.g., OBUs
and RSUs utilized as a part of VANET. Trust denotes to how much a hub ought to be
dependable, secure or reliable for any connection with different hubs. A hub can take part
in the procedure of communication in VANET just if this hub is treatable for different
hubs and fulfills the trustful necessity. A hub can have distinctive trust esteems when
assessed by various hubs since the fact that the necessity of trust calculation might be
diverse for singular hubs. Trust is dependent on time as it can develop and decline over
some undefined time frame
Assume T(A, B) is a relationship of trust between hub A and B. On the off chance that
one hub trusts another hub to play out the normal operation, the trust connection between
these hubs can be set up dependably from initiator's perspective. On the off chance that
hub A needs some activity performed by hub B and if B is effectively playing out this
activity, B is a trusted for hub A. Hub A will build the value of trust of B for its great
5. International Journal of Advanced Science and Technology
Vol.109 (2017)
Copyright ⓒ 2017 SERSC Australia 5
nature. So, the trust esteem continues expanding for every action performed by a hub that
was normal by the initiator. Trust foundation and administration are basic parts of a
security system of VANET. Building trust in ad hoc networks is an interesting task. It
depends on setting up trust relationships involved with neighboring hubs. These trust
connections start, create and terminate much of the time. The procedure of trust
foundation is basically difficult because of the non-existence of static framework, brief
span of connections, shared remote medium and physical weakness. For beating these
issues, trust is built up in especially ad hoc networks using few expectations like pre-
configuration of nodes with secret keys and existence of centralized authority.
The number of hub's movement is denoted as hub's trust confirmation and it
builds/diminishes once it collaborates effectively with the correspondence initiator or not.
Trust relations depend on the proof made by the past cooperations of the substances inside
the application. At first, the reliability of the considerable number of hubs in the system is
set to some default esteem. This esteem is changed at whatever point a hub gets some data
with respect to its dependability as far as both immediate and secondary perceptions. At
whatever point a hub watches any kind of bad conduct from neighboring hub, it decreases
its trust an incentive as indicated by the discipline factor. This discipline factor is diverse
for various mischievous activities. Misbehavior incorporates dropping, alteration and
misrouting of data at the system layer and sending false RTS/CTS in the MAC layer, and
so on. The vast majority of the security plans rely upon predefined edge or preparing
information to develop the malicious performance of the attackers. In any case, it is
extremely hard to set edges and gather preparing informational indexes of attacks in ad
hoc networks [14].
4. Proposed Work
In our proposed work, firstly we did not provide any authority to LE for authenticating
other MTVs. So if LE behaves maliciously then the security cannot be affected. When
vehicles come in a range of RSU then it directly communicates with RSU and RSU
communicate to AS. For sending some data from source to destination, every vehicle has
to send HELLO packet to all its neighbors. By this, vehicles can interact with its
neighboring vehicles, then calculate the trust. When the neighboring vehicles forward or
aren’t dropping the HELLO packet, then it is considered as a trustful vehicle otherwise
MTV. We calculate the trust of each vehicle on the basis of their behavior. If the vehicle
is trustful then its trust value increases or vice-versa. Each vehicle calculates trust of its
neighbor and sends this value to RSU. Then RSU updates these values with the help of
AS and then broadcast this value. Now all the vehicles have a trust value of vehicles so
that send data by using hashing technique. All vehicles forward data by using the trusted
path to send the data source to a destination so that security enhances.
Here we used SHA-1 (Secure Hash Algorithm) because it has very fast computation
process and also very secure to transmit the data. When sender X sends the data, then they
used its private key and receiver Y verifies it by using the sender’s public key. It produces
a hash value of 160 bits and 80 rounds, which is enough for securing the data in VANET.
It converts the message into the block of 512 bits. Where || is a concatenation of two
strings M and N. K is a key which is used to convert the messages and nonce value.
6. International Journal of Advanced Science and Technology
Vol.109 (2017)
6 Copyright ⓒ 2017 SERSC Australia
Figure 1. Hash Value by using Public Key Encryption
An example is SHA 1: {0,1}128
×{0,1}<264
→ {0,1}160
This hash function takes a 128-bit key and an input M of at most 264
bits and returns a
160-bit output. SHA1 was proposed by Ron Rivest in 1990 which is derived from a
function called MD4 that and the key ideas behind SHA1 are already in MD4. Besides
SHA1, MD5 is another well-known form of MD4, which was similarly proposed by
Rivest. The MD4, MD5, and SHA1 algorithms are all quite similar in structure. The first
two produce a 128-bit output that goes from 512+128 bits to 128 bits, while SHA1
produces a 160-bit output that goes from 512 + 160 bits to 160 bits.
Proposed Algorithm:
Step 1:Start
Step 2:Broadcast request packet
Step 3:Forward packet towards the destination
Step 4:Get the response from the destination
Step 5:Now calculate trust value of each node
Step 6:If(drop>threshold)
Increase trust value
Else
Decrease trust value
Step 7:Evaluate the trust value and send to RSU
Step 8:Now RSU sends this to AS
Step 9:Update trust value
Step 10: Nodes perform login process every time
when coming in a range of RSU
Step 11: Apply hashing algorithm to secure the data
Step 12: Send data with hashed data towards the
destination
Step 13: Exit
7. International Journal of Advanced Science and Technology
Vol.109 (2017)
Copyright ⓒ 2017 SERSC Australia 7
Figure 2. Flow Chart of Proposed Algorithm
Start
Broadcast Request Packet
Forward packet towards destination
Get the response from destination
Calculate trust value of each node
destination
If (drop > threshold)
Increase trust value
Evaluate trust value at vehicle
Send to RSU
RSU sends to AS
Update Trust value
Perform Login
Apply Hashing Algorithm
Send data to destination
Exit
Decrease
trust value
No
Yes
8. International Journal of Advanced Science and Technology
Vol.109 (2017)
8 Copyright ⓒ 2017 SERSC Australia
5. Result Analysis
The simulation is done in NS2 [22] which show the topology of 800m x 1000m.
Various parameters are described in Table 1. The performance of network analyses of
PDR, throughput and routing overhead over the network.
Table 1. Simulation Parameters and their Values
Parameters Values
Network Size 800m x 1000m
Number of Vehicles 50
Packet Size 512 Bytes
Simulation Time 100s
MAC Protocols Used
Medium Access
Control/802_11
Routing Protocol Used AODV
Traffic Type Constant Bit Rate (CBR)
A. Packet Delivery Ratio (PDR)
The total number of packets received by the destination node as compared to the total
number of packets transmitted by the source node which is defined as the packet delivery
ratio. The Figure 3 represents a PDR graph between base approach and the proposed
approach. The packet delivery ratio of the proposed approach generates the better result
than the existing approach.
Figure 3. PDR Graph
Table 2. Packet Delivery Ratio
Time (in ms) Base paper Propose paper
10 49.9931 57.727
20 49.9967 64.8016
30 49.9979 70.9358
40 49.9984 75.9495
50 49.9987 78.9522
60 49.9989 74.969
70 49.9991 78.989
80 49.9992 79.9893
90 49.9993 80.9896
100 49.9994 85
9. International Journal of Advanced Science and Technology
Vol.109 (2017)
Copyright ⓒ 2017 SERSC Australia 9
B. Throughput graph
The total number of the data packet received during the particular time period which is
known as throughput. The Figure 4 signifies a throughput graph between the base
approach and the proposed approach. The throughput of the proposed approach generates
the better result than the existing approach.
Figure 4. Throughput Graph
Table 3. Throughput
Time (in ms) Base paper Propose paper
10 1835.36 2969.34
20 2027.68 3276.05
30 2096.08 5588.66
40 2131.15 6858.48
50 2152.48 7630.72
60 2166.82 7560.16
70 2177.12 7002.7
80 2184.88 6582.82
90 2190.93 6255.18
100 2197.4 6284.31
C. Routing overhead
The routing overhead is defined as flooding of data in the network transmitted by an
application, which utilizes a bit of accessible transfer rate of communication protocols.
The Figure 5 signifies a routing overhead graph between base approach and the proposed
approach. The overhead of the proposed approach is less than the base approach. Since
the overhead should be minimized and the routing decreases in the proposed work the
overhead also decreases.
10. International Journal of Advanced Science and Technology
Vol.109 (2017)
10 Copyright ⓒ 2017 SERSC Australia
Figure 5. Routing Overhead Graph
Table 4. Routing Overhead
Time (in ms) Base paper Propose paper
5 3.579 1.513
10 7.92 3.403
15 12.252 5.263
20 16.715 7.153
25 20.014 8.072
6. Conclusion
The safety application in vehicular ad hoc network provides active road safety to avoid
road accidents by disseminating life serious details among drivers securely. Such
information must be protected from the access of an intruder or attacker. In trusting
vehicular networks, trust and security are 2 main user’s necessities. The broadcasting
nature of the wireless channels, the nonappearance of a static infrastructure, the active
network topology, and the self-organizing characteristic of the network rise the
susceptibilities of a VANET. Trust formation is a serious problem in VANET. In
centralized trust formation method, the key disadvantage is impersonation attacks, where
one node can steal and use the individuality of additional nodes. In totally distributed trust
formation approach, the chief difficulty is that a node might obtain numerous identities
from different issuers.
References
[1] S. Zeadally, R. Hunt, Y. Chen, A. Irwin and A. Hassan, “Vehicular Ad Hoc Networks (VANET): Status,
Results, and Challenges”, Telecommunication Systems, vol. 50, no. 4, (2012), pp. 217-241.
[2] H. Oh, C. Yae, D. Ahn and H. Cho, “5.8 GHz DSRC packet communication system for ITS services”,
Proceedings of the 50th IEEE Vehicular Technology Conference (VTC,’99), (1999), pp. 2223-2227.
[3] J. Cui, J. Zhang, H. Zhong and Y. Xu, “SPACF: A Secure Privacy-preserving Authentication Scheme for
VANET with Cuckoo Filter”, Journal of Latex Class Files, vol. 14, no. 8, (2015) August.
[4] H. Hu, R. Lu, Z. Zhang and J. Shao, “REPLACE: A Reliable Trust-based Platoon Service
Recommendation Scheme in VANET”, DOI 10.1109/TVT.2016.2565001, IEEE Transactions on
Vehicular Technology.
11. International Journal of Advanced Science and Technology
Vol.109 (2017)
Copyright ⓒ 2017 SERSC Australia 11
[5] W. Li and H. Song, “ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad
Hoc Networks”, IEEE Trans. Intell. Transport. Syst., doi: 10. 1109/tits.2015.2494017, vol. 17, no. 4,
(2016), pp. 960-969.
[6] M. M. Masud Hind Al Falasi and N. Mohamed, “Trusting the Same- Using Similarity to Establish Trust
Among Vehicles”, In: International Conference on Collaboration Technologies and Systems, (2015), pp.
64-69.
[7] A. Rivero-Garcia, “VANET Event Verification Based on User Trust”, In: 2016 24th Euromicro
International Conference on Parallel, Distributed, and Network-Based Processing (PDP), (2016).
[8] A. Wu, J. Ma and S. Zhang, “Rate: A RSU-aided scheme for data-centric trust establishment in
VANETs”, Wireless Communications, Networking and Mobile Computing (WiCOM), IEEE, pp. 1-6,
(2011).
[9] A. Kothari, Dr. P. Shukla and Dr. R. Pandey, “Trust Centric Approach Based on Similarity in VANET”,
International Conference on Signal Processing, Communication, Power and Embedded System
(SCOPES)-2016.
[10] K. Sharma and B. Kumar Chaurasia, “Trust-Based Location Finding Mechanism in VANET using DST”,
2015 Fifth International Conference on Communication Systems and Network Technologies.
[11] I. A. Sumra, H. Hasbullah and Jamalul-lail, “Trust and trusted computing in VANET”, Comput. Sci., 1
(2011).
[12] R. Gilles Engoulou, M. Bellaïche, S. Pierre and A. Quintero, “VANET security surveys”, Computer
Communications, vol. 44, (2014) May 15, pp. 1-13.
[13] Y. Ren and A. Boukerche, “Modeling and managing the trust for wireless and mobile ad hoc networks”,
In IEEE International Conference on Communications, ICC ’08, (2008) May, pp. 2129-2133.
[14] L. Eschenauer, V. D. Gligor and J. Baras, “On trust establishment in mobile ad-hoc networks”, In
Security Protocols, Darlinghurst, Australia, Australia, Springer Berlin / Heidelberg, (2004), pp. 47-66.
12. International Journal of Advanced Science and Technology
Vol.109 (2017)
12 Copyright ⓒ 2017 SERSC Australia