A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes
Security attacks and solutions in vehicular ad hoc networks a surveypijans
Vehicular Ad hoc Networks (VANETs) have emerged recently as one of the most attractive topics for
researchers and automotive industries due to their tremendous potential to improve traffic safety, efficiency
and other added services. However, VANETs are themselves vulnerable against attacks that can directly
lead to the corruption of networks and then possibly provoke big losses of time, money, and even lives. This
paper presents a survey of VANETs attacks and solutions in carefully considering other similar works as
well as updating new attacks and categorizing them into different classes.
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...Editor IJCATR
In recent years, the number of automobiles on the road has increased tremendously. Due to high density and mobility of vehicles,
possible threats and road accidents are increasing. Wireless communication allows sending safety and other critical information. Due to this
inherent wireless characteristic and periodic exchange of safety packets, Vehicular Ad-hoc Network (VANET) is vulnerable to number of
security threats like Sybil attack or temporal attack. In this paper, a detailed discussion has been done on both the type of attacks. With the
help of already published works, some approaches have also been studied which have proved to be of significance in detection of these
attacks.
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDr.Irshad Ahmed Sumra
In this
respect, the network availability is exposed to many types of attacks.
In this paper, Denial of Service (DOS) attack on network availability
is presented and its severity level in VANET environment is
elaborated. A model to secure the VANET from the DOS attacks has been developed and some possible solutions to overcome the attacks have been discussed.
Master Thesis on Vehicular Ad-hoc Network (VANET)Prof Ansari
In present, many people during the public died each year in vehicle accidents, therefore in almost countries some safety data i.e. traffic lights & velocity limits are applied, simply however it is not a better solution. Also government and number of automation industries regarded that vehicular safety is real challenging task [1]. Then equally result, to enhance people traffic safety of a new progressed particular technology is formulated i.e. VANET [4]. It is progress type of MANET (Mobile Ad-hoc Network). VANET manages a network within which vehicles are act nodes and applied as mobile nodes to construct a robust infrastructure-less ad-hoc network. In Figure 1 illustrates the basic components of VANET architecture. It builds the network among Inter-Vehicle, Vehicle-to-Roadside and Inter-Roadside communicating networks [4]. Moreover, apart from accidental-safety and security types, there are also broad varieties of applications in VANET are available and potential that can extend passenger comfort like predictable mobility by GPS, web browsing and information modify and so on. Vehicular Ad-hoc Network (VANET) is a novel formulated form of Mobile Ad-hoc Network (MANET), where moving nodes are vehicles same automobiles, cars, buses etc [2].
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationIJERA Editor
VANET provide facility for the vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages to other vehicles. However, this raises the issue of security and privacy. Here, we have described various existing solutions/protocols that are used in order to satisfy the security and privacy requirement of the vehicular ad hoc network. We have also described security issues and challenges in VANET. We have presented various security attributes that may be considered as criteria to measure security such as availability, confidentiality, integrity, authentication and non-repudiation. This paper also give the detail information of some of the schemes such as RAISE ,IBV with their pros and cons.
Security attacks and solutions in vehicular ad hoc networks a surveypijans
Vehicular Ad hoc Networks (VANETs) have emerged recently as one of the most attractive topics for
researchers and automotive industries due to their tremendous potential to improve traffic safety, efficiency
and other added services. However, VANETs are themselves vulnerable against attacks that can directly
lead to the corruption of networks and then possibly provoke big losses of time, money, and even lives. This
paper presents a survey of VANETs attacks and solutions in carefully considering other similar works as
well as updating new attacks and categorizing them into different classes.
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...Editor IJCATR
In recent years, the number of automobiles on the road has increased tremendously. Due to high density and mobility of vehicles,
possible threats and road accidents are increasing. Wireless communication allows sending safety and other critical information. Due to this
inherent wireless characteristic and periodic exchange of safety packets, Vehicular Ad-hoc Network (VANET) is vulnerable to number of
security threats like Sybil attack or temporal attack. In this paper, a detailed discussion has been done on both the type of attacks. With the
help of already published works, some approaches have also been studied which have proved to be of significance in detection of these
attacks.
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDr.Irshad Ahmed Sumra
In this
respect, the network availability is exposed to many types of attacks.
In this paper, Denial of Service (DOS) attack on network availability
is presented and its severity level in VANET environment is
elaborated. A model to secure the VANET from the DOS attacks has been developed and some possible solutions to overcome the attacks have been discussed.
Master Thesis on Vehicular Ad-hoc Network (VANET)Prof Ansari
In present, many people during the public died each year in vehicle accidents, therefore in almost countries some safety data i.e. traffic lights & velocity limits are applied, simply however it is not a better solution. Also government and number of automation industries regarded that vehicular safety is real challenging task [1]. Then equally result, to enhance people traffic safety of a new progressed particular technology is formulated i.e. VANET [4]. It is progress type of MANET (Mobile Ad-hoc Network). VANET manages a network within which vehicles are act nodes and applied as mobile nodes to construct a robust infrastructure-less ad-hoc network. In Figure 1 illustrates the basic components of VANET architecture. It builds the network among Inter-Vehicle, Vehicle-to-Roadside and Inter-Roadside communicating networks [4]. Moreover, apart from accidental-safety and security types, there are also broad varieties of applications in VANET are available and potential that can extend passenger comfort like predictable mobility by GPS, web browsing and information modify and so on. Vehicular Ad-hoc Network (VANET) is a novel formulated form of Mobile Ad-hoc Network (MANET), where moving nodes are vehicles same automobiles, cars, buses etc [2].
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationIJERA Editor
VANET provide facility for the vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages to other vehicles. However, this raises the issue of security and privacy. Here, we have described various existing solutions/protocols that are used in order to satisfy the security and privacy requirement of the vehicular ad hoc network. We have also described security issues and challenges in VANET. We have presented various security attributes that may be considered as criteria to measure security such as availability, confidentiality, integrity, authentication and non-repudiation. This paper also give the detail information of some of the schemes such as RAISE ,IBV with their pros and cons.
Vehicular Ad hoc Network (VANET) is the furthermost remarkable and an advantageous technique for the research field for improving the security and protection of drivers and passengers. It is an interesting subclass of Mobile Ad-hoc Network, which authorizes smart communication between vehicles furthermore in the middle of the vehicle and roadside frameworks. It is an application of a wireless network for witching the data – to the domain of vehicles. For the creation of trustful surroundings, trust can be practiced to increase the safety in vehicular networks, which is a major section of security. Trust can be considered by directly observing the human actions or indirectly by getting the neighbor's opinion which produces a trusted communicating environment. They turn into a principal component of intelligent transportation systems. There is a transitivity model in the existing work in which the Authentication Server (AS) provides the authority to Law Executor (LE) for authenticating the other vehicles as a trustful vehicle. So in proposed work a new technique in which there is no vehicle in the network to provide the authority. Trust is estimated by the nodes, then this value sends to the AS where this value is calculated and updated regularly. This method enhances the security of the network. NS2 simulator is used for the overall operation of the proposed work and throughput, PDR and routing overhead show the efficiency of the network.
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...Dr.Irshad Ahmed Sumra
Road accident and traffic congestion are global issues faced by many countries around the world. Road accident led to fatalities and injuries, while traffic congestion led to inconvenient driving and fuel energy wastage. Vehicular Ad hoc Network (VANET), as part of Intelligent Transportation System (ITS), has the ability to provide safety and non-safety applications to users on roads for safe, reliable and comfort driving. In this paper, propose an integrated multi-level Security model and core purpose of this model is to provide the resiliency against malicious attack and aim to reduce incidents of road accidents, as well as to ease traffic congestion.
Master thesis on Vehicular Ad hoc Networks (VANET)Prof Ansari
The increasing demand for wireless devices and wireless communication tends to research on self-organizing, self-healing networks without the interference of any pre-established or centralized infrastructure/authority [2]. The networks with the absence of any pre-established or centralized authority are known as Ad hoc networks [4]. Ad hoc Networks are the kind of wireless networks that uses multi-hop radio relay.There are many comparative studies and surveys that compare various ad hoc routing in VANET environment. The simulations performed in these comparative studies are very basic do not incorporate with a large number of nodes in real Vehicular Ad hoc Network environment. The main aim of our dissertation work is to firstly investigate the reactive and proactive routeing protocols than examine the performance of selected reactive routing protocols i.e. Destination Sequence Distance Vector Routing (DSDV), Ad hoc On-Demand Distance Vector (AODV), Optimized Link State Routing (OLSR) and Dynamic Source Routing (DSR)by taking three performance metrics like network load, throughput and end-to-end delay with varying number of mobile nodes or vehicle node densityOPNET: Optimized Network Engineering Tool (OPNET) is a commercial network simulator environment used for simulations of both wired and wireless networks [20]. Several different OPNET versions have been released over the last few years; the latest version of OPNET is the OPNET 16.0. At present OPNET is licensed under Riverbed technologies. It allows the user to design and study the network communication devices, protocols, individual applications and also simulate the performance of routing protocol. It supports many wireless technologies and standards such as, IEEE 802.11, IEEE 802.15.1, IEEE 802.16, IEEE 802.20 and satellite networks. OPNET IT Guru Academic Edition is available for free to the academic research and teaching community.
Vehicular ad-hoc networks (VANETs) technology has come out as an important research field over the last few years. VANETs are the likely an influencing approach to provide safety of driver and other applications for the traffic conditions as well as passengers. Being dynamic in nature, it establishes the network, according to the situation and need of the users and provides reliable communication among the vehicles. Due to its great benefits, it is highly vulnerable to various attacks and security in VANET should be taken into consideration. This paper presented the security attacks between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). Many research works have been done to improve the performance and security of this network. The main aim of this paper is the security using hashing and techniques to calculate the trust in VANETs.
In Vehicular Communication, the security system against the attacker is very important. Sybil attacks have been regarded as a serious security threat to ad hoc networks and sensor networks. It is an attack in which an original identity of the vehicle is corrupted or theft by an attacker to creates multiple fake identities. Detecting such type of attacker and the original vehicle is a challenging task in VANET. This survey paper briefly presents various Sybil attack detection mechanism in VANET.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A review on various security attacks in vehicular ad hoc networksjournalBEEI
Ad hoc vehicle networks (VANET) are being established as a primary form of mobile ad hoc networks (MANET) and a critical infrastructure to provide vehicle passengers with a wide range of safety applications. VANETs are increasingly common nowadays because it is connecting to a wide range of invisible services. The security of VANETs is paramount as their future use must not jeopardize their users' safety and privacy. The security of these VANETs is essential for the benefit of secure and effective security solutions and facilities, and uncertainty remains, and research in this field remains fast increasing. We discussed the challenges in VANET in this survey. Were vehicles and communication in VANET are efficient to ensure communication between vehicles to vehicles (V2V), vehicles to infrastructures (V2I). Clarified security concerns have been discussed, including confidentiality, authentication, integrity, availableness, and non-repudiation. We have also discussed the potential attacks on security services. According to analysis and performance evaluations, this paper shows that the ACPN is both feasible and appropriate for effective authentication in the VANET. Finally, the article found that in VANETs, encryption and authentication are critical.
In vehicular ad hoc network (VANETs), the applications mainly focused on the road challenging subclass of Mobile Ad-hoc Network, which empowers smart transmission among vehicles and between vehicles and roadside frameworks. It is an optimistic methodology for the Intelligent Transport System (ITS). There are numerous difficulties to be tended while utilizing VANET. It is flexible and has a high dynamic topology and flexibility which makes the conventional MANET protocols unacceptable for VANET. Trust is a principal element which is used to create a trustful environment to improve the security in vehicular networks. Trust can be calculated by observing the human behavior which creates a trusted communicating environment. In this paper, we define the architecture of VANET, then the communication establishment and various challenges. Some trust models had been defined in this paper to enforce honest information sharing between communicating nodes. Trust establishment is compulsory among communicating vehicles to build a secure messages exchange and reliability.
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
Vehicles download the data when passing through a drive through the road (RSU) and then share the data after travelling outside the coverage of RSU.A key issue of downloading
cooperative data is how effectively data is shared among them self. Developing an application layer data exchange protocol for the coordination of vehicles to exchange data according to
their geographic locations. Coordinated sharing can avoid medium access control (MAC) layer
collisions and the hidden terminal effect can be avoided in the multi-hop transmission. A salient
feature of the application layer data exchange protocol, in the voluntary services, Vehicles purchase the requested data from service provider via RSUs. In this project, we propose a
cooperative data sharing with secure framework for voluntary services in special vehicles networks (VANETs). We also concentrate on security in the process of downloading data and
sharing. Applicants to ensure exclusive access to data applied and security of the vehicles
involved in the implementation.
A Survey on Vehicle to Infrastructure Communication SystemIOSR Journals
Abstract: Vehicle-to-Infrastructure (V2I) Communications for Safety is the wireless exchange of critical safety
and operational data between vehicles and roadway infrastructure, intended primarily to avoid motor vehicle
crashes. Vehicle-to-infrastructure (V2I) communication based on wireless local area network (WLAN) IEEE
802.11 standard technology can support user in-motion to achieve preferable Internet connectivity. This
standard is created for urgent short message transmission.The IEEE 802.11 standard defines an infracture
mode with at least one central access point connected to a wired network. In this paper we present an
experimental study of IEEE802.11g using off-the-shelf devices in vehicle-to-infrastructure small scale scenario.
In order to evaluate the V2I the type of communication in large scale scenario and intelligent transportation
systems (ITS) will necessitate wireless vehicle-to-infrastructure (V2I) communica-tions. This wireless link can
be implemented by several technolo-gies, such as digital broadcasting, cellular communication, or dedicated
short range communication (DSRC) systems. Analyses of the coverage and capacity requirements are presented
when each of the three systems are used to implement the V2I link
Keywords: Short Range Vehicle Network; 802.11g; wireless network; goodput; network performance;
transport; mobile stations; auto traffic; vehicle speed
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
Vehicular ad-hoc networks (VANETs) technology has turned out as a vital research field throughout the most recent couple of years. VANETs are the likely an impacting way to deal with giving security of driver and different applications for the activity conditions and additionally travelers. Being dynamic in nature, it created the network, according to the condition and requirement of the users and provides consistent communication between the vehicles. Due to its excessive advantages, it is highly susceptible to numerous attacks and security in VANET should be taken into consideration. This paper presented the security issues such as authenticity, integrity, availability, confidentiality, anonymity and non-repudiation to provide the secure communication between Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I). Numerous research works have been done to recover the performance and security of this network. The fundamental point of this paper is the several security challenges and the applications of VANETs.
The main aim of this dissertation is to evaluate the performance of Four routing protocols i.e. Destination Sequence Distance Vector Routing (DSDV), Ad hoc On Demand Distance Vector (AODV),survey over vanet routing protocols for vehicle to vehicle communication
VANET is next generation vehicular network and
its applications will be play key to safe human life while journey
on highway. Security is one of the key prominent factors for
implement VANET in real environment.In this survey paper, discuss in detail the various computing methods and illustrate the relationship with vehicular network. Using these computing
methods to secure the vehicular network from attackers and
attacks.
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Dr.Irshad Ahmed Sumra
in this slide, it will discuss two new types of attacks which are called road side traffic signal attack and also Internet attack in vehicular network. The authors will explain an attacker‟s behaviour and how he/she will launch an attack on a road side traffic signal and Internet services and create problems for other users of network. Through different scenarios, it will explain the
effect of these attacks on other components of network.
In this Slide, the role of the end user in a vehicular network will be discussed in detail and three levels of trust grades for users will be proposed. It is necessary for secure vehicular communication that the user’s role in the network should be in a positive direction, and other users should take more benefits from this new future technology.
Challenging Issues in VANET Network and its Routing Algorithms-An Analysisidescitation
Vehicular Ad hoc Network (VANET), a rapidly
deployed wireless network, is a subclass of mobile ad hoc
networks (MANET) that uses multi-hop routing to provide
network connectivity among vehicles (V2V) or vehicle to road-
side equipments (V2R). VANETs have received increasing
research attention in recent years because of its vast
applications like safety, comfort and entertainment. Variations
with time in network topology impose new challenges for
routing protocols in such networks as traditional routing
protocols are not suitable for VANETs. This work is an attempt
to figure out the challenges in VANET comprehensively in
conjunction with the recommended routing protocols by
comparing the existing routing protocols with respect to
existing challenges.
Vehicular Ad hoc Network (VANET) is the furthermost remarkable and an advantageous technique for the research field for improving the security and protection of drivers and passengers. It is an interesting subclass of Mobile Ad-hoc Network, which authorizes smart communication between vehicles furthermore in the middle of the vehicle and roadside frameworks. It is an application of a wireless network for witching the data – to the domain of vehicles. For the creation of trustful surroundings, trust can be practiced to increase the safety in vehicular networks, which is a major section of security. Trust can be considered by directly observing the human actions or indirectly by getting the neighbor's opinion which produces a trusted communicating environment. They turn into a principal component of intelligent transportation systems. There is a transitivity model in the existing work in which the Authentication Server (AS) provides the authority to Law Executor (LE) for authenticating the other vehicles as a trustful vehicle. So in proposed work a new technique in which there is no vehicle in the network to provide the authority. Trust is estimated by the nodes, then this value sends to the AS where this value is calculated and updated regularly. This method enhances the security of the network. NS2 simulator is used for the overall operation of the proposed work and throughput, PDR and routing overhead show the efficiency of the network.
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...Dr.Irshad Ahmed Sumra
Road accident and traffic congestion are global issues faced by many countries around the world. Road accident led to fatalities and injuries, while traffic congestion led to inconvenient driving and fuel energy wastage. Vehicular Ad hoc Network (VANET), as part of Intelligent Transportation System (ITS), has the ability to provide safety and non-safety applications to users on roads for safe, reliable and comfort driving. In this paper, propose an integrated multi-level Security model and core purpose of this model is to provide the resiliency against malicious attack and aim to reduce incidents of road accidents, as well as to ease traffic congestion.
Master thesis on Vehicular Ad hoc Networks (VANET)Prof Ansari
The increasing demand for wireless devices and wireless communication tends to research on self-organizing, self-healing networks without the interference of any pre-established or centralized infrastructure/authority [2]. The networks with the absence of any pre-established or centralized authority are known as Ad hoc networks [4]. Ad hoc Networks are the kind of wireless networks that uses multi-hop radio relay.There are many comparative studies and surveys that compare various ad hoc routing in VANET environment. The simulations performed in these comparative studies are very basic do not incorporate with a large number of nodes in real Vehicular Ad hoc Network environment. The main aim of our dissertation work is to firstly investigate the reactive and proactive routeing protocols than examine the performance of selected reactive routing protocols i.e. Destination Sequence Distance Vector Routing (DSDV), Ad hoc On-Demand Distance Vector (AODV), Optimized Link State Routing (OLSR) and Dynamic Source Routing (DSR)by taking three performance metrics like network load, throughput and end-to-end delay with varying number of mobile nodes or vehicle node densityOPNET: Optimized Network Engineering Tool (OPNET) is a commercial network simulator environment used for simulations of both wired and wireless networks [20]. Several different OPNET versions have been released over the last few years; the latest version of OPNET is the OPNET 16.0. At present OPNET is licensed under Riverbed technologies. It allows the user to design and study the network communication devices, protocols, individual applications and also simulate the performance of routing protocol. It supports many wireless technologies and standards such as, IEEE 802.11, IEEE 802.15.1, IEEE 802.16, IEEE 802.20 and satellite networks. OPNET IT Guru Academic Edition is available for free to the academic research and teaching community.
Vehicular ad-hoc networks (VANETs) technology has come out as an important research field over the last few years. VANETs are the likely an influencing approach to provide safety of driver and other applications for the traffic conditions as well as passengers. Being dynamic in nature, it establishes the network, according to the situation and need of the users and provides reliable communication among the vehicles. Due to its great benefits, it is highly vulnerable to various attacks and security in VANET should be taken into consideration. This paper presented the security attacks between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). Many research works have been done to improve the performance and security of this network. The main aim of this paper is the security using hashing and techniques to calculate the trust in VANETs.
In Vehicular Communication, the security system against the attacker is very important. Sybil attacks have been regarded as a serious security threat to ad hoc networks and sensor networks. It is an attack in which an original identity of the vehicle is corrupted or theft by an attacker to creates multiple fake identities. Detecting such type of attacker and the original vehicle is a challenging task in VANET. This survey paper briefly presents various Sybil attack detection mechanism in VANET.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A review on various security attacks in vehicular ad hoc networksjournalBEEI
Ad hoc vehicle networks (VANET) are being established as a primary form of mobile ad hoc networks (MANET) and a critical infrastructure to provide vehicle passengers with a wide range of safety applications. VANETs are increasingly common nowadays because it is connecting to a wide range of invisible services. The security of VANETs is paramount as their future use must not jeopardize their users' safety and privacy. The security of these VANETs is essential for the benefit of secure and effective security solutions and facilities, and uncertainty remains, and research in this field remains fast increasing. We discussed the challenges in VANET in this survey. Were vehicles and communication in VANET are efficient to ensure communication between vehicles to vehicles (V2V), vehicles to infrastructures (V2I). Clarified security concerns have been discussed, including confidentiality, authentication, integrity, availableness, and non-repudiation. We have also discussed the potential attacks on security services. According to analysis and performance evaluations, this paper shows that the ACPN is both feasible and appropriate for effective authentication in the VANET. Finally, the article found that in VANETs, encryption and authentication are critical.
In vehicular ad hoc network (VANETs), the applications mainly focused on the road challenging subclass of Mobile Ad-hoc Network, which empowers smart transmission among vehicles and between vehicles and roadside frameworks. It is an optimistic methodology for the Intelligent Transport System (ITS). There are numerous difficulties to be tended while utilizing VANET. It is flexible and has a high dynamic topology and flexibility which makes the conventional MANET protocols unacceptable for VANET. Trust is a principal element which is used to create a trustful environment to improve the security in vehicular networks. Trust can be calculated by observing the human behavior which creates a trusted communicating environment. In this paper, we define the architecture of VANET, then the communication establishment and various challenges. Some trust models had been defined in this paper to enforce honest information sharing between communicating nodes. Trust establishment is compulsory among communicating vehicles to build a secure messages exchange and reliability.
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
Vehicles download the data when passing through a drive through the road (RSU) and then share the data after travelling outside the coverage of RSU.A key issue of downloading
cooperative data is how effectively data is shared among them self. Developing an application layer data exchange protocol for the coordination of vehicles to exchange data according to
their geographic locations. Coordinated sharing can avoid medium access control (MAC) layer
collisions and the hidden terminal effect can be avoided in the multi-hop transmission. A salient
feature of the application layer data exchange protocol, in the voluntary services, Vehicles purchase the requested data from service provider via RSUs. In this project, we propose a
cooperative data sharing with secure framework for voluntary services in special vehicles networks (VANETs). We also concentrate on security in the process of downloading data and
sharing. Applicants to ensure exclusive access to data applied and security of the vehicles
involved in the implementation.
A Survey on Vehicle to Infrastructure Communication SystemIOSR Journals
Abstract: Vehicle-to-Infrastructure (V2I) Communications for Safety is the wireless exchange of critical safety
and operational data between vehicles and roadway infrastructure, intended primarily to avoid motor vehicle
crashes. Vehicle-to-infrastructure (V2I) communication based on wireless local area network (WLAN) IEEE
802.11 standard technology can support user in-motion to achieve preferable Internet connectivity. This
standard is created for urgent short message transmission.The IEEE 802.11 standard defines an infracture
mode with at least one central access point connected to a wired network. In this paper we present an
experimental study of IEEE802.11g using off-the-shelf devices in vehicle-to-infrastructure small scale scenario.
In order to evaluate the V2I the type of communication in large scale scenario and intelligent transportation
systems (ITS) will necessitate wireless vehicle-to-infrastructure (V2I) communica-tions. This wireless link can
be implemented by several technolo-gies, such as digital broadcasting, cellular communication, or dedicated
short range communication (DSRC) systems. Analyses of the coverage and capacity requirements are presented
when each of the three systems are used to implement the V2I link
Keywords: Short Range Vehicle Network; 802.11g; wireless network; goodput; network performance;
transport; mobile stations; auto traffic; vehicle speed
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
Vehicular ad-hoc networks (VANETs) technology has turned out as a vital research field throughout the most recent couple of years. VANETs are the likely an impacting way to deal with giving security of driver and different applications for the activity conditions and additionally travelers. Being dynamic in nature, it created the network, according to the condition and requirement of the users and provides consistent communication between the vehicles. Due to its excessive advantages, it is highly susceptible to numerous attacks and security in VANET should be taken into consideration. This paper presented the security issues such as authenticity, integrity, availability, confidentiality, anonymity and non-repudiation to provide the secure communication between Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I). Numerous research works have been done to recover the performance and security of this network. The fundamental point of this paper is the several security challenges and the applications of VANETs.
The main aim of this dissertation is to evaluate the performance of Four routing protocols i.e. Destination Sequence Distance Vector Routing (DSDV), Ad hoc On Demand Distance Vector (AODV),survey over vanet routing protocols for vehicle to vehicle communication
VANET is next generation vehicular network and
its applications will be play key to safe human life while journey
on highway. Security is one of the key prominent factors for
implement VANET in real environment.In this survey paper, discuss in detail the various computing methods and illustrate the relationship with vehicular network. Using these computing
methods to secure the vehicular network from attackers and
attacks.
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Dr.Irshad Ahmed Sumra
in this slide, it will discuss two new types of attacks which are called road side traffic signal attack and also Internet attack in vehicular network. The authors will explain an attacker‟s behaviour and how he/she will launch an attack on a road side traffic signal and Internet services and create problems for other users of network. Through different scenarios, it will explain the
effect of these attacks on other components of network.
In this Slide, the role of the end user in a vehicular network will be discussed in detail and three levels of trust grades for users will be proposed. It is necessary for secure vehicular communication that the user’s role in the network should be in a positive direction, and other users should take more benefits from this new future technology.
Challenging Issues in VANET Network and its Routing Algorithms-An Analysisidescitation
Vehicular Ad hoc Network (VANET), a rapidly
deployed wireless network, is a subclass of mobile ad hoc
networks (MANET) that uses multi-hop routing to provide
network connectivity among vehicles (V2V) or vehicle to road-
side equipments (V2R). VANETs have received increasing
research attention in recent years because of its vast
applications like safety, comfort and entertainment. Variations
with time in network topology impose new challenges for
routing protocols in such networks as traditional routing
protocols are not suitable for VANETs. This work is an attempt
to figure out the challenges in VANET comprehensively in
conjunction with the recommended routing protocols by
comparing the existing routing protocols with respect to
existing challenges.
This ppt gives you a brief knowledge on protocols used in VANETs using real time vehicular traffic information. These have overruled the the existing MANET protocols. It also give you a description regarding forwarding optimisation
Vehicular Ad hoc Network (VANET) is the favorable method to enhance the safety of divers and passengers. It becomes a basic element of the Intelligent Transportation System (ITS). It has created by applying the concepts of Mobile Ad Hoc Networks (MANETs) – which is an application of a wireless network for exchanging the data – to the domain of vehicles. They become a main element of intelligent transportation systems. In existing technique drawback is the Authentication Server (AS) gives all the working to Law Executor (LE) means AS send information to RSU, RSU send this information to law executor and then login process start but if LE behave maliciously then this authentication process fail. In our propose work, we calculate the trust of each vehicle's on the basis of their behavior. Each vehicle calculates the trust of its neighbor and send this value to AS by RSU then AS update these values and then broadcast this value by RSU, now all the vehicles have a trust value of its neighboring vehicles so that send the data by using hashing technique and use trusted path to send data source to a destination so that security enhances.
Vehicular Ad Hoc Networks (VANETs) are based on network technology where cars act as mobile nodes to form a communication network. In VANETs, routing protocols have a significance regarding the overall network performance since they determine the way of sending and receiving packets between mobile nodes. Most of the protocols proposed for VANETs are adapted from Mobile ad hoc networks (MANETs) routing protocols. However, due to the specific characteristics of VANETs, especially high mobility, and dynamic topology, the routing protocols in ad hoc networks do not adapt immediately to VANETs. Therefore, secure routing of Vehicular ad hoc networks (VANETs) against attacks, which are of various types, is still a challenging issue. This paper is going to present a synthesis of the most relevant protocols that have addressed the secure routing issue in VANETs. It also establishes a comparison regarding the offered features and the studied performance aspects through which it is notified that a security mechanism depends not only on the level of efficiency but also on the network constraints.
Vehicular Ad Hoc Networks (VANETs) are based on network technology where cars act as mobile nodes to form a communication network. In VANETs, routing protocols have a significance regarding the overall network performance since they determine the way of sending and receiving packets between mobile nodes. Most of the protocols proposed for VANETs are adapted from Mobile ad hoc networks (MANETs) routing protocols. However, due to the specific characteristics of VANETs, especially high mobility, and dynamic topology, the routing protocols in ad hoc networks do not adapt immediately to VANETs. Therefore, secure routing of Vehicular ad hoc networks (VANETs) against attacks, which are of various types, is still a challenging issue. This paper is going to present a synthesis of the most relevant protocols that have addressed the secure routing issue in VANETs. It also establishes a comparison regarding the offered features and the studied performance aspects through which it is notified that a security mechanism depends not only on the level of efficiency but also on the network constraints.
Vehicular Ad Hoc Networks (VANETs) are classified as a special application of mobile ad hoc networks (MANETs)
which promise the new possibilities to improve traffic efficiency, road safety driving convenience. By providing the safety and
non-safety applications and sharing the useful information through vehicle to vehicle (V2V) or vehicle to roadside (V2R)
communications to avoid accidents and provide reliable information to travellers, such hot issues seeks much attention of
researchers in this field. VANET and MANET having several common characteristics but VANET differ with applications,
architecture, challenges and data dissemination. The survey of routing protocols in VANETs is important and necessary issue for
smart ITS. The objective of this paper is to design an algorithm for the detection and correction of routing attacks made by
obstructive nodes in VANETS and also drawn the comparison between various metrics like Cost, Average Packet loss,
Throughput and Energy Consumed.
MALICIOUS NODE DETECTION THROUGH AODV IN VANET ijasuc
VANET is a subset of MANET which offers communication between the nodes. VANET is a collection of
various dynamic nodes that can change it and configure itself on the network. In Vanet, various routing
protocols may be implemented to route the packet and Ad-hoc On-Demand Distance Vector (AODV) is one
of the protocol that floods the packets to discover route. In Ad hoc On Demand Vector (AODV) routing
protocol for VANET, malicious nodes may distrupt the network and make it difficult for the nodes to
communicate. In this paper, AODV Routing Protocol is analysed in vanet with and without malicious
attack. The malicious node disrupts the limit and floods the network with false packets. Malicious node will
affect the performance of the entire network as it consumes more bandwidth and drops packets which in
turn reduce the performance of AODV routing protocol and vanet.
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
Recently, vehicular ad hoc networks (VANETs) have been garnering
significant inter-est from the people involved in transportation field.
Nowadays automotive manufactur-ers have already supplying vehicles with
multitude of road sensors that provides many useful characteristics. VANET
communication not only offers the drivers and passen-gers with the various
safety related services but also provides a wide range of valuable
applications. However, the inherent openness of the wireless communication
medium used by VANETs exposes vehicles to various security and privacy
issues. Researchers have proposed many security schemes to solve the issues
mentioned above for the widespread deployment of VANETs. However,
these schemes failed to fulfill all as-pects of security and privacy
requirements. Besides, these schemes have not provided the performance
parameters such as computation and communication costs. The pri-mary
emphasis of this paper is on the taxonomy of security schemes based
conditional privacy-preserving with respect to strengths and limitations.
Besides, a comparison be-tween these schemes related to the model of
security and privacy requirements, attacks, and performance parameters is
provided. Finally, this paper critically reviews the re-lated works by taking
into consideration the design and development of all VANETs security and
privacy schemes, this paper could serve as a guide and reference.
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Dr. Amarjeet Singh
Vehicular Ad-hoc Network (VANET) technology is the basis of Intelligent Transportation System (ITS) connectivity that enables the delivery of useful information to and fro between vehicles in vehicle-to-vehicle communication mode; or between vehicle and infrastructure in vehicle-to-infrastructure mode for safety and comfort. However, due to the openness of the wireless medium used by VANET, the technology is vulnerable to security threats in both communication modes. In this study, the essential background of VANET from architectural point of view and communication types are discussed. Then, the overview of modification attack in VANET is presented. In addition, this paper thoroughly reviews the existing prevention schemes for modification attack in VANET. This review paper reveals that there is still a need for a better and more efficient preventive scheme to address the modification attack in VANET.
Security issues and challenges in MANET,VANET and FANET: A SurveyDr.Irshad Ahmed Sumra
VANET and FANET are next generation network and due to safety applications more attractions for end users in these networks. In this slide, it will provide the survey on security issues and challenges in the field of MANET, VANET and FANET. The successful implementation of these networks in real environment, it is require the network will be secure and end user can take benefit from their life safety applications.
VANET SECURITY AND PRIVACY – AN OVERVIEWIJNSA Journal
Even though vehicular ad-hoc networks (VANETs) bring tremendous benefits to society, yet they raise
many challenges where the security and privacy concerns are the most critical ones. In this paper, we
provide a detailed overview of the state-of-the-art security and privacy requirements in VANET. Also, a
brief of the approachesthat are proposed in the literature to fulfil these requirements is given in this paper.
Besides that, a classification of the various VANET attacks based on the communication system
layersisprovided in this paper. In addition, the different types of VANET adversaries and attackers
arepresented here.In general, this paper aims to provide a good piece of information about VANET
security and privacy, in order to be used as a tool to help researchers in this field in developing secure
privacy-preserving approaches for VANET.
VANET SECURITY AND PRIVACY – AN OVERVIEWIJNSA Journal
Even though vehicular ad-hoc networks (VANETs) bring tremendous benefits to society, yet they raise
many challenges where the security and privacy concerns are the most critical ones. In this paper, we
provide a detailed overview of the state-of-the-art security and privacy requirements in VANET. Also, a
brief of the approachesthat are proposed in the literature to fulfil these requirements is given in this paper.
Besides that, a classification of the various VANET attacks based on the communication system
layersisprovided in this paper. In addition, the different types of VANET adversaries and attackers
arepresented here.In general, this paper aims to provide a good piece of information about VANET
security and privacy, in order to be used as a tool to help researchers in this field in developing secure
privacy-preserving approaches for VANET.
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...rifat1tasnim
Moving vehicle is never free of traffic congestion especially in the cities. Every day commuters wastes hours in travelling just because of traffic congestion. This has led to the emergence of vehicular management which will be beneficial for Road Transport department to control and manage the traffic flow on congested roads. Thus to support above idea we have Vehicular Ad-Hoc Network, or VANET technology that turns every participating car into a node, allowing cars to connect with each other and in turn create a network. There are wealthy numbers of approaches were highlighted to solve several thriving challenges of VANET. Clustering technique in vehicle is one of them which made a great impact on VANET. But it fails to fulfill a crucial requirement. Several protocols wanted to build a cluster in low density traffic where the numbers of vehicles are less with respect to transmission range & there is a less chance of broadcast storming which is not a practical scenario. So that cluster formation in high density traffic has arisen as an issue where there is a great possibility to broadcast storm. This paper suggests a “Priority Based Master-Slave Cluster Formation Process” in high density traffic for an urban scenario using “fidelity” metric. With the help of this metric it will be easier to find high density traffic & form priority based Master-Slave dynamically by reducing broadcast storm problem.
In this paper CHP function runs on the vehicular environment which carried out to select a vehicle as Master. In this Ad-hoc wireless environment a dataset is assumed which create a proper environment & generate a graph. Graph results can be analyzed to have the highest one selects as a Master. Thus for the final result, real aspects of vehicular traffic is very essential and scenarios play a very crucial role.
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Dr. Amarjeet Singh
Vehicles in a vehicular ad-hoc network (VANET) broadcast information about the driving environment in the road. Due to the open-access environment, this means that the VANET is susceptible to security and privacy issues. However, none of the related works satisfies all security and privacy requirements. Besides, their proposed has huge overhead in terms of computation and communication. To address the above issues, we will propose the security and privacy scheme based on Elliptic Curve Cryptography (ECC) and one secure hash function. Hence the reliability of each message being signed and checked has been improved. The main aim of this work is to satisfy all aspect requirements of security and privacy and reduce the computational complexity of the system.
Cyber DoS attack-based security simulator for VANET IJECEIAES
At the late years, researches focused on the cyber denial of service (DoS) attacks in the vehicle ad hoc networks (VANETS). This is due to high importance of ensuring the save receiving of information in terms of vehicle to vehicle (V2V), vehicle to infrastructure (V2I) and Vehicle to Road side unit (V2R). In this paper, a cyber-security system is proposed to detect and block the DoS attacks in VANET. In addition, a simulator for VENAT based on lightweight authentication and key exchange is presented to simulate the network performance and attacks. The proposed system consists of three phases: registration, authentication as well as communications and DoS attack detection. These phases improve the system ability to detect the attacks in efficient way. Each phase working is based in a proposed related algorithm under the guidance of lightweight protocol. In order to test the proposed system, a prototype is considered includes six cars and we adopt police cars due to high importance of exchanged information. Different case studies have been considered to evaluate the proposed system and the obtained results show a high efficiency of performance in terms of information exchange and attack detection.
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Networkpaperpublications3
Abstract: Vehicular ad hoc networks (VANETs) can provide scalable and cost-effective solutions for applications such as traffic safety, dynamic route planning, and context-aware advertisement using short-range wireless communication. To function properly, these applications require efficient routing protocols. However, existing mobile ad hoc network routing and forwarding approaches have limited performance in VANETs. This dissertation shows that routing protocols which account for VANET-specific characteristics in their designs, such as position and mobility of Vehicle, can provide good performance for a large spectrum of applications.
Increased vehicular traffic demands smart vehicles which can interact with each other and roadside infrastructure to prevent accidents. Vehicular Ad-hoc Network (VANET) provides this flexibility to the vehicles. In this desertion we initially analyze the performance of AODV and OLSR, and further we improve the performance of AODV by selecting the node on the basis of trust value of the successive nodes, we also reduce the neighbor hood expiry time and correspondingly update the route table of AODV, with this purposed approach we would be able to reduce the end-to-end delay of AODV sufficiently also the performance of AODV increase in terms of Throughput and packet delivery ratio.Keywords: VANET, AODV, ROUTING, ROUT TABLE.
Title: Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Author: Dalbir Singh, Amit Jain (Asst. Prof.)
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Similar to VANET Security against Sybil Attack by Using New SRAN Routing Protocol (20)
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This study focused on the practice of using computing resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements. Studies have shown that costs of power utilized by IT departments can approach 50% of the overall energy costs for an organization. While there is an expectation that green IT should lower costs and the firm’s impact on the environment, there has been far less attention directed at understanding the strategic benefits of sustainable IT services in terms of the creation of customer value, business value and societal value. This paper provides a review of the literature on sustainable IT, key areas of focus, and identifies a core set of principles to guide sustainable IT service design.
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
Computers today are an integral part of individuals’ lives all around the world, but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment -friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Nigeria and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Nigeria to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
The optimal sizing and placement of Distributed Generation units (DG) are becoming very attractive to researchers these days. In this paper a two stage approach has been used for allocation and sizing of DGs in distribution system with time varying load model. The strategic placement of DGs can help in reducing energy losses and improving voltage profile. The proposed work discusses time varying loads that can be useful for selecting the location and optimizing DG operation. The method has the potential to be used for integrating the available DGs by identifying the best locations in a power system. The proposed method has been demonstrated on 9-bus test system.
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
Early detection of diabetes mellitus (DM) can prevent or inhibit complication. There are several laboratory test that must be done to detect DM. The result of this laboratory test then converted into data training. Data training used in this study generated from UCI Pima Database with 6 attributes that were used to classify positive or negative diabetes. There are various classification methods that are commonly used, and in this study three of them were compared, which were fuzzy KNN, C4.5 algorithm and Naïve Bayes Classifier (NBC) with one identical case. The objective of this study was to create software to classify DM using tested methods and compared the three methods based on accuracy, precision, and recall. The results showed that the best method was Fuzzy KNN with average and maximum accuracy reached 96% and 98%, respectively. In second place, NBC method had respective average and maximum accuracy of 87.5% and 90%. Lastly, C4.5 algorithm had average and maximum accuracy of 79.5% and 86%, respectively.
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
Study in the Competitive field of Intelligent, and studies in the field of Web Scraping, have a symbiotic relationship mutualism. In the information age today, the website serves as a main source. The research focus is on how to get data from websites and how to slow down the intensity of the download. The problem that arises is the website sources are autonomous so that vulnerable changes the structure of the content at any time. The next problem is the system intrusion detection snort installed on the server to detect bot crawler. So the researchers propose the use of the methods of Mining Data Records and the method of Exponential Smoothing so that adaptive to changes in the structure of the content and do a browse or fetch automatically follow the pattern of the occurrences of the news. The results of the tests, with the threshold 0.3 for MDR and similarity threshold score 0.65 for STM, using recall and precision values produce f-measure average 92.6%. While the results of the tests of the exponential estimation smoothing using ? = 0.5 produces MAE 18.2 datarecord duplicate. It slowed down to 3.6 datarecord from 21.8 datarecord results schedule download/fetch fix in an average time of occurrence news.
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
Most of the existing semantic similarity measures that use ontology structure as their primary source can measure semantic similarity between concepts/classes using single ontology. The ontology-based semantic similarity techniques such as structure-based semantic similarity techniques (Path Length Measure, Wu and Palmer’s Measure, and Leacock and Chodorow’s measure), information content-based similarity techniques (Resnik’s measure, Lin’s measure), and biomedical domain ontology techniques (Al-Mubaid and Nguyen’s measure (SimDist)) were evaluated relative to human experts’ ratings, and compared on sets of concepts using the ICD-10 “V1.0” terminology within the UMLS. The experimental results validate the efficiency of the SemDist technique in single ontology, and demonstrate that SemDist semantic similarity techniques, compared with the existing techniques, gives the best overall results of correlation with experts’ ratings.
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
The techniques and tests are tools used to define how measure the goodness of ontology or its resources. The similarity between biomedical classes/concepts is an important task for the biomedical information extraction and knowledge discovery. However, most of the semantic similarity techniques can be adopted to be used in the biomedical domain (UMLS). Many experiments have been conducted to check the applicability of these measures. In this paper, we investigate to measure semantic similarity between two terms within single ontology or multiple ontologies in ICD-10 “V1.0” as primary source, and compare my results to human experts score by correlation coefficient.
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
This is an effective way to improve the storage access performance of small files in Openstack Swift by adding an aggregate storage module. Because Swift will lead to too much disk operation when querying metadata, the transfer performance of plenty of small files is low. In this paper, we propose an aggregated storage strategy (ASS), and implement it in Swift. ASS comprises two parts which include merge storage and index storage. At the first stage, ASS arranges the write request queue in chronological order, and then stores objects in volumes. These volumes are large files that are stored in Swift actually. During the short encounter time, the object-to-volume mapping information is stored in Key-Value store at the second stage. The experimental results show that the ASS can effectively improve Swift's small file transfer performance.
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
Efficient management and control of government's cash resources rely on government banking arrangements. Nigeria, like many low income countries, employed fragmented systems in handling government receipts and payments. Later in 2016, Nigeria implemented a unified structure as recommended by the IMF, where all government funds are collected in one account would reduce borrowing costs, extend credit and improve government's fiscal policy among other benefits to government. This situation motivated us to embark on this research to design and implement an integrated system for vehicle clearance and registration. This system complies with the new Treasury Single Account policy to enable proper interaction and collaboration among five different level agencies (NCS, FRSC, SBIR, VIO and NPF) saddled with vehicular administration and activities in Nigeria. Since the system is web based, Object Oriented Hypermedia Design Methodology (OOHDM) is used. Tools such as Php, JavaScript, css, html, AJAX and other web development technologies were used. The result is a web based system that gives proper information about a vehicle starting from the exact date of importation to registration and renewal of licensing. Vehicle owner information, custom duty information, plate number registration details, etc. will also be efficiently retrieved from the system by any of the agencies without contacting the other agency at any point in time. Also number plate will no longer be the only means of vehicle identification as it is presently the case in Nigeria, because the unified system will automatically generate and assigned a Unique Vehicle Identification Pin Number (UVIPN) on payment of duty in the system to the vehicle and the UVIPN will be linked to the various agencies in the management information system.
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
The Supermarket Management System deals with the automation of buying and selling of good and services. It includes both sales and purchase of items. The project Supermarket Management System is to be developed with the objective of making the system reliable, easier, fast, and more informative.
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
Energy is a key component in the Wireless Sensor Network (WSN)[1]. The system will not be able to run according to its function without the availability of adequate power units. One of the characteristics of wireless sensor network is Limitation energy[2]. A lot of research has been done to develop strategies to overcome this problem. One of them is clustering technique. The popular clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH)[3]. In LEACH, clustering techniques are used to determine Cluster Head (CH), which will then be assigned to forward packets to Base Station (BS). In this research, we propose other clustering techniques, which utilize the Social Network Analysis approach theory of Betweeness Centrality (BC) which will then be implemented in the Setup phase. While in the Steady-State phase, one of the heuristic searching algorithms, Modified Bi-Directional A* (MBDA *) is implemented. The experiment was performed deploy 100 nodes statically in the 100x100 area, with one Base Station at coordinates (50,50). To find out the reliability of the system, the experiment to do in 5000 rounds. The performance of the designed routing protocol strategy will be tested based on network lifetime, throughput, and residual energy. The results show that BC-MBDA * is better than LEACH. This is influenced by the ways of working LEACH in determining the CH that is dynamic, which is always changing in every data transmission process. This will result in the use of energy, because they always doing any computation to determine CH in every transmission process. In contrast to BC-MBDA *, CH is statically determined, so it can decrease energy usage.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
Report handling on "LAPOR!" (Laporan, Aspirasi dan Pengaduan Online Rakyat) system depending on the system administrator who manually reads every incoming report [3]. Read manually can lead to errors in handling complaints [4] if the data flow is huge and grows rapidly, it needs at least three days to prepare a confirmation and it sensitive to inconsistencies [3]. In this study, the authors propose a model that can measure the identities of the Query (Incoming) with Document (Archive). The authors employed Class-Based Indexing term weighting scheme, and Cosine Similarities to analyse document similarities. CoSimTFIDF, CoSimTFICF and CoSimTFIDFICF values used in classification as feature for K-Nearest Neighbour (K-NN) classifier. The optimum result evaluation is pre-processing employ 75% of training data ratio and 25% of test data with CoSimTFIDF feature. It deliver a high accuracy 84%. The k = 5 value obtain high accuracy 84.12%
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
Application of 3D Printing in EducationEditor IJCATR
This paper provides a review of literature concerning the application of 3D printing in the education system. The review identifies that 3D Printing is being applied across the Educational levels [1] as well as in Libraries, Laboratories, and Distance education systems. The review also finds that 3D Printing is being used to teach both students and trainers about 3D Printing and to develop 3D Printing skills.
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
In underwater environment, for retrieval of information the routing mechanism is used. In routing mechanism there are three to four types of nodes are used, one is sink node which is deployed on the water surface and can collect the information, courier/super/AUV or dolphin powerful nodes are deployed in the middle of the water for forwarding the packets, ordinary nodes are also forwarder nodes which can be deployed from bottom to surface of the water and source nodes are deployed at the seabed which can extract the valuable information from the bottom of the sea. In underwater environment the battery power of the nodes is limited and that power can be enhanced through better selection of the routing algorithm. This paper focuses the energy-efficient routing algorithms for their routing mechanisms to prolong the battery power of the nodes. This paper also focuses the performance analysis of the energy-efficient algorithms under which we can examine the better performance of the route selection mechanism which can prolong the battery power of the node
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
The designing of routing algorithms faces many challenges in underwater environment like: propagation delay, acoustic channel behaviour, limited bandwidth, high bit error rate, limited battery power, underwater pressure, node mobility, localization 3D deployment, and underwater obstacles (voids). This paper focuses the underwater voids which affects the overall performance of the entire network. The majority of the researchers have used the better approaches for removal of voids through alternate path selection mechanism but still research needs improvement. This paper also focuses the architecture and its operation through merits and demerits of the existing algorithms. This research article further focuses the analytical method of the performance analysis of existing algorithms through which we found the better approach for removal of voids
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
In this paper we consider the initial value problem for a plate type equation with variable coefficients and memory in
1 n R n ), which is of regularity-loss property. By using spectrally resolution, we study the pointwise estimates in the spectral
space of the fundamental solution to the corresponding linear problem. Appealing to this pointwise estimates, we obtain the global
existence and the decay estimates of solutions to the semilinear problem by employing the fixed point theorem
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
1. International Journal of Computer Applications Technology and Research
Volume 4– Issue 7, 535 - 539, 2015, ISSN:- 2319–8656
www.ijcat.com 535
VANET Security against Sybil Attack by Using New SRAN
Routing Protocol
Omkar Shete
Department of Computer Engineering
Sinhgad Academy of Engineering,
Pune University,
Maharashtra India
Sachin Godse
Department of Computer Engineering
Sinhgad Academy of Engineering,
Pune University,
Maharashtra India
Abstract: A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes.
Keywords: VANET, ITS, V2V, V2I/V2R, Sybil attack, Routing Protocols.
1. INTRODUCTION
The vehicular ad hoc network (VANET) is a special
communication pattern to provide communication information
within the roadside-to-vehicles and inter-vehicle with the aid
of wireless network and information technology. Road traffic
activities are one of the most daily routines of common men.
The increasing road accidents and traffic congestion are
becoming major problems. VANET, a sub type of Mobile Ad
hoc Networks is developed to solve these problems which
provides scalable and cost-effective solutions for applications
such as safety messaging, dynamic routing. VANETs are used
in many safeties, critical applications; one of the applications
considered in this paper is secure safety routing which is
meant for cooperative driving and avoidance of accidents.
Sybil attack is more dangerous than any other threat. It injects
malicious vehicles on the road.
2. VANET
VANET is considered as a subgroup of Mobile Ad-hoc
Networks (MANETs) in which all nodes are vehicles that
move at various speeds. The main objective of VANET is to
enable communication between vehicle to vehicle and in
between vehicle to infrastructure. Transportation system’s
safety, security and efficiency are improved by using
Intelligent Transportation Systems (ITS). ITS consist of
various technologies like communications, information
processing and control. The integration of ITS technologies
with VANET systems is intended to save time, money and
lives. There are two types of VANET, used for
communication. First, Inter-vehicular communication refers to
the kind of communication in which vehicles communicate
with each other via wireless technology, also referred to as
Vehicle-to-Vehicle communication (V2V) as shown in Fig. 1.
It shows when a vehicle breaks down, immediately, the
vehicle begins the information dissemination process using
the broadcast communication mode. The vehicles that are near
to the vehicle, which has broken down, re-transmit the
message. In this way vehicles are notified and can take
alternative routes, avoiding a possible problem of traffic
congestion. In second type vehicles and fixed infrastructure
exchange information. This communication mode is referred
to as Vehicle-to-Infrastructure (V2I) or Vehicle to Roadside
(V2R) communication. V2R is the direct wireless exchange of
relevant information between vehicles and the communication
units placed on the side of roads and avenues as shown in Fig.
2 [1].
Figure 1: V2V [1]
Figure 2: V2R/V2I [1]
2. International Journal of Computer Applications Technology and Research
Volume 4– Issue 7, 535 - 539, 2015, ISSN:- 2319–8656
www.ijcat.com 536
3. SECURITY IN VANET
As VANET is becoming more popular, a serious challenge in
this environment is security. As we mentioned previously,
VANET is sub branch of MANET. Consequently, VANETs
inherit all the security issues associated with MANETs. The
malicious behavior of users, such as the modification of the
messages, could be fatal to the other vehicular users, etc.
Security and privacy in vehicular networks are important for
their acceptance. VANETs’ architectures and communication
schemes provide developers an environment for the
deployment of a wide variety of applications. However, major
concerns of such environments are privacy and security.
Strong security mechanisms are required to protect both
applications and users from possible attacks. Therefore,
powerful schemes are required to protect users’ private
information.
VANETs’ security is of great importance because any
vulnerability could lead to disastrous accidents where
people’s integrity may be put at risk. Security mechanisms
and schemes guarantee the protection of personal data
transmitted through VANET but not to identity, location, and
destination, among others. In VANET, multiple threats or
attacks are possible. One of them is Sybil attack which is
considered as major threat.
The Sybil attack is a well-known harmful attack. In this
attack malicious vehicles are injected into same network. This
attack is very dangerous since a malicious vehicle can present
in different positions at the same time, thereby creating
massive security risks in the network. The Sybil attack harms
the network topologies and connections as well as network
lives. In Fig.3, an attacker ‘A’ sends multiple messages with
different identities to the other vehicles. Thus, other vehicles
understand that there is heavy traffic. In ad hoc networks,
there are three common types of security against sybil attacks
which are registration, radio resource testing, and position
verification. Registration itself is not sufficient to prevent
Sybil attacks, because a fake node has possibility to entry with
multiple identities by non-technical means such as stealing.
However, a strict registration may lead to serious privacy
problem. Radio resource testing is based on the assumption
that all physical entities are limited in resources. In position
verification the position of nodes will be verified. The goal is
to make sure that each physical or original node refers to one
and only one identity [2].
Figure 3: Traffic Congestion [2]
4. EXISTING SYSTEMS
In VANET highly challenging tasks is to transporting
information from one vehicle to another or all vehicles within
specified area. There are several routing protocols defined to
transporting information (2014) [2], (2012) [5]. In VANET,
the routing protocols are classified as:
In VANET, the routing protocols are classified into four
categories. These protocols are characterized on the basis of
area where they are most suitable [3], [4].
4.1 Topology Based Routing Protocols
These routing protocols use association information that exists
in the network to perform packet forwarding. This protocol
further divided into three types.
4.1.1. Proactive routing protocols: Proactive routing
protocols continuously try to maintain up-to-date routing
information on every node in the network.
Advantage: Routing information is already available when the
first packet is sent so connection times are fast.
Disadvantage: When there is no traffic, continuously use
resources to communicate routing information.
Types: DSDV, OLSR, CGSR.
4.1.2. Reactive/Ad hoc based routing: Reactive routing
opens the route only when it is necessary for a node to
communicate with other nodes. Reactive routing consists of
route discovery phase so that the query packets are flooded
into the network for the path search and this phase completes
when route is found.
Types: AODV, PGB, DSR, TORA, and JARR.
4.1.3 Hybrid Protocols: It is combination of proactive and
reactive routing protocols. The hybrid protocols are used to
reduce the control overhead of proactive routing protocols and
decrease the initial route discovery delay in reactive routing
protocols.
Types: ZRP, HARP.
4.2 Geographical Routing Protocols
Some routing protocols make use of geographical
information, such as GPS coordinates. Typically, nodes
communicate their location through the network, so that other
nodes can determine shortest path. Select shortest path by
using this geographical information.
Disadvantage: Each node need to know its location.
4.3 Cluster Based Routing Protocols
Cluster based routing is like in clusters. Cluster consists of the
group of nodes that identifies themselves to be a part of
cluster and a node is designated as cluster head will broadcast
the packet to cluster. Good scalability is essential
characteristic that can be provided for large networks but
network delays and overhead are occurred when forming
clusters in highly mobile VANET.
Types: COIN, LORA-CBF, TIBCRPH, and CBDRP.
4.4 Broadcast Based Routing Protocols:
In certain applications, the host has to send packets to many or
all other hosts. Sending a packet to all destinations at a time is
called Broadcasting. This broadcast based routing protocols
used in VANET for sharing weather, traffic, emergency and
road conditions among all the vehicles.
Types: BROADCOMM, UMB, V-TRADE, and DV-CAST.
Also, there are several secure routing protocols are
available and there comparison is shown in Table I [5].
Table 1: Analysis of Secure Routing Protocol
3. International Journal of Computer Applications Technology and Research
Volume 4– Issue 7, 535 - 539, 2015, ISSN:- 2319–8656
www.ijcat.com 537
5. PROPOSED WORK
In VANET, Security is most important factor for secure
communication. Sybil attack is one of the major threats in the
network. It injects multiple malicious vehicle nodes in the
network and that harms the networks or loosing life. We are
proposing new secure routing protocol named as Secure
Routing for Ad hoc Network (SRAN) routing protocol. This
SRAN protocol detects as well as prevents Sybil attack.
SRAN is based on AODV. This SRAN protocol does not
allow Sybil node into Route discovery, hence Sybil node is
eliminated from the route. Also using RSU we can remove
this Sybil node from the Network. In SRAN protocol we
consider the following factors.
5.1 Route Request Packet format:
In SRAN routing protocol, if source wants to send message to
destination then it first broadcasts the route request (RREQ) to
its neighbors. Neighboring node receives RREQ, if receiving
node is not destination and does not have route to the
destination then it rebroadcast the RREQ and same time
backward route is created to the source. If the receiving node
is destination node or it has current route to the destination
then Route Reply (RREP) is generated.
1) RREQ ID: A sequence number uniquely identifying
the particular RREQ when taken in association with
the source node's IP address.
2) Source IP Address: The IP address of the Source.
3) Source Sequence Number: The Sequence number of
Source.
4) Source Unique ID: The Unique Identification of
Source.
5) Destination IP Address: The IP address of the
destination for which a route is selected.
6) Destination Sequence Number:The latest sequence
number received in the past by the source for any
route towards the destination.
7) Destination Unique ID: The Unique Identification
of Destination.
8) Hop Count: Number of hops needed to reach
destination.
5.2 Route Reply Packet format:
RREP is unicast and it is hop by hop fashion to source. In
RREP each intermediate node creates the route to the
destination. When source node receives RREP then it records
the forward route to the destination and starts sending
message. If multiple RREP’s is received by source then
depending upon hop count shortest path is selected.
1) Destination IP Address: The IP address of the
destination for which a route is given.
2) Destination Sequence Number: The Destination
sequence number associated to the route.
3) Destination Unique ID: The Unique Identification
of Destination.
4) Source IP Address: The IP address of the Source.
5) Source Unique ID: The Unique Identification of
Source.
6) Lifetime: Time to reach to the next Destination.
7) Hop Count: Number of Hops needed to reach the
Destination.
5.3 Route Error Packet format
When link break down is detected, RERR is generated and
send to the source node in hop by hop fashion. When each
intermediate node invalidates route to an unreachable
destinations or Sybil node is detected then RERR is sent
towards source node. When source node receives RERR then
it starts reinitiates route discovery.
1) Unreachable Destination IP Address: The IP
address of the destination that has become
unreachable due to a link break.
2) Unreachable Destination Sequence Number: The
sequence number in the route table entry for the
destination listed in the previous Unreachable
Destination IP Address field.
3) Sybil Node: The information about sybil node
which detected.
4. International Journal of Computer Applications Technology and Research
Volume 4– Issue 7, 535 - 539, 2015, ISSN:- 2319–8656
www.ijcat.com 538
5.4 Route Maintenance
Once route is defined then route maintenance is also required.
It is to provide information about link of the route as well as
route to be modified due to movement of one or more nodes
in the route. Every time route is used to send packet then its
expiry time is updated by adding current time and Active
Route Timeout (ART). ART is a constant value that defines
how long new route is kept into routing table of node after last
transmission done. ART defines both source and intermediate
node. If route is not used in the predefined period then node
can’t be sure that route is still valid or not and then this route
is removed from routing table. It ensures that no any
unnecessary packet loss.
5.5 MATHEMATICAL MODEL
In our SRAN routing protocol we provide Unique Identity
(UID) field in routing table of each node. When source node
broadcasts then all nodes in the network will be verified
original node or Sybil node by using UID. From Eq. 1 we can
identify the original node and get unique identity of node.
A = {x | x=1 then it is original node}
B = {x | x=2 then it is malicious node}
Where, x = Unique Identity of node.
If ‘A’ condition is true then original route is follow and if ‘B’
condition is true then route is automatically eliminated.
5.6 Flow chart of Sybil attack Algorithm
Figure 4: Flow of Sybil attack algorithm.
Considering analysis of secure routing protocols use different
techniques to detect as well as prevent attacks. Sybil attack
gets all the properties of original node. When Sybil attack is
performed into this network then it first identifies the node as
source node, if yes then no attack is performed on that node. If
node is not source node then perform Sybil attack on that
node. In this attack one or more Sybil nodes are injected into
the network. This Sybil node can get all the properties of
original node but automatically increase the value of Unique
Identity as shown in Fig. 4. So when performing route
discovery each node can check UID value when it is one then
this node become a part of route. When UID value is not one
then this node is Sybil node that means it detects the Sybil
node and not gets into the route. So this Sybil node is
automatically prevented from the route.
Figure 5: Execution of SRAN Protocol
6. EXPECTED RESULTS
In SRAN protocol separate mechanisms are not used to detect
as well as to prevent sybil attack. So it improves the
performance of all route activities. It prevents those Sybil
nodes to come into that route. It shows total number of
packets have been successfully received from source to
destination and it also increases the throughputs. In Table II
shows RREQ in which UID field consider to identify original
node and fake node. Also it has very less delay because of on
demand route selection.
Table 2: RREQ
Source
ID
Dest.
ID
Source IP Dest. IP
UID
2 4 168.192.10.10 168.192.10.16 1
4 3 168.192.10.16 121.11.10.15 2
4 1 168.192.10.16 121.11.10.17 1