SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Grid and Distributed Computing
Vol. 9, No. 7 (2016), pp.301-306
http://dx.doi.org/10.14257/ijgdc.2016.9.7.30
ISSN: 2005-4262 IJGDC
Copyright â“’ 2016 SERSC
Vehicular Ad Hoc Networks: Hashing and Trust Computation
Techniques
Pallavi Agarwal1
and Neha Bhardwaj2
1
Research Scholar, CSE & IT Dept., Madhav Institute of Technology & Science,
Gwalior, India
2
Assistant Professor, CSE & IT Dept., Madhav Institute of Technology & Science,
Gwalior, India
1
pallaviagarwal015@gmail.com, 2
bhardwaj.neha08@gmail.com
Abstract
Vehicular ad-hoc networks (VANETs) technology has come out as an important
research field over the last few years. VANETs are the likely an influencing approach to
provide safety of driver and other applications for the traffic conditions as well as
passengers. Being dynamic in nature, it establishes the network, according to the
situation and need of the users and provides reliable communication among the vehicles.
Due to its great benefits, it is highly vulnerable to various attacks and security in VANET
should be taken into consideration. This paper presented the security attacks between
vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). Many research works have
been done to improve the performance and security of this network. The main aim of this
paper is the security using hashing and techniques to calculate the trust in VANETs.
Keywords: Vehicular Adhoc Network, Attacks, Hashing, Road Side Unit, On Board
Unit, Security, Trust Computation.
1. Introduction
Vehicular ad hoc network (VANET) may be a specific form of Mobile Ad-Hoc
Network (MANET) that provides communication between the vehicles and the vehicles
and roadside infrastructure. VANET differs from MANET because it provides higher
quality of nodes, larger scale networks, geographically unnatural topology and frequent
network fragmentation. There is not any fixed infrastructure networks and have
confidence the vehicles themselves for implementing any network practicality. A VANET
may be a redistributed network as each node performs the functions of host and router. It
is the technology [1] of building a secure network between vehicles; i.e. vehicles
communicate to every alternative and pass information to another vehicle. The most
advantage of VANET communication is the enhanced driver's safety by virtue of
exchanging warning messages between vehicles. VANET security is crucial as a result of
a poorly designed VANET is susceptible to network attacks and this successively
compromises the protection of drivers. Security systems have to make sure that
transmission comes from an authorized source and not tampered in the route by different
sources.
Accidents can be avoided if the vehicles follow the traffic rules and road limit. The
malicious node could spread out spam messages and send false messages to make issues
like false information of collision and theft and heavy traffic. VANET has become a
growing space of analysis. Researchers have put lots of efforts [2] in this field to create
robust plan and the implementation of VANET network environment. With the increasing
quantity of the vehicles, roads can probably get more rushful. Thus, it is very necessary to
extend road safety and reduce traffic congestion. In VANET, the communication is
established by transferring the updated information about the road and traffic conditions
International Journal of Grid and Distributed Computing
Vol. 9, No. 7 (2016)
302 Copyright â“’ 2016 SERSC
to avoid road accidents and efficient result of traffic. VANET is employed to give the
protection and traffic reports to the users about traffic jams, earthquake, tsunami, etc. for
lessening the road accidents, fuel consumption and provides safe driving atmosphere.
Figure 1. Overview of VANET
In intelligent transportation systems, every vehicle broadcast data [3] to the vehicular
network or transportation company by having the role of sender, receiver, and the router
by using the data to validate safe, free-flow of traffic. Vehicles should be equipped with
some variety of radio interface or Onboard Unit (OBU) for communication to occur
between vehicles and Road Side Units (RSUs) that enables adhoc short-range wireless
networks to be created [4]. Vehicles should even be fitted with hardware that allows the
data with the exact position of the vehicle such as global Positioning System (GPS) or a
Differential Global Positioning System (DGPS) receiver. RSUs are fixed and are
connected to the backbone network, which should be in place to promote communication.
The distribution and amount of roadside units should be relying on the communication
protocol is to be used. However, some protocols need roadside units to be allocated
equally throughout the full road network, some need roadside units solely at intersections,
while others need roadside units solely at region borders. Though it's safe to assume that
infrastructure exists to some extent and vehicles have access to that periodically.
The possible communication structure of intelligent transportation systems includes
inter-vehicle and vehicle-to-roadside communications. Inter-vehicle and vehicle-to-
roadside communications depend on correct and up-to-date data concerning the
surrounding geographical area, which in turn, needs the employment of accurate
positioning systems and elegant communication protocols for exchanging data. In this
network, the communication medium is shared, highly unreliable, and with restricted
bandwidth. The elegant communication protocols should guarantee quick and reliable
delivery of information to all or any vehicles within the section.
2. Literature Review
Uzma Khan et al. [5], surveyed a method to detect misbehavior or malicious nodes. It
creates a reliable and secure environment for communication. Verma et al. [6], proposed
secure group communication method in which vehicles communicate by two ways. In the
first way, they authenticate y RSUs and secondly communicate by creating a group. Raya
et al. [7], presented a method to protect the privacy of vehicles from the other vehicles by
generating fake identity of vehicles. Jorge h. et al. [8], proposed a scheme to detect the
behavior of the neighbor node by watching them continuously. It used intrusion detection
of a watchdog to differentiate the malicious node. Chuang et al. [9], proposed a scheme
TEAM to enhance the authentication among the vehicles in less time and compute the
keys by using hashing techniques. Monir et al. [10], proposed a mechanism to establish
the trust by using trust management among the nodes. Every node is monitored and then
calculate the trust value of that node.
International Journal of Grid and Distributed Computing
Vol. 9, No. 7 (2016)
Copyright â“’ 2016 SERSC 303
3. Security Attacks in VANET
Security attacks are performed in VANET to violate the privacy and also harm the
vehicle’s driver [11].
3.1. Denial of Service (DOS)
DOS is very common attack to block the network and unable the users to use the
services. This attack is very harmful for the vehicles as it stops the communication totally.
The whole network gets jammed by this attack and this decrease the reliability of the
network.
3.2. Sybil Attack
Sybil attack performs by creating multiple identities of the single vehicle and sending
the messages by the node. But the receiver thinks that they are getting messages from the
multiple senders. This creates the confusion of multiple nodes in the network and also
increase the routing overhead.
3.3. Eavesdropping Attack
Eavesdropping attack is a passive attack in which the attackers did not perform any
changes. This attack is used to violate the confidentiality of the messages. It is very
difficult to detect this attack as the attacker only analyze the data like vehicles location or
identity.
3.4. Fabrication Attack
Fabrication attack is performed to broadcast the false messages in the network. An
attacker changes the data and then transfer it to other vehicles and send it by using another
identity [12].
3.5. Impersonation Attack
Impersonation attack means the attacker takes the identity of another user and try to
impersonate. This attack is very dangerous if they send any false information about the
accident happened in any location.
4. Hashing
Hashing is a technique which is used in cryptography for achieving the authentication
and integrity of the sender or messages. It is very useful and fast method to ensure the
security in the network. It takes an input message of variable length and generates the
hash value (or known as message digest) of fixed length.
International Journal of Grid and Distributed Computing
Vol. 9, No. 7 (2016)
304 Copyright â“’ 2016 SERSC
Figure 2. Hashing in Cryptography
There are different variants available according to the need of users in which the key
sizes are different and some are fast, but less secure and vice versa [13]. At the sender’s
side, when user input the message and it produce the hash value (h) then encryption
performed to make it more secure. After transmitting it from the secure channel, receiver
decrypts it by using the key and generate the hash value of the received message. Then it
compared the hash value contained in the message and it creates. If both the values are
equal, then it verifies that the data is not altered during the transmission and it is sent by
an authenticated user.
5. Trust in VANET
In VANET, each vehicle communicates with other vehicles securely if there is a
confidence in that vehicle. It is based on the behavior of the nodes in the network if they
forward the message, then they considered to be trustful otherwise malicious [14]. Every
vehicle calculates the trust values according to its requirements and this can be vary with
the time also. In the beginning, each vehicle has a default value which is increased or
decreased with every interaction.
Trust establishment can be done in various ways of creating the trustful environment.
Vehicles individually calculate the trust value of other vehicles by sending the messages
to the neighbor’s node [15]. Figure 3. describes various techniques to establish trust in the
network.
Figure 3. Trust Establishment
6. Conclusion
In Vehicular Ad Hoc Networks (VANET), communication among vehicles should be
done by the proper trust establishment to secure messages exchange and reliability. We
presented an attack of VANET and hashing to maintain the security by maintaining the
integrity of the messages and authentication of sender. In this survey, we discussed some
International Journal of Grid and Distributed Computing
Vol. 9, No. 7 (2016)
Copyright â“’ 2016 SERSC 305
some trust calculation techniques to secure communicate among the vehicles We mention
some important properties that should be archived by proper management of trust for
VANET, setting a specific outcome for researchers in this area.
References
[1] S. K. Sood, A. K. Sarje, and K. Singh, “A secure dynamic identity based authentication protocol for
multi-server architecture,” J. Netw. Comput. Appl., vol. 34, pp. 609–618, (2011) March.
[2] F. We and X. Li, “An improved dynamic ID-based remote user authentication with key agreement
scheme,” Comput. Electr. Eng., vol. 38, pp. 381–387, (2012) March.
[3] C. Chen, J. Zhang, R. Cohen, and P. Han Ho, “A trust-based message propagation and evaluation
framework in VANETs”, International Conference on Information Technology Convergence and
Services, (2010).
[4] Ding, Qing, Xi Li, Ming Jiang, and XueHai Zhou, "Reputation-based trust model in Vehicular ad hoc
networks", Wireless Communications and Signal Processing (WCSP), International Conference on
IEEE, (2010), pp. 1-6.
[5] Uzma Khan, Shikha Agrawal and Sanjay Silakari, "A Detailed Survey on Misbehavior Node Detection
Techniques in Vehicular Ad Hoc Networks," Advances in Intelligent Systems and Computing, Vol. 339,
pp 11-19, (2015).
[6] Verma, Mayank and Dijiang Huang, “SeGCom: secure group communication in VANETs.” In
Consumer Communications and Networking Conference, 2009, CCNC 2009, 6th IEEE, pp. 1-5. IEEE,
(2009).
[7] Maxim Raya, “The Security of Vehicular Ad Hoc Networks”, SASN, Alexandria, Verginia, USA,
(2005) November 7, pp. 11-21.
[8] Hortelano, Jorge, Juan Carlos Ruiz, and Pietro Manzoni, "Evaluating the usefulness of watchdogs for
intrusion detection in VANETs", Communications Workshops (ICC), IEEE International Conference,
(2010), pp. 1-5.
[9] Ming-Chin Chuang and Jeng-Farn Le, “TEAM: Trust-Extended Authentication Mechanism for
Vehicular Ad Hoc Networks”, IEEE, (2013).
[10] Merrihan Monir, Ayman Abdel-Hamid and Mohammed Abd El Aziz, “A categorized trust-based
message reporting scheme for VANETs”, Advances in Security of Information and Communication
Networks, pp. 65-83.
[11] Hannes Hartenstein, “A Tutorial Survey on Vehicular Ad Hoc Networks”, IEEE Communication
Magazine, (2008) June, pp. 164-171.
[12] Am Shringar Raw, Manish Kumar, Nanhay Singh, “Security challenges, issues and their solutions for
VANET”, International Journal of Network Security & Its Applications (IJNSA), vol.5, (2013)
September.
[13] J. Zhang, “A survey on trust management for VANETs”, International Conference on Advanced
Information Networking and Applications, (2011), pp. 105-112.
[14] Liao, Cong, Jian Chang, Insup Lee and Krishna K. Venkatasubramanian, "A trust model for vehicular
network-based incident reports", Wireless Vehicular Communications (WiVeC), IEEE 5th International
Symposium on IEEE, (2013), pp. 1-5.
[15] J. Zhang, “Trust management for VANETs: challenges, desired properties and future directions”,
International Journal of Distributed Systems and Technologies, (2012), pp. 48-62.
International Journal of Grid and Distributed Computing
Vol. 9, No. 7 (2016)
306 Copyright â“’ 2016 SERSC

More Related Content

What's hot

Vanet by Sujata Tiwari
Vanet by Sujata TiwariVanet by Sujata Tiwari
Vanet by Sujata Tiwarirahulpandey510
 
Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)Prof Ansari
 
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network SecurityLim Jung
 
Vehicular ad hoc network - VANET
Vehicular ad hoc network - VANETVehicular ad hoc network - VANET
Vehicular ad hoc network - VANETSarah Baras
 
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...pijans
 
Performance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsPerformance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsjournalBEEI
 
A review on various security attacks in vehicular ad hoc networks
A review on various security attacks in vehicular ad hoc networksA review on various security attacks in vehicular ad hoc networks
A review on various security attacks in vehicular ad hoc networksjournalBEEI
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
 
Data Aggregation and Dissemination in Vehicular Ad-Hoc Networks
Data Aggregation and Dissemination in Vehicular Ad-Hoc NetworksData Aggregation and Dissemination in Vehicular Ad-Hoc Networks
Data Aggregation and Dissemination in Vehicular Ad-Hoc NetworksMichele Weigle
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challengesBehroz Zarrinfar
 
Do s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetDo s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetsirojiddin
 
Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPTMeghaj Mallick
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSSridhar Raghavan
 
Introduction of VANET
Introduction of VANETIntroduction of VANET
Introduction of VANETPallavi Agarwal
 

What's hot (20)

VEHICULAR ADHOC NETKWOK
VEHICULAR ADHOC NETKWOKVEHICULAR ADHOC NETKWOK
VEHICULAR ADHOC NETKWOK
 
Vanet by Sujata Tiwari
Vanet by Sujata TiwariVanet by Sujata Tiwari
Vanet by Sujata Tiwari
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)
 
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security
 
Vehicular ad hoc network - VANET
Vehicular ad hoc network - VANETVehicular ad hoc network - VANET
Vehicular ad hoc network - VANET
 
VANET
VANETVANET
VANET
 
VANET, Security and Trust
VANET, Security and TrustVANET, Security and Trust
VANET, Security and Trust
 
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
 
Performance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsPerformance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocols
 
A review on various security attacks in vehicular ad hoc networks
A review on various security attacks in vehicular ad hoc networksA review on various security attacks in vehicular ad hoc networks
A review on various security attacks in vehicular ad hoc networks
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANET
 
Data Aggregation and Dissemination in Vehicular Ad-Hoc Networks
Data Aggregation and Dissemination in Vehicular Ad-Hoc NetworksData Aggregation and Dissemination in Vehicular Ad-Hoc Networks
Data Aggregation and Dissemination in Vehicular Ad-Hoc Networks
 
14251D6514
14251D651414251D6514
14251D6514
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challenges
 
Do s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetDo s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanet
 
Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPT
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkS
 
Introduction of VANET
Introduction of VANETIntroduction of VANET
Introduction of VANET
 
Introduction to VANET
Introduction to VANETIntroduction to VANET
Introduction to VANET
 

Similar to VANET: Trust and Hashing

Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANETPallavi Agarwal
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationIJERA Editor
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
 
The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...
The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...
The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...IRJET Journal
 
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc NetworkDeterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Networkpaperpublications3
 
Overview of Trust and Cryptography in VANET
Overview of Trust and Cryptography in VANET Overview of Trust and Cryptography in VANET
Overview of Trust and Cryptography in VANET Pallavi Agarwal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
SURVEY ON SECURE ROUTING IN VANETS
SURVEY ON SECURE ROUTING IN VANETSSURVEY ON SECURE ROUTING IN VANETS
SURVEY ON SECURE ROUTING IN VANETSIJNSA Journal
 
SURVEY ON SECURE ROUTING IN VANETS
SURVEY ON SECURE ROUTING IN VANETSSURVEY ON SECURE ROUTING IN VANETS
SURVEY ON SECURE ROUTING IN VANETSIJNSA Journal
 
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Dr. Amarjeet Singh
 
Vehicular adhoc network for communication
Vehicular adhoc network for communicationVehicular adhoc network for communication
Vehicular adhoc network for communicationathirayanpericse
 
A secure alert messaging for vehicular ad hoc networks
A secure alert messaging for vehicular ad hoc networksA secure alert messaging for vehicular ad hoc networks
A secure alert messaging for vehicular ad hoc networksIAEME Publication
 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc NetworksCooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
 
VANET: Routing Protocols, Security Issues and Simulation Tools
VANET: Routing Protocols, Security Issues and Simulation ToolsVANET: Routing Protocols, Security Issues and Simulation Tools
VANET: Routing Protocols, Security Issues and Simulation ToolsIOSR Journals
 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network IRJET Journal
 
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsBlockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsIJCNCJournal
 
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSBLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSIJCNCJournal
 
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
 

Similar to VANET: Trust and Hashing (20)

Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANET
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...
The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...
The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...
 
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc NetworkDeterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
 
Overview of Trust and Cryptography in VANET
Overview of Trust and Cryptography in VANET Overview of Trust and Cryptography in VANET
Overview of Trust and Cryptography in VANET
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
SURVEY ON SECURE ROUTING IN VANETS
SURVEY ON SECURE ROUTING IN VANETSSURVEY ON SECURE ROUTING IN VANETS
SURVEY ON SECURE ROUTING IN VANETS
 
SURVEY ON SECURE ROUTING IN VANETS
SURVEY ON SECURE ROUTING IN VANETSSURVEY ON SECURE ROUTING IN VANETS
SURVEY ON SECURE ROUTING IN VANETS
 
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
 
Vehicular adhoc network for communication
Vehicular adhoc network for communicationVehicular adhoc network for communication
Vehicular adhoc network for communication
 
A secure alert messaging for vehicular ad hoc networks
A secure alert messaging for vehicular ad hoc networksA secure alert messaging for vehicular ad hoc networks
A secure alert messaging for vehicular ad hoc networks
 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc NetworksCooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
 
VANET: Routing Protocols, Security Issues and Simulation Tools
VANET: Routing Protocols, Security Issues and Simulation ToolsVANET: Routing Protocols, Security Issues and Simulation Tools
VANET: Routing Protocols, Security Issues and Simulation Tools
 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network
 
Sub1565
Sub1565Sub1565
Sub1565
 
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsBlockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
 
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSBLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
 
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
 

Recently uploaded

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoĂŁo Esperancinha
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 

VANET: Trust and Hashing

  • 1. International Journal of Grid and Distributed Computing Vol. 9, No. 7 (2016), pp.301-306 http://dx.doi.org/10.14257/ijgdc.2016.9.7.30 ISSN: 2005-4262 IJGDC Copyright â“’ 2016 SERSC Vehicular Ad Hoc Networks: Hashing and Trust Computation Techniques Pallavi Agarwal1 and Neha Bhardwaj2 1 Research Scholar, CSE & IT Dept., Madhav Institute of Technology & Science, Gwalior, India 2 Assistant Professor, CSE & IT Dept., Madhav Institute of Technology & Science, Gwalior, India 1 pallaviagarwal015@gmail.com, 2 bhardwaj.neha08@gmail.com Abstract Vehicular ad-hoc networks (VANETs) technology has come out as an important research field over the last few years. VANETs are the likely an influencing approach to provide safety of driver and other applications for the traffic conditions as well as passengers. Being dynamic in nature, it establishes the network, according to the situation and need of the users and provides reliable communication among the vehicles. Due to its great benefits, it is highly vulnerable to various attacks and security in VANET should be taken into consideration. This paper presented the security attacks between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). Many research works have been done to improve the performance and security of this network. The main aim of this paper is the security using hashing and techniques to calculate the trust in VANETs. Keywords: Vehicular Adhoc Network, Attacks, Hashing, Road Side Unit, On Board Unit, Security, Trust Computation. 1. Introduction Vehicular ad hoc network (VANET) may be a specific form of Mobile Ad-Hoc Network (MANET) that provides communication between the vehicles and the vehicles and roadside infrastructure. VANET differs from MANET because it provides higher quality of nodes, larger scale networks, geographically unnatural topology and frequent network fragmentation. There is not any fixed infrastructure networks and have confidence the vehicles themselves for implementing any network practicality. A VANET may be a redistributed network as each node performs the functions of host and router. It is the technology [1] of building a secure network between vehicles; i.e. vehicles communicate to every alternative and pass information to another vehicle. The most advantage of VANET communication is the enhanced driver's safety by virtue of exchanging warning messages between vehicles. VANET security is crucial as a result of a poorly designed VANET is susceptible to network attacks and this successively compromises the protection of drivers. Security systems have to make sure that transmission comes from an authorized source and not tampered in the route by different sources. Accidents can be avoided if the vehicles follow the traffic rules and road limit. The malicious node could spread out spam messages and send false messages to make issues like false information of collision and theft and heavy traffic. VANET has become a growing space of analysis. Researchers have put lots of efforts [2] in this field to create robust plan and the implementation of VANET network environment. With the increasing quantity of the vehicles, roads can probably get more rushful. Thus, it is very necessary to extend road safety and reduce traffic congestion. In VANET, the communication is established by transferring the updated information about the road and traffic conditions
  • 2. International Journal of Grid and Distributed Computing Vol. 9, No. 7 (2016) 302 Copyright â“’ 2016 SERSC to avoid road accidents and efficient result of traffic. VANET is employed to give the protection and traffic reports to the users about traffic jams, earthquake, tsunami, etc. for lessening the road accidents, fuel consumption and provides safe driving atmosphere. Figure 1. Overview of VANET In intelligent transportation systems, every vehicle broadcast data [3] to the vehicular network or transportation company by having the role of sender, receiver, and the router by using the data to validate safe, free-flow of traffic. Vehicles should be equipped with some variety of radio interface or Onboard Unit (OBU) for communication to occur between vehicles and Road Side Units (RSUs) that enables adhoc short-range wireless networks to be created [4]. Vehicles should even be fitted with hardware that allows the data with the exact position of the vehicle such as global Positioning System (GPS) or a Differential Global Positioning System (DGPS) receiver. RSUs are fixed and are connected to the backbone network, which should be in place to promote communication. The distribution and amount of roadside units should be relying on the communication protocol is to be used. However, some protocols need roadside units to be allocated equally throughout the full road network, some need roadside units solely at intersections, while others need roadside units solely at region borders. Though it's safe to assume that infrastructure exists to some extent and vehicles have access to that periodically. The possible communication structure of intelligent transportation systems includes inter-vehicle and vehicle-to-roadside communications. Inter-vehicle and vehicle-to- roadside communications depend on correct and up-to-date data concerning the surrounding geographical area, which in turn, needs the employment of accurate positioning systems and elegant communication protocols for exchanging data. In this network, the communication medium is shared, highly unreliable, and with restricted bandwidth. The elegant communication protocols should guarantee quick and reliable delivery of information to all or any vehicles within the section. 2. Literature Review Uzma Khan et al. [5], surveyed a method to detect misbehavior or malicious nodes. It creates a reliable and secure environment for communication. Verma et al. [6], proposed secure group communication method in which vehicles communicate by two ways. In the first way, they authenticate y RSUs and secondly communicate by creating a group. Raya et al. [7], presented a method to protect the privacy of vehicles from the other vehicles by generating fake identity of vehicles. Jorge h. et al. [8], proposed a scheme to detect the behavior of the neighbor node by watching them continuously. It used intrusion detection of a watchdog to differentiate the malicious node. Chuang et al. [9], proposed a scheme TEAM to enhance the authentication among the vehicles in less time and compute the keys by using hashing techniques. Monir et al. [10], proposed a mechanism to establish the trust by using trust management among the nodes. Every node is monitored and then calculate the trust value of that node.
  • 3. International Journal of Grid and Distributed Computing Vol. 9, No. 7 (2016) Copyright â“’ 2016 SERSC 303 3. Security Attacks in VANET Security attacks are performed in VANET to violate the privacy and also harm the vehicle’s driver [11]. 3.1. Denial of Service (DOS) DOS is very common attack to block the network and unable the users to use the services. This attack is very harmful for the vehicles as it stops the communication totally. The whole network gets jammed by this attack and this decrease the reliability of the network. 3.2. Sybil Attack Sybil attack performs by creating multiple identities of the single vehicle and sending the messages by the node. But the receiver thinks that they are getting messages from the multiple senders. This creates the confusion of multiple nodes in the network and also increase the routing overhead. 3.3. Eavesdropping Attack Eavesdropping attack is a passive attack in which the attackers did not perform any changes. This attack is used to violate the confidentiality of the messages. It is very difficult to detect this attack as the attacker only analyze the data like vehicles location or identity. 3.4. Fabrication Attack Fabrication attack is performed to broadcast the false messages in the network. An attacker changes the data and then transfer it to other vehicles and send it by using another identity [12]. 3.5. Impersonation Attack Impersonation attack means the attacker takes the identity of another user and try to impersonate. This attack is very dangerous if they send any false information about the accident happened in any location. 4. Hashing Hashing is a technique which is used in cryptography for achieving the authentication and integrity of the sender or messages. It is very useful and fast method to ensure the security in the network. It takes an input message of variable length and generates the hash value (or known as message digest) of fixed length.
  • 4. International Journal of Grid and Distributed Computing Vol. 9, No. 7 (2016) 304 Copyright â“’ 2016 SERSC Figure 2. Hashing in Cryptography There are different variants available according to the need of users in which the key sizes are different and some are fast, but less secure and vice versa [13]. At the sender’s side, when user input the message and it produce the hash value (h) then encryption performed to make it more secure. After transmitting it from the secure channel, receiver decrypts it by using the key and generate the hash value of the received message. Then it compared the hash value contained in the message and it creates. If both the values are equal, then it verifies that the data is not altered during the transmission and it is sent by an authenticated user. 5. Trust in VANET In VANET, each vehicle communicates with other vehicles securely if there is a confidence in that vehicle. It is based on the behavior of the nodes in the network if they forward the message, then they considered to be trustful otherwise malicious [14]. Every vehicle calculates the trust values according to its requirements and this can be vary with the time also. In the beginning, each vehicle has a default value which is increased or decreased with every interaction. Trust establishment can be done in various ways of creating the trustful environment. Vehicles individually calculate the trust value of other vehicles by sending the messages to the neighbor’s node [15]. Figure 3. describes various techniques to establish trust in the network. Figure 3. Trust Establishment 6. Conclusion In Vehicular Ad Hoc Networks (VANET), communication among vehicles should be done by the proper trust establishment to secure messages exchange and reliability. We presented an attack of VANET and hashing to maintain the security by maintaining the integrity of the messages and authentication of sender. In this survey, we discussed some
  • 5. International Journal of Grid and Distributed Computing Vol. 9, No. 7 (2016) Copyright â“’ 2016 SERSC 305 some trust calculation techniques to secure communicate among the vehicles We mention some important properties that should be archived by proper management of trust for VANET, setting a specific outcome for researchers in this area. References [1] S. K. Sood, A. K. Sarje, and K. Singh, “A secure dynamic identity based authentication protocol for multi-server architecture,” J. Netw. Comput. Appl., vol. 34, pp. 609–618, (2011) March. [2] F. We and X. Li, “An improved dynamic ID-based remote user authentication with key agreement scheme,” Comput. Electr. Eng., vol. 38, pp. 381–387, (2012) March. [3] C. Chen, J. Zhang, R. Cohen, and P. Han Ho, “A trust-based message propagation and evaluation framework in VANETs”, International Conference on Information Technology Convergence and Services, (2010). [4] Ding, Qing, Xi Li, Ming Jiang, and XueHai Zhou, "Reputation-based trust model in Vehicular ad hoc networks", Wireless Communications and Signal Processing (WCSP), International Conference on IEEE, (2010), pp. 1-6. [5] Uzma Khan, Shikha Agrawal and Sanjay Silakari, "A Detailed Survey on Misbehavior Node Detection Techniques in Vehicular Ad Hoc Networks," Advances in Intelligent Systems and Computing, Vol. 339, pp 11-19, (2015). [6] Verma, Mayank and Dijiang Huang, “SeGCom: secure group communication in VANETs.” In Consumer Communications and Networking Conference, 2009, CCNC 2009, 6th IEEE, pp. 1-5. IEEE, (2009). [7] Maxim Raya, “The Security of Vehicular Ad Hoc Networks”, SASN, Alexandria, Verginia, USA, (2005) November 7, pp. 11-21. [8] Hortelano, Jorge, Juan Carlos Ruiz, and Pietro Manzoni, "Evaluating the usefulness of watchdogs for intrusion detection in VANETs", Communications Workshops (ICC), IEEE International Conference, (2010), pp. 1-5. [9] Ming-Chin Chuang and Jeng-Farn Le, “TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks”, IEEE, (2013). [10] Merrihan Monir, Ayman Abdel-Hamid and Mohammed Abd El Aziz, “A categorized trust-based message reporting scheme for VANETs”, Advances in Security of Information and Communication Networks, pp. 65-83. [11] Hannes Hartenstein, “A Tutorial Survey on Vehicular Ad Hoc Networks”, IEEE Communication Magazine, (2008) June, pp. 164-171. [12] Am Shringar Raw, Manish Kumar, Nanhay Singh, “Security challenges, issues and their solutions for VANET”, International Journal of Network Security & Its Applications (IJNSA), vol.5, (2013) September. [13] J. Zhang, “A survey on trust management for VANETs”, International Conference on Advanced Information Networking and Applications, (2011), pp. 105-112. [14] Liao, Cong, Jian Chang, Insup Lee and Krishna K. Venkatasubramanian, "A trust model for vehicular network-based incident reports", Wireless Vehicular Communications (WiVeC), IEEE 5th International Symposium on IEEE, (2013), pp. 1-5. [15] J. Zhang, “Trust management for VANETs: challenges, desired properties and future directions”, International Journal of Distributed Systems and Technologies, (2012), pp. 48-62.
  • 6. International Journal of Grid and Distributed Computing Vol. 9, No. 7 (2016) 306 Copyright â“’ 2016 SERSC