Malicious node identification routing and protection mechanism for VANET against various attack

Er. Ritika Saini, H. Kundra
{"title":"Malicious node identification routing and protection mechanism for VANET against various attack","authors":"Er. Ritika Saini, H. Kundra","doi":"10.24297/IJCT.V20I.8852","DOIUrl":null,"url":null,"abstract":"With the help of road side unit vehicles communicate among themselves. This technique termed as VANET. This network helps us to improve the safety and efficiency of the occupants during travelling in vehicles. The basic idea of this technique is to send information about the traffic information to the road side unit or other vehicles. These vehicles get safe from attacks and misuse of their private data. The objective of this paper to secure the communication among the vehicles and the road side unit. In this technique the communication mainly dependant on the safety of the road such as vehicles tracking, emergency situations and message monitoring. There are various attacks like Sybil and Gray hole attack are vulnerable to VANET. To protect from these attacks our technique provide malicious node identification mechanism that help us to provide better facility to send data to vehicles safely. To avoid these types of attacks, our propose technique include feature like key management system to prevent the communication among the vehicles. Our proposed system mostly focus on Bandwidth, packet loss and packet delivery ratio [12].","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"63 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.24297/IJCT.V20I.8852","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

With the help of road side unit vehicles communicate among themselves. This technique termed as VANET. This network helps us to improve the safety and efficiency of the occupants during travelling in vehicles. The basic idea of this technique is to send information about the traffic information to the road side unit or other vehicles. These vehicles get safe from attacks and misuse of their private data. The objective of this paper to secure the communication among the vehicles and the road side unit. In this technique the communication mainly dependant on the safety of the road such as vehicles tracking, emergency situations and message monitoring. There are various attacks like Sybil and Gray hole attack are vulnerable to VANET. To protect from these attacks our technique provide malicious node identification mechanism that help us to provide better facility to send data to vehicles safely. To avoid these types of attacks, our propose technique include feature like key management system to prevent the communication among the vehicles. Our proposed system mostly focus on Bandwidth, packet loss and packet delivery ratio [12].
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
恶意节点识别路由和VANET抵御各种攻击的保护机制
在路旁单元的帮助下,车辆之间进行通信。这种技术被称为VANET。这个网络帮助我们提高乘客乘车时的安全和效率。该技术的基本思想是将有关交通信息的信息发送给道路侧单元或其他车辆。这些车辆可以免受攻击和私人数据的滥用。本文的目标是确保车辆与道路侧单元之间的通信。在该技术中,通信主要依赖于道路安全,如车辆跟踪,紧急情况和消息监控。有各种各样的攻击,像西比尔和灰洞攻击是脆弱的VANET。为了防止这些攻击,我们的技术提供了恶意节点识别机制,帮助我们提供更好的设施,以安全地向车辆发送数据。为了避免这些类型的攻击,我们提出的技术包括密钥管理系统等功能,以防止车辆之间的通信。我们提出的系统主要关注带宽、丢包率和包投递率[12]。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Blockwise Analysis of Health Indicators of Gadchiroli District using Composite Index: An application of GKG Algorithm Home Automation Using Packet Tracer and ESP8266 An Economic Model of Machine Translation Digital Business Model Innovation: Empirical insights into the drivers and value of Artificial Intelligence An Empirical Model For Validity And Verification Of Ai Behavior: Overcoming Ai Hazards In Neural Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1