Analysis of Various Trust based Security Algoithm for the Vehicular AD-HOC Network

K. Tripathi, S. Sharma, A. Yadav
{"title":"Analysis of Various Trust based Security Algoithm for the Vehicular AD-HOC Network","authors":"K. Tripathi, S. Sharma, A. Yadav","doi":"10.1109/ICRIEECE44171.2018.9009288","DOIUrl":null,"url":null,"abstract":"Due to the exponential growth in the automobile industry and road transport, there is need of intelligence transportation system (ITS). Vehicular ad-hoc is a part of intelligence transportation system (ITS), which provides security, traffic efficiency and ease to the user. In Vehicular network various nodes exchange the messages and data for the communication. For transmitting the data from source to destination node, we have to rely on intermediate nodes due to limited range of the vehicular nodes. To check the reliability of data delivery we have to find out that which node is trustable or which node is faulty. There are various algorithms presents by various authors to compute the trust of different-different nodes presents in the network. Trust based algorithms are easy to implement and requires very less calculation overhead.The authors have studied and analyzed various trust based security algorithms in terms of approach and tools used by different authors. The different attacks and the limitations of the various trust based security algorithms are briefly summarize in table-1. Further authors have compiled in table-2 the attacks with targeted services and possible solutions. The various simulation tools used to simulate the vehicular ad-hoc network are summarized in table-3. The paper is useful for the bingers who wish to carry out further analysis on trust based security algorithms for vehicular ad-hoc network (VANET).","PeriodicalId":393891,"journal":{"name":"2018 International Conference on Recent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Recent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRIEECE44171.2018.9009288","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Due to the exponential growth in the automobile industry and road transport, there is need of intelligence transportation system (ITS). Vehicular ad-hoc is a part of intelligence transportation system (ITS), which provides security, traffic efficiency and ease to the user. In Vehicular network various nodes exchange the messages and data for the communication. For transmitting the data from source to destination node, we have to rely on intermediate nodes due to limited range of the vehicular nodes. To check the reliability of data delivery we have to find out that which node is trustable or which node is faulty. There are various algorithms presents by various authors to compute the trust of different-different nodes presents in the network. Trust based algorithms are easy to implement and requires very less calculation overhead.The authors have studied and analyzed various trust based security algorithms in terms of approach and tools used by different authors. The different attacks and the limitations of the various trust based security algorithms are briefly summarize in table-1. Further authors have compiled in table-2 the attacks with targeted services and possible solutions. The various simulation tools used to simulate the vehicular ad-hoc network are summarized in table-3. The paper is useful for the bingers who wish to carry out further analysis on trust based security algorithms for vehicular ad-hoc network (VANET).
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
车载AD-HOC网络中各种基于信任的安全算法分析
随着汽车工业和道路交通的迅猛发展,人们对智能交通系统(ITS)的需求日益迫切。车辆自组织是智能交通系统(ITS)的一部分,它为用户提供安全、高效和便捷的交通。在车载网络中,各个节点交换信息和数据进行通信。由于车辆节点的范围有限,将数据从源节点传输到目的节点必须依靠中间节点。为了检查数据传输的可靠性,我们必须找出哪个节点是可信的,哪个节点是故障的。不同的作者提出了不同的算法来计算网络中不同节点的信任。基于信任的算法易于实现,并且需要很少的计算开销。作者根据不同作者使用的方法和工具,研究和分析了各种基于信任的安全算法。表1简要总结了各种基于信任的安全算法的不同攻击和局限性。进一步的作者在表2中列出了针对目标服务的攻击和可能的解决方案。表3总结了用于模拟车载自组织网络的各种仿真工具。本文对希望进一步分析基于信任的车载自组织网络(VANET)安全算法的研究人员有一定的帮助。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Ranked Rule Based Approach for Sentiment Analysis Design of Evaluation Board for Image Processing ASIC and VHDL Implementation of FPGA Interface Design and Development of IoT based System for Retrieval of Agrometeorological Parameters An Advance Tree Adaptive Data Classification for the Diabetes Disease Prediction Dual-Frequency GPS Derived Precipitable Water Vapor and Comparison with ERA-Interim Reanalysis Data Over Indian stations
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1