Malicious Attack Trust Management Solution for Securing VANETS

Authors(2) :-Dilip kumar Adla, Dr. S. Govinda Rao

VANETs are the promising method to manage gives safe remote correspondence between the vehicles which transforms into a key piece of the watchful transport structure. VANET normally implies a remote arrangement of mixed sensors or other handling devices that are sent in vehicles. The troubles posed by VANET fuse limit capacities, essentialness restriction, shared secure transmission and structure precision. The exactness of the structure can be improved by finding the solid occupations which portrays the examination of whether or not, and up to what degree, the declared action employments are tried and true, when the amount of vehicles extended. This paper studies the development and trust organization system in perspective of development structure is proposed for VANETs that can find the reliable employments to perform secure directing. The sufficiency and viability of proposed development and trust organization structure is endorsed through expansive examinations. The proposed organization system is material to large assortment of VANET application to improve amassing power, security and exactness with overhaul reliability.

Authors and Affiliations

Dilip kumar Adla
M.Tech Scholar, CSE, Gokaraju Rangaraju Institute of Engineering and Technology, Hyderabad, Telangana, India
Dr. S. Govinda Rao
Professor, CSE, Gokaraju Rangaraju Institute of Engineering and Technology, Hyderabad, Telangana, India

Vehicular Ad hoc Network, Malicious Attacks, Security Threats.

  1. Adomavicius G and Tuzhilin A (2005), "Toward the Next Generation of Recommender Systems: A survey of the State-of-the-Art and Possible Extensions", IEEE Transactions on Knowledge and Data Engineering, Vol. 17, No. 6, pp. 734-749.
  2. Buchegger S and Le Boudec J Y (2002), "Performance Analysis of the Confidant Protocol", Journal of Future Generation Computer Systems, pp. 226-236.
  3. Chen I-R, Bao F, Chang M, and Cho J-H (2014), "Dynamic Trust Management for Delay Tolerant Networks and its Application to Secure Routing", IEEE Transactions on Parallel Distribution System, Vol. 25, No. 5, pp. 1200-1210.
  4. Engoulou R G, Bellache M, Pierre S, and Quintero A (2014), "VANET Security Surveys", Journal of Computer Communications, Vol. 44, pp. 1-13.
  5. He Q, Wu D, and Khosla P (2004), "SORI: A Secure and Objective Reputation based Incentive Scheme for Ad-hoc Networks", in proceedings of IEEE WCNC, Vol. 2, pp. 825-830.
  6. Hu Y-C, Perrig A, and Johnson D B (2002), "Ariadne: A Secure On-Demand Routing Protocol for Ad-hoc Networks", Journal of Mobile Computing and Networks, pp. 12-23.
  7. Li Z, Liu C, and Chigan C (2013), "On Secure VANET-based Ad Dissemination with Pragmatic Cost and Effect Control", IEEE Transactions on Intelligent Transportation Systems, Vol. 14, No. 1, pp. 124-135.
  8. Lu R, Lin X, Liang X, and Shen X (2012), "A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in vanets", IEEE Transactions on Intelligent Transportation Systems, Vol. 13, No. 1, pp. 127-139.
  9. hmejri M N, Ben-Othman J, and Hamdi M (2014), "Survey on VANET Security Challenges and Possible Cryptographic Solutions", Journal of Vehicular Communications, Vol. 1, No. 2, pp. 53-66.
  10. Raya M, Papadimitratos P, Gligor V D, and Jobaux J P (2008), "On Data Centric Trust Establishment in Ephemeral Ad-hoc Networks", in proceedings of IEEE INFOCOM, pp. 1238-1246.
  11. Sharef B T, Alsaqour R A, and Ismail M (2014), "Vehicular Communication Ad hoc Routing Protocols: A survey", Journal of Network Computation and Applications, Vol. 40, pp. 363-396.
  12. Taha S and Shen X (2013), "A Physical-Layer Location Privacy-Preserving Scheme for Mobile Public Hotspots in NEMO-based vanets", IEEE Transactions on Intelligent Transportation Systems, Vol. 14, No.4, pp.1665-1680.
  13. Wenjia Li, and Houbing Song, "ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks", IEEE Transaction on intelligent transportation systems ,vol.17, no. 4, pp. 960-969, 2015
  14. Vinh Hoa LA, Ana CAVALLI, "Security Attacks and Solutions in Vehicular Ad hoc Nwtworks", International Journal on adhoc Networking Systems , Vol. 4, no. 2, pp. 356-368, 2014
  15. R. G. Engoulou, M. Bellache, ST. Pierre, and A. Quintero, "VANET security surveys," Comput. Communication., vol. 44, no. 0, pp. 1-13, 2014.
  16. S. Al-Sultan, M. M. Al-Doori, A. H. Al-Bayatti, and H. Zedan, "A comprehensive survey on vehicular ad hoc network," J. Networks Computer Application, vol. 37, no. 1, pp. 380-392, 2014.
  17. Ankita Agrawal, Aditi Garg, Niharika Chaudhiri, " Security on Vehicular Ad Hoc Networks (VANET)," International Journal of Emerging Technology and Advanced Engineering , vol 3, no. 1, pp. 2250-2459, 2013
  18. Md. Humayun Kabir, "Research Issues on Vehicular Ad hoc Network", International Journal of Engineering Trends and Technology, vol. 6, no. 4, pp. 231-381, dec 2013.
  19. Zhu, Hongzhi, "Impact of traffic influxes: Revealing exponential intercontact time in urban vanet.", IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 8, pp. 1258-1266, 2011
  20. Alpcan,Tansu and Sonja Buchegger, "Security games for vehicular network.", IEEE Transactions on mobile computing, vol. 10, no. 2, pp. 280-290, 2011
  21. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A secure and privacy preserving protocol for vehicular communications," IEEE Transaction Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, 2007
  22. Dotzer F, Fischer L, Magiera P, "Vars: a vehicle ad-hoc network reputation system", IEEE international symposium on a world of wireless mobile and multimedia networks, vol. 34, no. 8, pp. 454-456, 2005.
  23. P. Wex, J. Breuer, A. Held, T. Leinmuller, L. Delgrossi, "Trust issues or Vehicular ad hoc networks (IEEE, Piscataway, 2008), pp. 2800-2804.
  24. J Sun, C Zhang, Y Zhang and Y Fang, "An identitybased security System for user privacy in vehicular ad hoc networks, "Parallel Distributed System IEEE Trans. 21(9), (2010) pp. 1227-1239

Publication Details

Published in : Volume 3 | Issue 1 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 136-141
Manuscript Number : CSEIT183136
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Dilip kumar Adla, Dr. S. Govinda Rao, "Malicious Attack Trust Management Solution for Securing VANETS", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.136-141, January-February.2018

Follow Us

Contact Us