We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Assessment of Different Attacks and Security Schemes in Vehicular Ad-hoc Network

by Mahendra Kumar Jhariya, Piyush Kumar Shukla, Raju Barskhar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 22
Year of Publication: 2014
Authors: Mahendra Kumar Jhariya, Piyush Kumar Shukla, Raju Barskhar
10.5120/17316-7648

Mahendra Kumar Jhariya, Piyush Kumar Shukla, Raju Barskhar . Assessment of Different Attacks and Security Schemes in Vehicular Ad-hoc Network. International Journal of Computer Applications. 98, 22 ( July 2014), 24-30. DOI=10.5120/17316-7648

@article{ 10.5120/17316-7648,
author = { Mahendra Kumar Jhariya, Piyush Kumar Shukla, Raju Barskhar },
title = { Assessment of Different Attacks and Security Schemes in Vehicular Ad-hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 22 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 24-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume98/number22/17316-7648/ },
doi = { 10.5120/17316-7648 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:26:53.639480+05:30
%A Mahendra Kumar Jhariya
%A Piyush Kumar Shukla
%A Raju Barskhar
%T Assessment of Different Attacks and Security Schemes in Vehicular Ad-hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 22
%P 24-30
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The concept of VANETs is quite simple: by incorporating the wireless communication and data sharing capability, vehicles can be turned into a network providing similar services like the ones with which we are used to in our offices or homes. VANETs are distinguished from other kinds of ad hoc networks by their hybrid network architectures, node association characteristics, and new application scenarios. Many traffic signals are used to reduce accidents in the roads, but since it is not much effective. Hence VANET is used; it uses Road Side Unit (RSU). This RSU connects to the internet, and provides information to the Vehicular Ad Hoc Network users. Each and every vehicle is interconnected to each other hence it can send alert message to another vehicle to reduce the speed or increase the speed to avoid accidents. Security and privacy are indispensable in vehicular communications for successful acceptance and deployment of such a technology. Every vehicular safety application should be thoroughly tested before it is deployed in a real world to use for. Simulation tool has been preferred over outdoor experiment. In VANET it is requires that a traffic and network simulator should be used together to perform this test. Security scheme, previously proposed in this paper in the presence of attacker definitely improves the performance of VANET. The revise of different security schemes are provides the suggestion about to propose a new security scheme to secure VANET.

References
  1. Adil Mudasir Malla, R. K. Sahu, "Security Attacks with an Effective Solution for DOS Attacks in VANET", International Journal of Computer Applications Volume 66– No. 22, pp. 45-49, March 2013.
  2. Ajay Rawat, S. Sharma, R. Sushil, "VANET: SECURITY ATTACKS AND ITS POSSIBLE SOLUTIONS", Journal of Information and Operations Management, Issue 1, Volume 3, pp-301-304, 2012.
  3. Ayonija Pathre ,Chetan Agrawal, Anurag Jain, " IDENTIFICATION OF MALICIOUS VEHICLE IN VANET ENVIRONMENT FROM DDOS ATTACK", Journal of Global Research in Computer Science, pp. 30-34, Volume 4, No. 6, June 2013.
  4. Azzedine Boukerche , Horacio A. B. F. Oliveira, Eduardo F. Nakamura , Antonio A. F. Loureiro, "Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems q", Science Direct Elsevier Computer Communications 31 (2008) 2838–2849.
  5. DiYan,Routing and Security in Vehicular Networking, /www. cse. wustl. edu/~jain/cse570-13/ftp/vanets/index. html
  6. G. Archana ,S. Andal , "A Framework for Data Security, Identification and Authentication in VANET", International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014, IEEE, International Conference on Innovations in Engineering and Technology (ICIET'14) On 21st & 22, pp. 825-830.
  7. Karan Verma, Halabi Hasbullah , Ashok Kumar, "Prevention of DoS Attacks in VANET", Wireless Pers Commun, pp. 95–126, 11 April 2013 Springer.
  8. M. Fiore, J. Harri, F. Filali and C. Bonnet, "Vehicular Mobility Simulation for VANETs," ,pp. 301-309, 40th Annual Simulation Symposium (ANSS'07), 2007.
  9. Maurice J. Khabbaz, Hamed M. K. Alazemi, and C. M. Assi, "Delay-Aware Data Delivery in Vehicular Intermittently Connected Networks", TRANSACTIONS ON COMMUNICATIONS, pp1134-1143 VOL. 61, NO. 3, MARCH 2013, IEEE.
  10. Moustafa,H. , Zhang,Y. : Vehicular networks: Techniques, Standards, and Applications. CRC Press, (2009).
  11. Mushtak Y. Gadkari1, Nitin B. Sambre, "VANET: Routing Protocols, Security Issues and Simulation Tools", Journal of Computer Engineering (IOSRJCE) , pp. 28-38, Volume 3, Issue 3 (July-Aug. 2012).
  12. Nikhil D. Karande, Kushal K. Kulkarni, "Efficient Routing Protocols For Vehicular Ad-Hoc Network", International Journal of Engineering Research & Technology (IJERT) Vol. 2 Issue 1, January- 2013.
  13. Ram Shringar Raw, M. Kumar, N. Singh, "SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET", International Journal of Network Security & Its Applications (IJNSA), pp. 95-105, Vol. 5, No. 5, September 2013.
  14. S. Fuchs, S. Rass, B. Lamprecht, K. Kyamakya, "Context-Awareness and Collaborative Driving for Intelligent Vehicles and Smart Roads", 1st International Workshop on ITS for an Ubiquitous ROADS, pp 1-6, 2007.
  15. S. Sesay, Z Yang and Jianhua He, "A survey on Mobile Ad Hoc Network", Information Technology Journal 3 (2), pp. 168 175, 2004
  16. Shanmuga Priya. S, Erana Veerappa Dinesh. S, "A Novel Approach for Data Acquisition and Handover Scheme in VANET", International Journal of Computer Science and Information Technologies (IJCSIT), pp. 1443-1446, Vol. 5 (2) , 2014.
  17. Suk-Bok Lee, Joon-Sang Park, Member, Mario Gerla, and Songwu Lu, "Secure Incentives for Commercial Ad Dissemination in Vehicular Networks" Transactions On Vehicular Technology, Vol. 61, No. 6, pp. 2715-2728, July 2012, IEEE.
  18. Swapnil G. Deshpande, "Classification of Security attack in Vehicular Adhoc network: A survey", International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 2, Issue 2, , pp. 371-377, March – April 2013.
  19. Udit Agarwal1, Monika Saxena, "Comparative and Behavioral Study of Various Routing Protocols in VANET", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 10, pp. 769-773, October 2013.
  20. Yaseer Toor et al. , "Vehicle Ad Hoc Networks: Applications and Related Technical issues", Communications surveys & Tutorials, 3rd quarter, pp. 74-88vol 10, No 3, 2008, IEEE.
  21. Yong Hao, Jin Tang, and Yu Cheng, " Secure Cooperative Data Downloading in Vehicular Ad Hoc Networks", Journal On Selected Areas In Communications/Supplement, , pp. 523-537, Vol. 31, No. 9, September 2013, IEEE.
  22. Yuan Yao, Lei Rao, and Xue Liu, "Performance and Reliability Analysis of IEEE 802. 11p Safety Communication in a Highway Environment", Transactions On Vehicular Technology, Pp. 4198-4212, Vol. 62, No. 9, November 2013, IEEE.
  23. Yuen Liu, Jun Bi, Ju Yang, "Research on Vehicular Ad hoc Networks", 2009 Chinese Control and Decision Conference (CCDC 2009),978-1-4244-2723-9/09/2009 IEEE
Index Terms

Computer Science
Information Sciences

Keywords

VANET RSU Security Attack Ad-hoc