An Attack Resistant of Malicious Nodes for Securing Vehicular Adhoc Networks by an Encryption Alert

Abstract

Vehicular Ad hoc Network (VANET) is an autonomous wireless network comprising of moving vehicles. A small communication unit is installed in the devices that are capable of transmitting its GPS (Global Positioning System) position and gather important information from other vehicles and road side junctions. As vanet is an open architecture which means the underneath technology being used is essentially either wifi or Bluetooth such networks often referred as public network .one of the most challenging issues of any public network is to ensure privacy and trustworthiness of the data. In vehicular ad hoc network as the vehicle moves with rapid speed the link itself varies with significantly different vehicle will have a enter communicable link which will be keep on changing with the mobility movement of the vehicle .In such a highly dynamic network to determine which packets are malicious or which nodes are malicious is extremely difficult, Therefore the proposed work analysis a novel hybrid technique for trust management and privacy preservation in vanet Our trust management system will enable the nodes to determine the validity of a specific packet, this is known as packet trust or data trust ,validity of the sender also known as node trust ,validity of the type of message is being conveyed also known as functional trust. our entire work demonstrate how to detect and prevent malicious nodes and attacks by analyzing various trust models through the GPS data exchange between the nodes among themselves and the node in the road side unit. The work is simulated using vanetsim which is a java based real time vanet simulator. A result shows that the accuracy of the detection of the attacker and an attack model is extremely efficient in our case.

Authors and Affiliations

Anand N Patil, Dr. Rekha Patil

Keywords

Related Articles

Wavelet Enhanced Fusion for Brain Tumor Detection Based On Stationary Wavelet Transform

Image processing is an active research area in which medical image processing is a highly challenging field. Medical image fusion techniques are used to show the inner parts of the human body for medical diagnosis.Image...

Document Constellation for Rhetorical Associate Analysis

In this paper PC rhetorical analysis investigation, thousands of files ar usually surveyed. during this abundant of the information in those files consists of formless manuscript, whose investigation by PC examiners is...

Fetal ECG Extraction & Analysis Using Wavelet Transform

The fetal electrocardiogram (ECG) is an analytical tool that measures and records the electrical movement of the heart of the fetus during pregnancy and provides fine details. Analysis of these details allows analysis o...

Study on Performance of Vedic Multiplier Based On the Adders Used

In ALUs, DSPs, and microprocessors addition and multiplication are most commonly used arithmetic computation. Multipliers play a key role in determining the overall performance of the system design. But multipliers use...

Secure Internet Banking With Visual Authentication Protocols

Keylogging is an activity of capturing users’ keyboard strokes and records the activity of a computer user in a covert manner using keylogger hardware and software. The keyloggers secretly monitors and log all keystroke...

Download PDF file
  • EP ID EP24296
  • DOI -
  • Views 318
  • Downloads 8

How To Cite

Anand N Patil, Dr. Rekha Patil (2017). An Attack Resistant of Malicious Nodes for Securing Vehicular Adhoc Networks by an Encryption Alert. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(5), -. https://europub.co.uk/articles/-A-24296