Providing security in Vehicular ad hoc networks (VANETs) through historical data collection
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 4
Abstract
Today Vehicular Ad-hoc Networks (VANETs) are needful to improve safety on the roads. But using this kind of networks has a few issues. Providing security is one of the most important issues that users of VANETs are associated with. Our purpose of security is the reliability of information. Security is lost when a user or group of users try to send invalid information into the network for their individual purposes. The approach presented in this paper works by the following assumption. One of them is, a unique identifier (called ID) is assigned to each vehicle, and all the communicated messages contain this ID. The approach works by keeping the history of reported messages. By using probabilistic roles, we show that in an unsecure/secure environment how many reports is necessary to rely on a report (message). This reliability helps the driver in making true decisions when he has no information about the message trueness. E.g., message contains the information that an incident (collision, accident and etc) has occurred in a specific place on your way. You may change your way. But you need to ensure the message is true. Our proposed approach is based on this fact that how more an incident is reported it has more probability to be true. In the cases that message validity is not guarantied driver is responsible for trust to received information. At the end, some diagrams show, in different environment, how many reports should be received to rely on a specific report.
Authors and Affiliations
Dr. Kamal Jamshidi , Masoud Karimzadeh
FRIX-Traffic Analyzer And Transportation Assistant
This website specializes in giving traffic reports for a specific area. Much of our collected data comes from automatic sensors placed at various points around the motorway to nitor vehicle speeds. We have provided an...
Facets of Software Component Repository
The software repository is used for storing, managing, and retrieving large numbers of software components. Repositories should be designed to meet the growing and changing needs of the software development organizations...
An Implementation of I2C using VHDL for DATA surveillance
Once the I2C protocol designed for data surveillance system, It is easy to communicate devices with each other without data loss, as well as a excellent speed is being developed with I2C as compare to any other communica...
Software efforts estimation using Use Case Point approach by increasing Technical Complexity and Experience Factors
An IT industry wants a simple and accurate method of efforts estimation. Estimation of efforts before starting of work is a prediction and prediction always not accurate. Intermediate COCOMO considered 17 factor that aff...
Multi-document Summarization for Query Answering E-learning System
The proposed E-learning system aims at providing a multi-document summarization for documents retrieved from Google and providing the user a precise answer for his/her query under the domain of “Operating Systems”. This...