Providing security in Vehicular ad hoc networks (VANETs) through historical data collection
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 4
Abstract
Today Vehicular Ad-hoc Networks (VANETs) are needful to improve safety on the roads. But using this kind of networks has a few issues. Providing security is one of the most important issues that users of VANETs are associated with. Our purpose of security is the reliability of information. Security is lost when a user or group of users try to send invalid information into the network for their individual purposes. The approach presented in this paper works by the following assumption. One of them is, a unique identifier (called ID) is assigned to each vehicle, and all the communicated messages contain this ID. The approach works by keeping the history of reported messages. By using probabilistic roles, we show that in an unsecure/secure environment how many reports is necessary to rely on a report (message). This reliability helps the driver in making true decisions when he has no information about the message trueness. E.g., message contains the information that an incident (collision, accident and etc) has occurred in a specific place on your way. You may change your way. But you need to ensure the message is true. Our proposed approach is based on this fact that how more an incident is reported it has more probability to be true. In the cases that message validity is not guarantied driver is responsible for trust to received information. At the end, some diagrams show, in different environment, how many reports should be received to rely on a specific report.
Authors and Affiliations
Dr. Kamal Jamshidi , Masoud Karimzadeh
Data Encryption and Decryption process Using Bit Shifting and Stuffing (BSS) Methodology
Commonly in encryption or decryption process some of the characters are inter changed by using some encryption and decryption algorithms (like DES, IDEA) with key. But in Bit Shifting and Stuffing (BSS) system to represe...
Secure Image Transmission Through Unreliable Channels
The research in the literature on the design of image security by using Arithmetic Coding and Advanced Encryption Standard. Arithmetic Coding offers extremely high coding efficiency and it provides little or no security...
Clustering of Sedimentary Basins Using Associative Neural memories (ART2)
Associative Memory (AM) research covers technologies enabling implementation of associative memory which enables thought process and links previous experience to novel situations. Each neural network system requires a me...
A STUDY OF CLONE DETECTING TECHNIQUES IN STATIONARY AND MOBILE WIRELESS SENSOR NETWORK
Mobile Wireless sensor network (MWSN) is one of the recently emerging areas in which mobility of sensor nodes play a major role. Sensor nodes are allowed to move freely and are allowed to communicate with each other with...
Genetic Algorithm Based Adaptive Learning Scheme Generation For Context Aware E-Learning
Context aware e-learning system helps to provide elearning contents which are customized according to the learner’s ontext. For generating context aware contents many adaptation parameters have to be considered. Customi...