A Novel Reputation Management Framework for Vehicular Ad Hoc Networks *

Size: px
Start display at page:

Download "A Novel Reputation Management Framework for Vehicular Ad Hoc Networks *"

Transcription

1 A Novel Reputation Management Framework for Vehicular Ad Hoc Networks * Qing Ding, Xi Li School of Software Engineering, University of Science and Technology of China Hefei, China dingqing@ustc.edu.cn; llxx@ustc.edu.cn Abstract- Vehicular Ad hoc Network is a special type of MANET characterized by mobile nodes with high speed, and confined mobility. VANETs are received more and more researchers attention with their promising functions in road safety by exchanging real-time warning messages through vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) communication. However, in VANETs, an inaccurate traffic warning message will impact drivers decisions, misguide drivers behavior, and even invoke serious car accidents. Keeping effective cooperation between nodes is prerequisite. In this paper, a novel reputation management framework is presented, which mainly works with the integration of entity-centric mechanism and event-centric mechanism to establish trust in VANETs. Based on the fact that in most of the time, the majority of people drive their vehicles locally for their daily commute, and hence, most vehicles have their predefined constant daily trajectories. We take advantage of RSUs to manage the long-term reputation values for these commute vehicles, and event-centric mechanism is adopted if the reputation value of a vehicle cannot be queried based on the fact that this vehicle just has a new route when the traffic event happens. This feature makes the proposed system very suitable for the actual situation of vehicular network. The simulation results show that our proposed system can effectively build trust and prevent false messages spreading on VANET environments. Keywords- VANET; Trust; Reputation I. INTRODUCTION Vehicular Ad Hoc Networks (VANETs) [1, 2] are a subclass of MANETs, which would perform crucial functions in road safety, such as detection of traffic accidents and reduction of traffic congestions. By exchanging real-time warning messages through vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) communication, VANETs present the capability of providing local information in near-realtime to enhance the safety of drivers and improve mobility and thus are received more and more researchers attention. However, VANETs applications also raise formidable research challenges. One of these challenges is security. More specifically, in VANETs, attackers can diffuse bogus information in the network to affect other drivers behaviors and cause intelligent collisions [3]. (e.g., to report a non-exist jamming ahead to gain a better driving condition). To determine whether the traffic event reported by a warning message is really occurred and prevent false traffic warning messages spreading on VANET, various secure communication protocols and trust systems have been proposed to ensure message authentication and evaluate the trustworthiness of the message content. In fact, trust establishment is a major challenge in VANETs, since VANETs have several distinctive properties compared to standard ad hoc networks, such as Dynamic topology, Short-lived contacts, Confined-mobility, Substantial computation power, etc. With these distinctive properties, a new solution need be haven for the VANETs. In this paper, we present a mixed reputation management framework. In our eyes, we cannot find any similar solution to this problem in current papers. The rest of this paper is structured as follows. The related work is introduced in Section 2. Section 3 introduces the VANET environment we are considering and some notations we use in the paper. In Section 4, we present the proposed reputation management framework. In Section 5, we show the initial simulation results, and finally conclude the paper in Section 6 and also discuss some future work on this research topic. II. RELATED WORK There are various types of trust models in ad hoc networks which differ in their architecture, trust establishment processes and flexibility. In [4], trust establishment is divided into two major categories: it can either statically rely on a security infrastructure or be built up dynamically in a self-organizing manner. The former process mainly relies on classical global certificate-based systems which can be used for message authentication and integrality check. The latter process lacks of this global knowledge and needs to take advantage of other trust supporting mechanisms, such as reputation system. Self organizing trust establishment can be based on direct information, indirect information, or hybrid. Existing trust establishment approaches for ad-hoc networks mainly work with the entity-centric mechanism or event-centric mechanism [5-14]. One of the most well-known entity-centric reputation mechanisms for ad hoc networks is the CONFIDANT protocol [5]. In order to detect uncooperative behaviors, WatchDog mechanism is designed to overhear the forwarding behaviors of the downstream neighboring nodes within the transmission range. In [6], bayesian statistics is proposed to improve the CONFIDANT protocol. In CORE [7], it is not * The Project Supported by Anhui Provincial Natural Science Foundation under Grant M

2 possible to spread negative reputation between the nodes, thus, the protocol avoids false reputation propagation classical problem. Haiying et al. presents an Account-based hierarchical Reputation Management system (ARM) in [8]. In [9], Ciszkowski et al. describes an enhanced distributed reputation system for anonymous authentication protocol in mobile ad hoc networks. There are also some reputation systems in VANETs. Vehicle Ad-Hoc Reputation System (VARS) [10] presents a message protocol that opinions are appended for packet forwarding, then everyone can makes use of these opinions to calculate reputation. Anand et al. [11] propose a context-aware reputation management system that provides a bootstrapping process to build trust relationships and stimulates proactive collaboration, to achieve a decentralized data management scheme that provides a high degree of reliability. Since the trust relationship between vehicles is established among entities through rounds of iterations using entity-centric mechanism, the process is relatively slow and complicated. Such relatively static reputation maintenance scheme is not suitable for the highly dynamic VANETs where with high probability a node interact with another node only once (in short duration) in his life time, thus the historical reputation cumulation of a vehicle is very time-consuming. Current reputation systems in VANETs are usually built by event-centric mechanism [12-13]. Maya et al. [12] proposed a data-centric trust establishment framework. The novel concept in [17] is to evaluate the trustiness of sensed data or received messages rather than the trust of individual vehicle. However, the authors did not consider the effect introduced by the dynamics of traffic events. Nai-Wei Lo et al. [13] also proposed an event-based reputation system architecture in VANETs. We can see most event-centric mechanisms have an implicit assumption that there are sufficient numbers of vehicles or else events. This assumption, however, is not always realistic. In addition, in an event-based reputation system, it is impossible to accumulate reputation of nodes. In this paper, a mixed reputation management framework is presented, in which both V2V and V2I communication mechanisms are adopted. This framework exploits the fact that in most of the time, the majority of people drive their vehicles locally for their daily commute (to schools, work places, etc), and hence, most vehicles have their predefined constant daily trajectories. Thus it is feasible to let the RSUs take charge of managing the long-term reputation values for these commute vehicles, and event-centric mechanism is adopted if the reputation value of a vehicle cannot be queried based on the fact that this vehicle just has a new route when the traffic event happens. This feature makes the proposed system very suitable for the the actual situation of vehicular network. III. A. Netwok Model MODEL AND ASSUMPTIONS In VANETs, the nodes are either vehicles or base stations. Vehicles and base stations can be private or public. Since the majority of the network nodes will consist of vehicles, the network dynamics will be characterized by confined mobility, high speeds, and very short connection times between vehicles. The scale of VANETs can be very large, but communication in this network will be mainly local. Traffic information is collected and distributed by each vehicle. Vehicles can travel freely, but in most of time they have a relatively fixed route, such as buses. B. Detection System We assume that Vehicles in VANETs are equipped with a detection mechanism to identify false information. This can be done in two ways. One is using tamper-proof device (TPD). We assume that each vehicle equips with a tamper-proof positioning device, such as GPS. Then its status data, such as speed, and direction, etc. are all carried out by this device. These data can be embedded to messages, and sent to another vehicle automatically by the beacon message. Another approach is using proactive detection. We assume that each vehicle can be equipped with the front and rear radar, which can detect neighboring cars within line of sight in a radius of 200 meters. The details of data collection techniques of radars are beyond the scope of this paper. We only assume that the status data of a detected vehicle also can be collected by these radars. C. Problem Formalization The problem in this paper in VANET can be formalized as a typical optimization problem represented by a quadruple (E, S, F, Ω): E is an event happened in time t 0 which will be propagated to all vehicles in a specific area. S is the strategy space containing all available behaviors for use by vehicles. F is an evaluation function that can be used to evaluate the correctness of vehicles future behavior when event E is received. Ω is a set of input information which can be used by vehicles to direct their behavior. Clearly, to produce best solution, correct data should be given high probability to be chosen and used when Ω is somewhat large. Now the question is transferred to how filter the error data. We let the traditional notion trust represent this probability: High trust of data inωindicates high probability to be chosen. Therefore, an appropriate trust system for VANETs is a good solution. IV. MIXED REPUTATION MANAGEMENT FRAMEWORK A. Role Definition First, depending on the different role vehicles played encounter the same traffic event, we categorize all players involved in an event message propagation as shown in Fig

3 Event Reporter (ER): we call a vehicle an event reporter, if it can perceive incident by equipped sensors, then send alarm messages to other neighboring vehicles. Event Observer (EO): within one hop of an event reporter, vehicles can observe the behavior of event reporter when they receive the event message from it. We call these vehicles event observers. Event Participant (EP): we call other vehicles beyond one hop of an event reporter as event participants, since they can receive and forward the event message, but it is impossible to identify the behavior of event reporter. We assume basic security and privacy protection approach are adopted in VANETs. That means beacon message which includes a vehicle s status, such as location, velocity, and direction and is broadcasted by this vehicle is encrypted and signed. Fig. 1 Mixed Reputation management framework B. Reputation Management Mechanism As a rule, when a vehicle encounters a traffic event, traffic-related data will be collected by sensors in this vehicle. If the value of gathered event data is over the predefined safety threshold, the information is sent to the traffic safety application in the vehicle. At the same time, the traffic warning messages will be broadcasted to neighboring vehicles (ie, the EO). Its own location information and the reputation value of the event are attached to this message. The message is also encrypted and signed by ER s privacy key. EOs receive the message, and it can decide if this message is from a ER by comparing the event location, vehicle location from warning message and the vehicle location from beacon message it received at the most recent time. Then it will send a reputation query message to the nearby RSU (messages can be forwarded by other vehicles), and a timer is started at the same time. Within Δt, all event messages with their reputation values sent or forwarded by other EOs and EPs are collected. The value of Δt seriously depends on the VANETs application type. For example, we can see the differences between Life-Critical Safety Applications and Safety Warning Applications. While the Life-Critical Safety Applications usually require the messages to be delivered to the nearby nodes within 100 milliseconds, the Safety Warning Applications can tolerate up to 1000 milliseconds. If the RSU returns the reputation value of ER during this time, this value will be directly used to determine if the message is bogus. If not, event-centric mechanism is adopted to calculate the reputation value of the event, and decide whether to forward the event again. Then according to the observation to ER s subsequent behavior, the reputation of ER is re-calculated and updated into RSU later. EPs and EOs have the basically same way to process messages, but they do not start the abnormal behavior analysis algorithm since they cannot observe ER s behavior. The whole alarm event message processing algorithm is shown below. Node i receive an alarm message AM ij if (AM ij is a new alarm message) { set Δt ; send a query message R j to RSU; } else { if (t current < Δt) store AM ij } Wait (Δt increase 0); If (R j exists) Adopt entity-centric mechanism; Else Adopt event-centric mechanism; Update R j ; C. Virtual Ring Storage The proposed reputation system framework relies on the support from roadside infrastructure. Based on performance considerations, it is desired that any car can obtain the required trust data of node directly from the nearest RSU when a traffic event is happened. To solve this problem, we presented a virtual ring technology to achieve the distributed storage of entities trust in all RSUs, the details are as follows: First, one RSU is assigned to a vehicle as its reputation management agent when it joins the VANET. The whole RSUs network is considered as a private cloud. Vehicles communicate with RSUs in its trajectory, and send information containing their own ID as well as the ID of all RSUs it has been passing through. We introduce basic concepts of ant colony algorithms which are suitable for tuple storage and retrieval. A small random factor is also included in those routing decisions, modeling the ant s inclination to follow pheromone paths. Then, after a period of time, as shown in Figure 2, all RSUs in one vehicle s trajectory will form a group for it, which is called as a virtual ring in this paper. Each vehicle moves RSU-by-RSU towards its destination every day. During the movement, this vehicle records each RSU s identifier of the followed path. Like a typical ant colony based routing protocol, after a period, a most desired path can be found for this vehicle. All RSUs in this path will be clustered as a virtual ring. RSUs in this ring

4 are organized through a DHT-based network with O(1) lookup algorithm. The reputation of this vehicle is stored distributedly in all RSUs belong to this ring. Then, when a vehicle sends a traffic event message, any other vehicle V i receives this message can acquire the current reputation value of this vehicle (single-key queries to neighboring nodes within the network) from the nearest RSU. If any RSU is beyond one hop from vehicle V i, the query request will be relayed to the nearest RSU by V2V communication. Once a reputation value of a vehicle is queried from a RSU, this value and vehicle ID is cached in it, since it has a big possibility that other EOs and EPs will query this value later. Then the whole access cost to a RSU is decreased greatly. Finally vehicles should update the reputation value of it based on their judgments about its behavior. Obviously, this data should be transferred to all RSUs in the ring reliablely with the same order. To ensure total ordered group message transfer, a token algorithm is adopted. There is only one special message with a unique sequence number passing between the RSUs in a ring, known as a token. A RSU has that token is allowed to send update message attached the sequence number. When finished, the token with the sequence number plus one is passed on to a next RSU. If a RSU having the token is not interested in sending the message, it simply passes it on. D. Reputation Update Fig. 2 Virtual ring storage There is only EO can update an ER s reputation after it observes the behavior of it. Define X(v, p), v as the speed of a vehicle, and p as the position of it. Then an EO can identify ER s behavior based on the function f(x) = Max(V p, L p ). Here V p denotes the probability of ER s misbehavior referred by the change of ER s speed, and L p denotes the probability of ER s misbehavior referred by the change of ER s position. Assume V t-1 is the speed of ER in time t-1, V tp is the actual speed of it in time t, and V texp is the expect speed of it in time t. Define, here V e is the desired speed about various traffic events, and 0 < β < 1 is the weight. We have: Assume H t-1 is the horizontal coordinates of the ER in time t-1, H tp is the actual horizontal coordinates of the ER in time t, and H texp is the expect horizontal coordinates of the ER in time t. Define, here H e is the the change rate of position, and 0 < α < 1is the weight. We have: V. SIMULATION RESULTS VANETs simulator TraNS [14] is used to evaluate system performance of the proposed event-based reputation system. The simulation scenario is set in a grid-typed street map. The map is constructed by street blocks and each is a 200 meters square. There is a RSU in each cross. We adopt SUMO as traffic event simulation model. The number of vehicles for each simulation varies from 50 to 200, and randomly placed on roads in the scenario map. Transmission range of vehicles is 100m. Both source nodes and relay nodes can be bad vehicles will try to send a misleading message. A bad source will send a bogus message every second and the number of total messages sent is 10. To reflect the dynamic status of a traffic event, the simulating event will freely occur at the 100th second to 500th second. Δt is defined as 500 milliseconds. Each measured result is an average number obtained from 100 replications of simulation runs. Our aim is to measure the efficiency of reputation update. We evaluate the time when data is written into RSUs if there are 10, 20, 40, 60, 80, and 100 RSUs in the route. A. Read Time Impact Figure 3 shows the cost for acquiring the reputation value of a specific vehicle when a traffic event happens. The merit of the mixed reputation management framework is highlighted by the fact that with the increasing number of RSUs in the commute route, reputation querying time of a specific vehicle does not change significantly. It is a much desired character for reputation system considering the actual situation of vehicular network. Fig. 3 Read time for different number of RSUs

5 B. Write Time Impact Fig. 4 shows the time required to store the update data of reputation from the client s standpoint. With the scale-up of the number of RSUs, significant increase of the time can be observed. But we can see the time increases basically linearly. It is rational since total ordered group message need to be ensured write time the number of RSUs VI. Fig. 4 Write time for different number of RSUs CONCLUSIONS AND FUTURE WORKS In this paper, a novel reputation management framework is presented to determine whether an incoming traffic message is significant and trustworthy to the driver. This framework takes advantage of the fact that in most of the time, the majority of people drive their vehicles locally for their daily commute (to schools, work places, etc), and hence, most vehicles have their predefined constant daily trajectories. So it is convenient and feasible to let the RSU take charge of managing the long-term reputation scores for these commute vehicles, and an event-centric reputation mechanism is also adopted as useful supplement. For the future work, first we are planning to introduce fuzzy theory into calculating reputation value of a vehicle. People naturally use linguistic expressions when they are asked to state their trust to others, such as high, medium, and low, etc. Hence, it seems that linguistic terms are superior to crisp numbers in describing trust. Moreover, a new event-centric mechanism which is more suitable for this mixed framework should be presented. VII. ACKNOWLEDGEMENTS The authors thank the editors and the anonymous referees for their valuable comments and suggestions. This work is supported by Anhui Provincial Natural Science Foundation under Grant M139. REFERENCE [1] J. Luo, J.P. Hubaux, A survey of inter-vehicle communication, Tech. Rep. IC/2004/24, EPFL, Lausanne, Switzerland, [2] J J. Blum, A. Eskandarian, and L.J. Huffman, Challenges of intervehicle ad hoc networks, IEEE Transactions on Intelligent Transportation Systems, vol. 5, no. 4, pp , [3] F. D otzer, M. Strassberger, and T. Kosch, Classification for traffic related inter-vehicle messaging, in Proceedings of the 5th IEEE International Conference on ITS Telecommunication (ITST 07), Brest, France, June [4] Philipp Wex, Jochen Breuer, Albert Held, Tim Leinmüller and Luca Delgrossi, Trust Issues for Vehicular Ad Hoc Networks, 67th IEEE Vehicular Technology Conference (VTC2008-Spring), Marina Bay, Singapore, May 11 14, [5] S. Buchegger, J.-Y.L. Boudec, Performance analysis of the CONFIDANT protocol (Cooperation of Nodes: Fairness In Dynamic Ad-hoc networks, in Proc of MobiHoc. ACM, 2002, pp [6] S. Buchegger, J.-Y.L. Boudec, The effect of rumor spreading in reputation systems for mobile ad-hoc networks, in Proc. of Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 03), [7] P. Michiardi, R. Molva, Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, in Proc. of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security. Deventer, The Netherlands, The Netherlands: Kluwer, B.V., 2002, pp [8] Haiying Shen, Ze Li, ARM: An Account-Based Hierarchical Reputation Management System for Wireless Ad Hoc Networks, Distributed Computing Systems Workshops, ICDCS '08. 28th International Conference on, June 2008, On page(s): [9] Ciszkowski T, Kotulski Z, Distributed Reputation Management in Collaborative Environment of Anonymous MANETs, EUROCON, The International Conference on Computer as a Tool, 9-12 Sept. 2007, On page(s): [10] F. Dotzer, L. Fischer, and P. Magiera, VARS:AVehilceAd-hoc networkreputation System, sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM 05), pp , [11] Patwardhan, Anand Joshi, Anupam Finin, Tim Yesha, Yelena, A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks, Mobile and Ubiquitous Systems - Workshops, rd Annual International Conference July 2006, On page(s): 1-8. [12] M. Raya, P. Papadimitratos, V.D. Gligor, and J.-P. Hubaux, On data-centric trust establishment in ephemeral ad hoc networks, in Proceedings of the 27th IEEE Conference on Computer Communications (INFOCOM 08), pp , April [13] Nai-Wei Lo, Hsiao-Chien Tsai, A Reputation Systemfor Traffic Safety Event on Vehicular Ad Hoc Networks, EURASIP Journal onwireless Communications and Networking Volume 2009, Article ID , 10 pages. [14] Michal Piorkowski, Maxim Raya,C., TraNS: Realistic Joint Traffic and Network Simulator for VANETs, ACM SIGMOBILE Mobile Computing and Communications Review, Volume 12, Issue 1 (January 2008)

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- ABSTRACT INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- Bahidja Boukenadil¹ ¹Department Of Telecommunication, Tlemcen University, Tlemcen,Algeria Now in the world, the exchange of information between

More information

Intelligent Transportation System for Vehicular Ad-Hoc Networks

Intelligent Transportation System for Vehicular Ad-Hoc Networks Intelligent Transportation System for Vehicular Ad-Hoc Networks T. Sujitha 1, S. Punitha Devi 2 1,2 Department of CSE, P.A College of Engineering and Technology, Coimbatore, Tamilnadu Abstract - Vehicular

More information

Towards Efficient Routing in Vehicular Ad Hoc Networks

Towards Efficient Routing in Vehicular Ad Hoc Networks Towards Efficient Routing in Vehicular Ad Hoc Networks Moez Jerbi*, Sidi-Mohammed Senouci* and Yacine Ghamri-Doudane** *France Telecom R&D, Core Network Laboratories, Lannion, France **Networks and Multimedia

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

Certificate Revocation Management in VANET

Certificate Revocation Management in VANET Certificate Revocation Management in VANET Ghassan Samara Department of Computer Science, Faculty of Science and Information Technology, Zarqa University Zarqa, Jordan. Gsamara@zu.edu.jo ABSTRACT Vehicular

More information

A New Security Mechanism for Vehicular Communication Networks

A New Security Mechanism for Vehicular Communication Networks A New Security Mechanism for Vehicular Communication Networks Ghassan Samara Department of Computer Science, Faculty of Science and Information Technology, Zarqa University Zarqa, Jordan. gsamarah@yahoo.com

More information

A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks

A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks Anand Patwardhan, Anupam Joshi, Tim Finin and Yelena Yesha Department of Computer Science and Electrical Engineering, UMBC, Baltimore,

More information

A Message Propagation Model for Hybrid Vehicular Communication Protocols

A Message Propagation Model for Hybrid Vehicular Communication Protocols A Message Propagation Model for Hybrid Vehicular Communication Protocols Anna Maria Vegni 1, and Thomas D.C. Little 2 1 Department of Applied Electronics University of Roma Tre, Rome, Italy 2 Department

More information

Road-Based Routing Protocol for Vanet Using Sumo and Move

Road-Based Routing Protocol for Vanet Using Sumo and Move International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Road-Based Routing Protocol for Vanet Using Sumo and Move Devipriya. D 1 and Muruganandam.A

More information

The Optimal Methods of IVC Routing Protocol for VANET

The Optimal Methods of IVC Routing Protocol for VANET The Optimal Methods of IVC Routing Protocol for VANET Bin TIAN, Kun-Mean HOU, Hongling SHI, Jianjin LI LIMOS Laboratory CNRS UMR 6158 Blaise Pascal University Clermont-Ferrand, France NICST2013: International

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental

More information

Efficient File Sharing Scheme in Mobile Adhoc Network

Efficient File Sharing Scheme in Mobile Adhoc Network Efficient File Sharing Scheme in Mobile Adhoc Network 1 Y. Santhi, 2 Mrs. M. Maria Sheeba 1 2ndMECSE, Ponjesly College of engineering, Nagercoil 2 Assistant professor, Department of CSE, Nagercoil Abstract:

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions

Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions Georgios Charalampopoulos 1,2 and Tasos Dagiuklas 1 1. Dept. of Computer Science, Hellenic Open University, Greece,

More information

Monitoring Free Flow Traffic using Vehicular Networks

Monitoring Free Flow Traffic using Vehicular Networks Monitoring Free Flow Traffic using Vehicular Networks Hadi Arbabi and Michele C. Weigle Department of Computer Science Old Dominion University Norfolk, VA 23529 USA {marbabi, mweigle}@cs.odu.edu Abstract

More information

Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET s

Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET s Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET s Ghassan Samara, Sureswaran Ramadas National Advanced IPv6 Center, Universiti Sains Malaysia Penang, Malaysia ghassan@nav6.org,

More information

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract Energy efficient load balancing in a Wireless Sensor

More information

Vehicular Cloud. Fan Zhang

Vehicular Cloud. Fan Zhang Vehicular Cloud Fan Zhang Outline VANET Cloud computing Vehicular cloud: motivation and concept Application scenarios Challenges: architecture/security Data forwarding Questions VANET Deliver timely information

More information

A Similarity based Trust and Reputation Management Framework for VANETs

A Similarity based Trust and Reputation Management Framework for VANETs A Similarity based Trust and Reputation Management Framework for VANETs Nianhua Yang, 2 Department of Computer Science & Engineering, Shanghai Jiaotong University, Shanghai 20020, China 2 School of Business

More information

Performance Analysis of Observation Based Cooperation Enforcement in Ad Hoc Networks

Performance Analysis of Observation Based Cooperation Enforcement in Ad Hoc Networks www.ijcsi.org 79 Performance Analysis of Observation Based Cooperation Enforcement in Ad Hoc Networks Abeer Ghandar 1, Eman Shabaan 2 and Zaky Fayed 3 1 Computer Systems Department, Faculty of Computer

More information

Secure Cluster Formation and Certificate Revocation Of Adversary Nodes In Mobile Adhoc Network

Secure Cluster Formation and Certificate Revocation Of Adversary Nodes In Mobile Adhoc Network Secure Cluster Formation and Certificate Revocation Of Adversary Nodes In Mobile Adhoc Network Ambarish.A 1, Gowthamani.R 2 Department of Computer Science, Nehru Institute of Technology, Coimbatore 1,

More information

Using Hitchhiker Mobile Agents for Environment Monitoring

Using Hitchhiker Mobile Agents for Environment Monitoring Using Hitchhiker Mobile Agents for Environment Monitoring Oscar Urra, Sergio Ilarri, Eduardo Mena and Thierry Delot Abstract Recently, there has been a great interest in the development of protocols and

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S ramya_88@yahoo.com, k shobsi@yahoo.co.in,thangam_85@yahoo.com Department of Computer Science,

More information

Intelligent transportation systems: Past, present and look to future by using Grid technology

Intelligent transportation systems: Past, present and look to future by using Grid technology Intelligent transportation systems: Past, present and look to future by using Grid technology Behin Alipour Islamic Azad University of Tabriz Alipour_behin@yahoo.com Abstract Existing technologies in ITS

More information

An Energy Efficient Location Service for Mobile Ad Hoc Networks

An Energy Efficient Location Service for Mobile Ad Hoc Networks An Energ Efficient Location Service for Mobile Ad Hoc Networks Zijian Wang 1, Euphan Bulut 1 and Boleslaw K. Szmanski 1, 1 Department of Computer Science, Rensselaer Poltechnic Institute, Tro, NY 12180

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol

More information

Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks

Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Petra Ardelean advisor: Panos Papadimitratos January 2009 Abstract Vehicular Ad-hoc Networks (VANETs)

More information

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

More information

Index Terms: Vehicular Ad-Hoc Network (VANET), Road Side Unit (RSU), Vehicular Cloud (VC), Security, Privacy, Mobility.

Index Terms: Vehicular Ad-Hoc Network (VANET), Road Side Unit (RSU), Vehicular Cloud (VC), Security, Privacy, Mobility. Implementing Storage as a Service in VANET using Cloud Environment. Monica Mandal,Chaitrali Landge,Pramila Gaikwad,Uma Nagaraj,Ashwini Abhale. Department of Computer Engineering, MIT Academy Of Engineering,Alandi(D).Pune

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,

More information

PREVENTION OF DENIAL OF SERVICE ATTACK ON DYNAMIC SOURCE ROUTINGVANET PROTOCOL

PREVENTION OF DENIAL OF SERVICE ATTACK ON DYNAMIC SOURCE ROUTINGVANET PROTOCOL PREVENTION OF DENIAL OF SERVICE ATTACK ON DYNAMIC SOURCE ROUTINGVANET PROTOCOL Komal Rani 1, Meenakshi 2 1 M.Tech Scholar, Central University of Punjab er.komrani@gmail.com 2 Centre for computer science

More information

8 Conclusion and Future Work

8 Conclusion and Future Work 8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the

More information

An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture

An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture 435 An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture Balamurugan.V School of Computing Science and Engineering, VIT University Chennai Campus, 600127, Tamilnadu, India. Abstract

More information

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed

More information

Efficient Certificate Management in VANET

Efficient Certificate Management in VANET Efficient Certificate Management in VANET Ghassan Samara #1, Wafaa A.H. Al-Salihy *2, R. Sures #3 # National Advanced IPv6 Center, Universiti Sains Malaysia Penang, Malaysia 1 ghassan@nav6.org, 3 sures@nav6.org

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks 1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166

More information

An Ontology-Based Approach for Optimal Resource Allocation in Vehicular Cloud Computing

An Ontology-Based Approach for Optimal Resource Allocation in Vehicular Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 2, February 2015,

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information

COMPLEMENTING PUBLIC KEY INFRASTRUCTURE TO SECURE VEHICULAR AD HOC NETWORKS

COMPLEMENTING PUBLIC KEY INFRASTRUCTURE TO SECURE VEHICULAR AD HOC NETWORKS SECURITY AND P RIVACY IN E MERGING WIRELESS N ETWORKS COMPLEMENTING PUBLIC KEY INFRASTRUCTURE TO SECURE VEHICULAR AD HOC NETWORKS ALBERT WASEF AND RONGXING LU, UNIVERSITY OF WATERLOO XIAODONG LIN, UNIVERSITY

More information

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

VEHICULAR NETWORKS DEPLOYMENT VIEW: APPLICATIONS, DEPLOYMENT ARCHITECTURES AND SECURITY MEANS

VEHICULAR NETWORKS DEPLOYMENT VIEW: APPLICATIONS, DEPLOYMENT ARCHITECTURES AND SECURITY MEANS VEHICULAR NETWORKS DEPLOYMENT VIEW: APPLICATIONS, DEPLOYMENT ARCHITECTURES AND SECURITY MEANS Hassnaa Moustafa and Gilles Bourdon France Telecom R&D (Orange Labs) 38-40 rue du General Leclerc, 92794 Issy

More information

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Comparison of WCA with AODV and WCA with ACO using clustering algorithm Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks

More information

Location Information Services in Mobile Ad Hoc Networks

Location Information Services in Mobile Ad Hoc Networks Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network

A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network Parama Bhaumik 1, Somprokash Bandyopadhyay 2 1 Dept. of Information Technology, Jadavpur

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy

More information

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET S.Suganya Sr.Lecturer, Dept. of Computer Applications, TamilNadu College of Engineering, Coimbatore, India Dr.S.Palaniammal Prof.& Head,

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

TrafficView: A Driver Assistant Device for Traffic Monitoring based on Car-to-Car Communication

TrafficView: A Driver Assistant Device for Traffic Monitoring based on Car-to-Car Communication TrafficView: A Driver Assistant Device for Traffic Monitoring based on Car-to-Car Communication Sasan Dashtinezhad, Tamer Nadeem Department of Computer Science University of Maryland College Park, MD 07

More information

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Security Threats in Mobile Ad Hoc Networks

Security Threats in Mobile Ad Hoc Networks Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey 21020013@baskent.edu.tr, asafak@baskent.edu.tr

More information

On the Potential of Network Coding for Cooperative Awareness in Vehicular Networks

On the Potential of Network Coding for Cooperative Awareness in Vehicular Networks On the Potential of Network Coding for Cooperative Awareness in Vehicular Networks Miguel Sepulcre, Javier Gozalvez, Jose Ramon Gisbert UWICORE, Ubiquitous Wireless Communications Research Laboratory,

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

Deployment of Cloud Computing into VANET to Create Ad Hoc Cloud Network Architecture

Deployment of Cloud Computing into VANET to Create Ad Hoc Cloud Network Architecture Deployment of Cloud Computing into VANET to Create Ad Hoc Cloud Network Architecture Md Ali Al Mamun, Khairul Anam, Md Fakhrul Alam Onik, A M Esfar- E- Alam Abstract- Vehicular Ad Hoc Network (VANET) has

More information

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,

More information

SEMANTIC REPRESENTATION TO ANALYZE MISBEHAVIOR APPROACH OF NODES IN MANET

SEMANTIC REPRESENTATION TO ANALYZE MISBEHAVIOR APPROACH OF NODES IN MANET SEMANTIC REPRESENTATION TO ANALYZE MISBEHAVIOR APPROACH OF NODES IN MANET AAROHI SURYA LNMIIT, Computer Science Department, Jaipur, India E-mail: aarohisurya@gmail.com Abstract- The security approach mainly

More information

Car-to-Car Communication

Car-to-Car Communication Car-to-Car Communication Stephan Eichler #, Christoph Schroth and Jörg Eberspächer # # Institute of Communication Networks, Technische Universität München, München, Germany Institute of Media and Communication

More information

Reputation Algebra for Cloud-based Anonymous Data Storage Systems

Reputation Algebra for Cloud-based Anonymous Data Storage Systems Reputation Algebra for Cloud-based Anonymous Data Storage Systems Harsh N. Thakker, Mayank Saha and Manik Lal Das Dhirubhai Ambani Institute of ICT Gandhinagar 382007, Gujarat, India {harshnthakker, saha.mayank}@gmail.com

More information

Performance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various Routing Protocols

Performance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various Routing Protocols International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Performance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

Security Challenges And Implementation Mechanism For Vehicular Ad Hoc Network

Security Challenges And Implementation Mechanism For Vehicular Ad Hoc Network Security Challenges And Implementation Mechanism For Vehicular Ad Hoc Network Mostofa Kamal Nasir, A.S.M. Delowar Hossain, Md. Sazzad Hossain, Md. Mosaddik Hasan, Md. Belayet Ali Abstract: - Vehicular

More information

A Dynamic Reputation Management System for Mobile Ad Hoc Networks

A Dynamic Reputation Management System for Mobile Ad Hoc Networks A Dynamic Reputation Management System for Mobile Ad Hoc Networks Eric Chiejina School of Computer Science University of Hertfordshire Hatfield, UK e.chiejina@herts.ac.uk Hannan Xiao School of Computer

More information

Social Network Analysis and its Applications in Wireless Sensor and Vehicular Networks

Social Network Analysis and its Applications in Wireless Sensor and Vehicular Networks Social Network Analysis and its Applications in Wireless Sensor and Vehicular Networks Alexis Papadimitriou 1, Dimitrios Katsaros 2, Yannis Manolopoulos 1 1 Department of Informatics Aristotle University

More information

A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications

A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications Ahmed Abada Dept. of Systems and Computer Engineering Carleton University Ottawa, ON, Canada Li Cui Institute of Computing

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern

More information

Proposition of a new approach to adapt SIP protocol to Ad hoc Networks

Proposition of a new approach to adapt SIP protocol to Ad hoc Networks , pp.133-148 http://dx.doi.org/10.14257/ijseia.2014.8.7,11 Proposition of a new approach to adapt SIP protocol to Ad hoc Networks I. Mourtaji, M. Bouhorma, M. Benahmed and A. Bouhdir Computer and Communication

More information

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India

More information

Certificate Based Scheme and Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks

Certificate Based Scheme and Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks Certificate Based Scheme and Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks Ms. Rupali H. Kandhari PG Student, Department of Computer Engineering, JSPM s RSCOE, Tathawade, Pune.

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

Performance Evaluation of the IEEE 802.11p WAVE Communication Standard

Performance Evaluation of the IEEE 802.11p WAVE Communication Standard Performance Evaluation of the IEEE 8.p WAVE Communication Standard Stephan Eichler (s.eichler@tum.de), Institute of Communication Networks, Technische Universität München Abstract In order to provide Dedicated

More information

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Sagar M Mane Walchand Institute of Technology Solapur. India. Solapur University, Solapur. S.S.Apte Walchand Institute

More information

Research Projects in the Mobile Computing and Networking (MCN) Lab

Research Projects in the Mobile Computing and Networking (MCN) Lab Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University http://www.cse.psu.edu/~gcao Mobile Computing

More information

Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network

Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract A Wireless Sensor Network(WSN) is a energy and security constraint

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks

Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

An Implementation of Secure Wireless Network for Avoiding Black hole Attack An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,

More information

MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK

MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK 1 V. Vinoba, 2 P.Hema 1 Department of Mathematics, K.N. Government Arts college, (India)

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram. Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech

More information

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology erjica@gmail.com Abstract intrusion detection

More information

REGIONAL BLACKOUTS: PROTECTION OF BROADCAST CONTENT ON 3G NETWORKS

REGIONAL BLACKOUTS: PROTECTION OF BROADCAST CONTENT ON 3G NETWORKS REGIONAL BLACKOUTS: PROTECTION OF BROADCAST CONTENT ON 3G NETWORKS Alexander W. Dent, Allan Tomlinson Mobile VCE Research Group, Information Security Group, Royal Holloway, University of London, Egham,

More information

Security for Ad Hoc Networks. Hang Zhao

Security for Ad Hoc Networks. Hang Zhao Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile

More information

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and

More information

Energy Efficient and Improved Certificate Revocation Technique for Mobile Ad Hoc Networks

Energy Efficient and Improved Certificate Revocation Technique for Mobile Ad Hoc Networks Energy Efficient and Improved Certificate Revocation Technique for Mobile Ad Hoc Networks Navyasree Veeramallu M.Tech DECS Gudlavalleru Engineering College Gudlavalleru- 521356, Krishna District, Andhra

More information

Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity

Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity Yonghang Yan*, Linlin Ci*, Ruiping Zhang**, Zhiming Wang* *School of Computer Science, Beiing Institute of Technology,

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

A Link-state QoS Routing Protocol for Ad Hoc Networks

A Link-state QoS Routing Protocol for Ad Hoc Networks A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,

More information