7 research outputs found

    Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular Ad hoc Networks

    Get PDF
    Vehicular Ad-Hoc Network (VANET) is an indispensable part of the Intelligent Transportation System (ITS) due to its abilities to enhance traffic management and safety. Many researchers have been focused on specific areas involving management and storage data, protocols standardization, network fragmentation, monitoring, and quality of service.  The benchmarks of security of VANET are studied and figured out in this paper. VANET provides the driver and passenger with the safety application as well as entertainment service. However, the communication between nodes in VANET is susceptible to security threats in both communication modes, which indicates the main hazard. In this paper, we identified different Man-In-The-Middle (MITM) attacks with various behaviors such as message tampering, message delaying, and message dropping, according to the literature. In this study, the essential background of VANET from architectural point of view and communication types are discussed. Then, the overview of MITM attack in VANET is presented. In addition, this paper thoroughly reviews the existing prevention schemes for MITM attack in VANET. This review paper reveals that there is still a need for a better and more efficient preventive scheme to address the MITM attack in VANET. This review paper could serve as evidence and reference in the development of any new security schemes for VANETs

    Improvement in Quality of Service Against Doppelganger Attacks for Connected Network

    Get PDF
    Because they are in a high-risk location, remote sensors are vulnerable to malicious ambushes. A doppelganger attack, in which a malicious hub impersonates a legitimate network junction and then attempts to take control of the entire network, is one of the deadliest types of ambushes. Because remote sensor networks are portable, hub doppelganger ambushes are particularly ineffective in astute wellness contexts. Keeping the framework safe from hostile hubs is critical because the information in intelligent health frameworks is so sensitive. This paper developed a new Steering Convention for Vitality Effective Systems (SC-VFS) technique for detecting doppelganger attacks in IoT-based intelligent health applications such as a green corridor for transplant pushback. This method's main advantage is that it improves vitality proficiency, a critical constraint in WSN frameworks. To emphasize the suggested scheme's execution, latency, remaining vitality, throughput, vitality effectiveness, and blunder rate are all used. To see how proper the underutilized technique is compared to the existing Half Breed Multi-Level Clustering (HMLC) computation. The suggested approach yields latency of 0.63ms and 0.6ms, respectively, when using dead hubs and keeping a strategic distance from doppelganger assault. Furthermore, during the 2500 cycles, the suggested system achieves the highest remaining vitality of 49.5J

    A security and privacy scheme based on node and message authentication and trust in fog-enabled VANET

    Get PDF
    Security and privacy are the most important concerns related to vehicular ad hoc network (VANET), as it is an open-access and self-organized network. The presence of ‘selfish’ nodes distributed in the network are taken into account as an important challenge and as a security threat in VANET. A selfish node is a legitimate vehicle node which tries to achieve the most benefit from the network by broadcasting wrong information. An efficient and proper security model can be useful to tackle advances from attackers, as well as selfish nodes. In this study, a privacy-preserving node and message authentication scheme, along with a trust model was developed. The proposed node authentication ensures the legitimacy of the vehicle nodes, whereas the message authentication was developed to ensure the message's integrity. To deal with selfish nodes, an experience-based trust model was also designed. Additionally, to fulfill the privacy-preserving aspect, the mapping of each vehicle was performed using a different pseudo-identity. In this paper, fog nodes instead of road-side units (RSUs), were distributed along the roadside. This was mainly because of the fact that fog computing reduces latency, and results in increased throughput. Security analysis indicated that our scheme met the VANETs' security requirements. In addition, the performance analysis showed that the proposed scheme had a lower communication and computation overhead, compared to the other related works. Monte-Carlo simulation results were applied to estimate the false-positive rates (FPR), which also proved the validity of the proposed security scheme
    corecore