8 research outputs found

    An enhanced AES-GCM based security protocol for securing the IoT communication

    Get PDF
    In the recent years, the devices in Internet of Things (IoT) are growing exponentially due to the emergence of many sophisticated applications. This tremendous growth leads to serious security challenges and the devices of Wireless Sensor Networks should be protected from various attacks. IoT can be configured dynamically without fixed infrastructure and the devices are communicated with one another in an Ad-hoc manner. The work presents the classification of various DDoS attacks in the IoT environment and provides a solution for replay attack. All variations of DDoS attacks are modeled using UML based activity modeling. This clearly understands the behavior of each version of attacks and their performance in the environment. The modeling also helps to construct a solution to prevent this attack from its execution. The work also proposed a trust based protocol for replay attacks which allows the attack inside the network and blocks it after identifying the attack based on its specific behavior. The network performance is improved after implementing this proposed protocol inside the network with help of simulation under realistic conditions. The performance metrics considered in the work are energy, packet loss, computational time and throughput. The paper compares the performance with the state-of-the-art schemes such as Efficient Distributed Deterministic Key and Hashbased Message Authentication Code. The experimental analysis proved that the proposed scheme outperforms the other state-of-the-works in terms of computational cost, throughput, and delay

    Detection of Sybil attack in vehicular ad hoc networks by analyzing network performance

    Get PDF
    Vehicular ad hoc network (VANET) is an emerging technology which can be very helpful for providing safety and security as well as for intelligent transportation services. But due to wireless communication of vehicles and high mobility it has certain security issues which cost the safety and security of people on the road. One of the major security concerns is the Sybil attack in which the attacker creates dummy identities to gain high influence in the network that causes delay in some services and fake voting in the network to misguide others. The early detection of this attack can prevent people from being misguided by the attacker and save them from getting into any kind of trap. In this research paper, Sybil attack is detected by first applying the Poisson distribution algorithm to predict the traffic on the road and in the second approach, analysis of the network performance for packet delivery ratio (PDR) is performed in malign and benign environment. The simulation result shows that PDR decreases in presence of fake vehicles in the network. Our approach is simple and effective as it does not require high computational overhead and also does not violate the privacy issues of people in the network

    RMCCS: RSSI-based Message Consistency Checking Scheme for V2V Communications

    Get PDF
    V2V messaging systems enable vehicles to exchange safety related information with each other and support road safety and traffic efficiency applications. The effectiveness of these applications depends on the correctness of the information reported in the V2V messages. Consequently, the possibility that malicious agents may send false information is a major concern. The physical features of a transmission are relatively difficult to fake, and one of the most effective ways to detect lying is to check for consistency of these features with vehicle position information in the message. In this paper, we propose a message consistency checking scheme whereby a vehicle acting independently can utilise the strength and variability of received signals to estimate the distance from a transmitting vehicle without prior knowledge of the environment (building density, traffic conditions, etc.). The distance estimate can then be used to check the correctness of the reported position. We show through simulation that our RMCSS method can detect false information with an accuracy of about 90% for separation distances less than 100m. We believe this is sufficient for the method to be a valuable adjunct to use of digital signatures to establish trust

    An Insight into Sybil Attacks – A Bibliometric Assessment

    Get PDF
    Sybil attack poses a significant security concern in both centralized and distributed network environments, wherein malicious adversary sabotage the network by impersonating itself as several nodes, called Sybil nodes. A Sybil attacker creates different identities for a single physical device to deceive other benign nodes, as well as uses these fake identities to hide from the detection process, thereby introducing a lack of accountability in the network. In this paper, we have thoroughly discussed the Sybil attack including its types, attack mechanisms, mitigation techniques that are in use today for the detection and prevention of such attacks. Subsequently, we have discussed the impact of the Sybil attack in various application domains and performed a bibliometric assessment in the top four scholarly databases. This will help the research community to quantitatively analyze the recent trends to determine the future research direction for the detection and prevention of such attacks

    TDMP-Reliable Target Driven and Mobility Prediction based Routing Protocol in Complex VANET

    Full text link
    Vehicle-to-everything (V2X) communication in the vehicular ad hoc network (VANET), an infrastructure-free mechanism, has emerged as a crucial component in the advanced Intelligent Transport System (ITS) for special information transmission and inter-vehicular communications. One of the main research challenges in VANET is the design and implementation of network routing protocols which manage to trigger V2X communication with the reliable end-to-end connectivity and efficient packet transmission. The organically changing nature of road transport vehicles poses a significant threat to VANET with respect to the accuracy and reliability of packet delivery. Therefore, a position-based routing protocol tends to be the predominant method in VANET as they overcome rapid changes in vehicle movements effectively. However, existing routing protocols have some limitations such as (i) inaccurate in high dynamic network topology, (ii) defective link-state estimation (iii) poor movement prediction in heterogeneous road layouts. In this paper, a target-driven and mobility prediction (TDMP) based routing protocol is therefore developed for high-speed mobility and dynamic topology of vehicles, fluctuant traffic flow and diverse road layouts in VANET. The primary idea in TDMP is that the destination target of a driver is included in the mobility prediction to assist the implementation of the routing protocol. Compared to existing geographic routing protocols which mainly greedily forward the packet to the next-hop based on its current position and partial road layout, TDMP is developed to enhance the packet transmission with the consideration of the estimation of inter-vehicles link status, and the prediction of vehicle positions dynamically in fluctuant mobility and global road layout.Comment: 35 pages,16 Figure
    corecore