8 research outputs found
An enhanced AES-GCM based security protocol for securing the IoT communication
In the recent years, the devices in Internet of Things (IoT) are growing exponentially due to the emergence of many sophisticated applications. This tremendous growth leads to serious security challenges and the devices of Wireless Sensor Networks should be protected from various attacks. IoT can be configured dynamically without
fixed infrastructure and the devices are communicated with one another in an Ad-hoc manner. The work presents the
classification of various DDoS attacks in the IoT environment and provides a solution for replay attack. All variations of DDoS attacks are modeled using UML based activity modeling. This clearly understands the behavior of each version of attacks and their performance in the environment. The modeling also helps to construct a solution to prevent this attack
from its execution. The work also proposed a trust based protocol for replay attacks which allows the attack inside the
network and blocks it after identifying the attack based on its specific behavior. The network performance is improved after implementing this proposed protocol inside the network with help of simulation under realistic conditions. The
performance metrics considered in the work are energy, packet loss, computational time and throughput. The paper compares the performance with the state-of-the-art schemes such as Efficient Distributed Deterministic Key and Hashbased Message Authentication Code. The experimental analysis proved that the proposed scheme outperforms the other state-of-the-works in terms of computational cost, throughput, and delay
Detection of Sybil attack in vehicular ad hoc networks by analyzing network performance
Vehicular ad hoc network (VANET) is an emerging technology which can be very helpful for providing safety and security as well as for intelligent transportation services. But due to wireless communication of vehicles and high mobility it has certain security issues which cost the safety and security of people on the road. One of the major security concerns is the Sybil attack in which the attacker creates dummy identities to gain high influence in the network that causes delay in some services and fake voting in the network to misguide others. The early detection of this attack can prevent people from being misguided by the attacker and save them from getting into any kind of trap. In this research paper, Sybil attack is detected by first applying the Poisson distribution algorithm to predict the traffic on the road and in the second approach, analysis of the network performance for packet delivery ratio (PDR) is performed in malign and benign environment. The simulation result shows that PDR decreases in presence of fake vehicles in the network. Our approach is simple and effective as it does not require high computational overhead and also does not violate the privacy issues of people in the network
RMCCS: RSSI-based Message Consistency Checking Scheme for V2V Communications
V2V messaging systems enable vehicles to exchange safety related information with each other and support road safety and traffic efficiency applications. The effectiveness of these applications depends on the correctness of the information reported in the V2V messages. Consequently, the possibility that malicious agents may send false information is a major concern. The physical features of a transmission are relatively difficult to fake, and one of the most effective ways to detect lying is to check for consistency of these features with vehicle position information in the message. In this paper, we propose a message consistency checking scheme whereby a vehicle acting independently can utilise the strength and variability of received signals to estimate the distance from a transmitting vehicle without prior knowledge of the environment (building density, traffic conditions, etc.). The distance estimate can then be used to check the correctness of the reported position. We show through simulation that our RMCSS method can detect false information with an accuracy of about 90% for separation distances less than 100m. We believe this is sufficient for the method to be a valuable adjunct to use of digital signatures to establish trust
An Insight into Sybil Attacks – A Bibliometric Assessment
Sybil attack poses a significant security concern in both centralized and distributed network environments, wherein malicious adversary sabotage the network by impersonating itself as several nodes, called Sybil nodes. A Sybil attacker creates different identities for a single physical device to deceive other benign nodes, as well as uses these fake identities to hide from the detection process, thereby introducing a lack of accountability in the network. In this paper, we have thoroughly discussed the Sybil attack including its types, attack mechanisms, mitigation techniques that are in use today for the detection and prevention of such attacks. Subsequently, we have discussed the impact of the Sybil attack in various application domains and performed a bibliometric assessment in the top four scholarly databases. This will help the research community to quantitatively analyze the recent trends to determine the future research direction for the detection and prevention of such attacks
TDMP-Reliable Target Driven and Mobility Prediction based Routing Protocol in Complex VANET
Vehicle-to-everything (V2X) communication in the vehicular ad hoc network
(VANET), an infrastructure-free mechanism, has emerged as a crucial component
in the advanced Intelligent Transport System (ITS) for special information
transmission and inter-vehicular communications. One of the main research
challenges in VANET is the design and implementation of network routing
protocols which manage to trigger V2X communication with the reliable
end-to-end connectivity and efficient packet transmission. The organically
changing nature of road transport vehicles poses a significant threat to VANET
with respect to the accuracy and reliability of packet delivery. Therefore, a
position-based routing protocol tends to be the predominant method in VANET as
they overcome rapid changes in vehicle movements effectively. However, existing
routing protocols have some limitations such as (i) inaccurate in high dynamic
network topology, (ii) defective link-state estimation (iii) poor movement
prediction in heterogeneous road layouts. In this paper, a target-driven and
mobility prediction (TDMP) based routing protocol is therefore developed for
high-speed mobility and dynamic topology of vehicles, fluctuant traffic flow
and diverse road layouts in VANET. The primary idea in TDMP is that the
destination target of a driver is included in the mobility prediction to assist
the implementation of the routing protocol. Compared to existing geographic
routing protocols which mainly greedily forward the packet to the next-hop
based on its current position and partial road layout, TDMP is developed to
enhance the packet transmission with the consideration of the estimation of
inter-vehicles link status, and the prediction of vehicle positions dynamically
in fluctuant mobility and global road layout.Comment: 35 pages,16 Figure