3,946 research outputs found
A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks
This paper presents a thorough survey of recent work addressing energy
efficient multicast routing protocols and secure multicast routing protocols in
Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which
witness the need of energy management and security in ad hoc wireless networks.
The objective of a multicast routing protocol for MANETs is to support the
propagation of data from a sender to all the receivers of a multicast group
while trying to use the available bandwidth efficiently in the presence of
frequent topology changes. Multicasting can improve the efficiency of the
wireless link when sending multiple copies of messages by exploiting the
inherent broadcast property of wireless transmission. Secure multicast routing
plays a significant role in MANETs. However, offering energy efficient and
secure multicast routing is a difficult and challenging task. In recent years,
various multicast routing protocols have been proposed for MANETs. These
protocols have distinguishing features and use different mechanismsComment: 15 page
A Protective Mechanism to Avoid Eavesdropping Attack in MANET
Wireless ad hoc network is self-directed and infrastructure less network. Wireless ad hoc network is particularly inclined due to its basic characteristics, such as open medium, dynamic topology, distributed cooperation, and capability constraint. Routing plays an imperative part in the security of the whole system. Secure transmission of data in wireless ad hoc environment is an imperative concern. Any aggressor get remote flag by using transceiver and without being caught. The objective of this paper is to propose new secure unobservable routing protocol where attacker gets blocked while making spoofing or DOS attacks. Only oblivious message could be gathered by attacker. Proposed protocol will also protect privacy information among network and will detect and block attacking nodes through trust mechanism.
DOI: 10.17762/ijritcc2321-8169.160412
Cloud Computing in VANETs: Architecture, Taxonomy, and Challenges
Cloud Computing in VANETs (CC-V) has been investigated into two major themes of research including Vehicular Cloud Computing (VCC) and Vehicle using Cloud (VuC). VCC is the realization of autonomous cloud among vehicles to share their abundant resources. VuC is the efficient usage of conventional cloud by on-road vehicles via a reliable Internet connection. Recently, number of advancements have been made to address the issues and challenges in VCC and VuC. This paper qualitatively reviews CC-V with the emphasis on layered architecture, network component, taxonomy, and future challenges. Specifically, a four-layered architecture for CC-V is proposed including perception, co-ordination, artificial intelligence and smart application layers. Three network component of CC-V namely, vehicle, connection and computation are explored with their cooperative roles. A taxonomy for CC-V is presented considering major themes of research in the area including design of architecture, data dissemination, security, and applications. Related literature on each theme are critically investigated with comparative assessment of recent advances. Finally, some open research challenges are identified as future issues. The challenges are the outcome of the critical and qualitative assessment of literature on CC-V
Secure Location-Aided Routing Protocols With Wi-Fi Direct For Vehicular Ad Hoc Networks
Secure routing protocols are proposed for the vehicular ad hoc networks. The protocolsintegrate the security authentication process with the Location-Aided Routing (LAR) protocol to supportWi-Fi Direct communications between the vehicles. The methods are robust against various security threats.The security authentication process adopts a modified Diffie-Hellman key agreement protocol. The Diffie-Hellman protocol is used with a short authentication string (SAS)-based key agreement over Wi-Fi Directout-of-band communication channels. It protects the communication from any man-in-the-middle securitythreats. In particular, the security process is integrated into two LAR routing schemes, i.e., the request-zoneLAR scheme and the distance-based LAR scheme.We conduct extensive simulations with different networkparameters such as the vehicular node density, the number of the malicious nodes, and the speed of thenodes. Simulation results show that the proposed routing protocols provide superior performance in securedata delivery and average total packet delay. Also, the secure distance-based LAR protocol outperforms thesecure request-zone LAR protocol
Secure Authentication Mechanism for Cluster based Vehicular Adhoc Network (VANET): A Survey
Vehicular Ad Hoc Networks (VANETs) play a crucial role in Intelligent
Transportation Systems (ITS) by facilitating communication between vehicles and
infrastructure. This communication aims to enhance road safety, improve traffic
efficiency, and enhance passenger comfort. The secure and reliable exchange of
information is paramount to ensure the integrity and confidentiality of data,
while the authentication of vehicles and messages is essential to prevent
unauthorized access and malicious activities. This survey paper presents a
comprehensive analysis of existing authentication mechanisms proposed for
cluster-based VANETs. The strengths, weaknesses, and suitability of these
mechanisms for various scenarios are carefully examined. Additionally, the
integration of secure key management techniques is discussed to enhance the
overall authentication process. Cluster-based VANETs are formed by dividing the
network into smaller groups or clusters, with designated cluster heads
comprising one or more vehicles. Furthermore, this paper identifies gaps in the
existing literature through an exploration of previous surveys. Several schemes
based on different methods are critically evaluated, considering factors such
as throughput, detection rate, security, packet delivery ratio, and end-to-end
delay. To provide optimal solutions for authentication in cluster-based VANETs,
this paper highlights AI- and ML-based routing-based schemes. These approaches
leverage artificial intelligence and machine learning techniques to enhance
authentication within the cluster-based VANET network. Finally, this paper
explores the open research challenges that exist in the realm of authentication
for cluster-based Vehicular Adhoc Networks, shedding light on areas that
require further investigation and development
Active Attack Detection and Unavailability over ALERT Protocol in MANET
Mobile Ad-Hoc Network (MANET) is a temporary network, consists of several wireless moving nodes, has no infrastructure or centralized access point such as base station. Security is the big issue in MANET because of its nature of openness, dynamic topology, decentralized monitoring. Anonymity is to hide the subjects among another. Anonymity is one of the solutions to avoid the attacks on the network. Anonymous Location based Efficient Routing proTocol (ALERT) which provides anonymity protection for sources, destinations and routes. It also effectively counters intersection and timing attacks. ALERT is not bulletproof to all attacks like availability and active attacks and existing solutions for active attacks had not provided anonymity protection. In this paper ALERT-APD (ALERT- Assured Packet Delivery algorithm) is proposed for availability attack and ALERT-S (ALERT Security) is for active attack detection over ALERT protocol in MANET. As in this paper MANET is protected from active attack over ALERT protocol, system will give twenty five percent more effective security and anonymity protection than existing system
- …