5 research outputs found

    Design a Cloud Security Model in VANET Communication: Implementation, Performance and Security Analysis

    Get PDF
    In the first paper of this work, the design and the architecture of our proposed model framework, VANET Security as a Service (VSaaS), was discussed. In this second paper, the performance metrics measurements will be investigated through the NS2, SUMO and Trans simulations, to evaluate the security overhead of the secure Vehicle Information Messages (VIMs), which are sent by the vehicles to the cloud as a coarse-grained information. Moreover, our proposed model framework (VSaaS) will be discussed against the security requirements in the VANET

    On The Selection Of Qos Provisioned Routing Protocol Through Realistic Channel For Vanet

    Get PDF
    Abstract: Vehicular Ad-Hoc Network (VANET) is a new communication paradigm creating a network on wheels. Communication between the vehicles provides for various safety and comfort applications. VANET is characterized by features like number of nodes, varying topology, constrained and high speed movement of nodes. All these features make routing in VANETs a crucial issue. This paper compares popular proactive, reactive and hybrid protocols in infrastructure less environments as availability of an infrastructure is not ubiquitous. Intensive simulations are carried out using IEEE 802.11p standard in the presence of realistic propagation model. Behaviour of protocols is studied in different situations by measuring performance in terms of QoS metrics like throughput , Packet delivery ratio (PDR), routing load and end to end delay. Index Terms: QoS, VANET, AODV, OLSR, ZRP -------------------

    Analysis of Behavioral Characteristics of Jammers to Detect Malicious Nodes in Mobile ADHOC Networks

    Get PDF
    Wireless ADHOC Networks are used to establish a wireless connection between two computing devices without the need for a Wi-Fi access point or router. This network is decentralized and uses omnidirectional communication media, which makes it more vulnerable to certain types of attacks compared to wired networks. Jamming attacks, a subset of denial-of-service (DoS) attacks, involve malicious nodes that intentionally interfere with the network, blocking legitimate communication. To address this issue, the proposed method analyzes various characteristics of nodes, such as packets sent, received, and dropped, at each node. Using the packet delivery ratio and packet drop ratio, the method detects jamming nodes from normal nodes, improving network performance. The network is simulated in NS2 environment
    corecore