Do you want to publish a course? Click here

Study of DDOS Attack Impact on Vehicular Ad Hoc Network in City

دراسة تأثير هجوم حجب الخدمة الموزع على شبكة العربات المتنقلة داخل المدينة

1748   1   85   0 ( 0 )
 Publication date 2015
and research's language is العربية
 Created by Shamra Editor




Ask ChatGPT about the research

Distributed Denial of Service attack (DDOS) on Vehicular Ad Hoc Networks (VANETs) is considered to be one of the most serious types of attacks that can be targeted to those networks. The danger of this attack is in the difficulty of detection because of the cooperation of several attacking nodes in the network, and its impact on the availability requirement that is one of the most important security requirements in a network offering real-time applications .In our research, we study the effect of this attack on VANET network in the city, taking into consideration two cases. In the first case the target of the attack is the nodes, while in the second one, the target is the road side units (RSU). Simulation results have shown that this attack has a significant impact on both cases, by comparing the basic parameters of the network, such as throughput in/out and the number of dropped packets, before and after the attack.

References used
S-Y Wang and C-C Lin, "NCTUns 5.0: A Network Simulator for IEEE 802.11(p) and 1609 Wireless Vehicular Network Researches," Vehicular Technology Conference, 2008. VTC2008- Fall. IEEE 68th, pp.1-2, 21-24 Sept
S.Y Wang, C.L Chou,. C. C Lin, and C.H. Huang “The Protocol Developer Manual for the NCTUns 6.0 Network Simulator and Emulator”, National Chiao Tung University, Tajwan 2010
Karim Rizwanul, "Security issues in VANET", Master’s Thesis, BRAC University, Dhaka, Bangladesh, 16 April, 2010
rate research

Read More

A Vehicular Ad-hoc Network (VANET) is a group of vehicles, which have special equipments enable them to connect with each other as a wireless network .The attacks are considered as the most serious challenge against this network, especially those t argeting availability requirement, which is one of the most important security requirements in VANET. The Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are the most important attacks since they make the network not available for actual users. In this research, we present an algorithm to detect and face the DDoS attack. This algorithm depends on a black list contains the IDs for malicious vehicles, which are being chosen depending on a certain threshold value for a number of messages received from them. We analyze the algorithm performance depending on throughput, packet delivery ratio, end to end delay parameters, and compare it with the performance of the Queue Limiting Algorithm (QLA) .To achieve this purpose, we use NS2.35 simulator using details to support Wireless Access in Vehicular Environments (WAVE). The simulation results showed that the proposed algorithm reduces the effect of the attack Significantly since it increases the throughput and packet delivery ratio.
Mobile Ad-Hoc Networks are used for data transfer. The nodes of such networks do not require presetting. They are characterized by dynamic data transfer during their movement of the nodes. MANET could be targeted by potential security breaches. Bl ack hole attack is one of the serious attacks targeting wireless AD_HOC networks through a false point whichcan absorb data and send them to another place or neglect them. This is due to the lack of central control node which is able to manage communications. This research investigates the effects of the black hole on the performance of hybrid routing protocol Temporally Ordered Routing Algorithm (TORA) and proactive routing protocol Optimized Link State Routing (OLSR) for a variable number of mobile nodes in different speeds in a high load environment.
In this search, we provide a study about the security in VANET networks which are considered to be a part of mobile wireless networks and designed to work between moving vehicles. The most important security flaws of this networks and its applica tions are studied. In fact, we study the most important and dangerous attacks that may target VANET networks and analyze its main risks. Furthermore, we simulate some of these attacks Specifically Denial-of Service (DOS) attack using prober tools depending on chosen parameters that characterize the network performance. moreover, we provide some Security solutions to help counter measuring these attacks and minimize this effects, and Finally we apply these solutions and evaluate them.
The project aims primarily to employ the benefits of artificial intelligence, specifically the characteristics of programming a neuronal network where neuronal networks, in turn, are networks that are interested in trainin g and learning from error, and employing this error to achieve optimal results.Convolution NeuralNetworks(CNN)in particular are one of the most important neuronal networks that address classification problems and issues. Thus, this project is to design a convolution neuronal network that classifies vehicles into several types where we will design the network and train them on the database as the database includes pictures of several types of vehicles The network will classify each Image to its type, after adjusting the images, making the appropriate changes, turning them gray, and discovering the edges and lines.After the images are ready, the training process will begin, and after the training process is finished, we will produce classification results, and then we will test with a new set of images.One of the most important applications of this project is to abide by the paving places of cars, trucks, and vehicles in general, as if a picture was entered as a car for the car sample, which is a truck, for example, this will give an error where the network will discover this by examining and classifying it. As a truck, we discover that there is a violation of the paving laws
The mapping of Layer 3 (IP) to Layer 2 (MAC) addresses is a key service in IP networks, and is achieved via the Address Resolution Protocol (ARP) protocol in IPv4. Due to its stateless nature and lake of authentication, ARP is an easy goal to spoofin g attacks, which can enable Denial of Service (DoS) or Man-in-the-Middle (MIM) attacks. In this search, we discuss the problem of ARP spoofing in the context of Software Defined Networks (SDNs). We studied important parameters such as throughput, delay and the availability of the network. Results showed that ARP spoofing attacks was able to make a negative effects on network performance
comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا