Do you want to publish a course? Click here

security vulnerabilities analysis of Vehicular ad hoc networks and countermeasures

تحليل الثغرات الأمنية في الشبكات الموائمة للمركبات و الإجراءات المقترحة لمعالجتها

1439   2   109   0 ( 0 )
 Publication date 2017
and research's language is العربية
 Created by Shamra Editor




Ask ChatGPT about the research

In this search, we provide a study about the security in VANET networks which are considered to be a part of mobile wireless networks and designed to work between moving vehicles. The most important security flaws of this networks and its applications are studied. In fact, we study the most important and dangerous attacks that may target VANET networks and analyze its main risks. Furthermore, we simulate some of these attacks Specifically Denial-of Service (DOS) attack using prober tools depending on chosen parameters that characterize the network performance. moreover, we provide some Security solutions to help counter measuring these attacks and minimize this effects, and Finally we apply these solutions and evaluate them.

References used
Vinh .H. L, Cavalli.A, 2014-Security attacks and solutions in vehicular ad hoc networks. International Journal on AdHoc Networking Systems (IJANS) ,Vol. 4, No. 2
Isaac. J.T, Zeadally .S, and Cmara .J.S.,2010-Security attacks and solutions for vehicular ad hoc networks . IET Communications
Rahbari.M and Jamali.M.A, 2011-Efficient Detection of Sybil Attack Based on Cryptography in VANET, IJNSA, Vol.3, No.6
rate research

Read More

Distributed Denial of Service attack (DDOS) on Vehicular Ad Hoc Networks (VANETs) is considered to be one of the most serious types of attacks that can be targeted to those networks. The danger of this attack is in the difficulty of detection becau se of the cooperation of several attacking nodes in the network, and its impact on the availability requirement that is one of the most important security requirements in a network offering real-time applications .In our research, we study the effect of this attack on VANET network in the city, taking into consideration two cases. In the first case the target of the attack is the nodes, while in the second one, the target is the road side units (RSU). Simulation results have shown that this attack has a significant impact on both cases, by comparing the basic parameters of the network, such as throughput in/out and the number of dropped packets, before and after the attack.
تحليل الشبكات في أنظمة المعلومات الجغرافية ... تمثل الشبكة مجموعة من الخطوط والنقاط التي تمثل الكائنات الجغرافية المتصلة مع بعضها البعض والتي من خلالها تتحرك الموارد (سيارات , مياه , كهرباء , غاز....الخ) 1- أنظمة تدفق موجهة يتحرك التدفق من المصا در إلى المصارف الموارد لا تملك القدرة على اتخاذ قرارات المسير (على سبيل المثال، نظام النهر) 2- أنظمة تدفق غير موجهة النظام لا يتحكم بشكل كامل بعملية التدفق الموارد تملك القدرة على اتخاذ قرارات المسير الخاصة بها (على سبيل المثال، نظام السير)
A new face detection system is presented. The system combines several techniques for face detection to achieve better detection rates, a skin colormodel based on RGB color space is built and used to detect skin regions. The detected skin regions are the face candidate regions. Neural network is used and trained with training set of faces and non-faces that projected into subspace by principal component analysis technique. we have added two modifications for the classical use of neural networks in face detection. First, the neural network tests only the face candidate regions for faces, so the search space is reduced. Second, the window size used by the neural network in scanning the input image is adaptive and depends on the size of the face candidate region. This enables the face detection system to detect faces with any size.
A Vehicular Ad-hoc Network (VANET) is a group of vehicles, which have special equipments enable them to connect with each other as a wireless network .The attacks are considered as the most serious challenge against this network, especially those t argeting availability requirement, which is one of the most important security requirements in VANET. The Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are the most important attacks since they make the network not available for actual users. In this research, we present an algorithm to detect and face the DDoS attack. This algorithm depends on a black list contains the IDs for malicious vehicles, which are being chosen depending on a certain threshold value for a number of messages received from them. We analyze the algorithm performance depending on throughput, packet delivery ratio, end to end delay parameters, and compare it with the performance of the Queue Limiting Algorithm (QLA) .To achieve this purpose, we use NS2.35 simulator using details to support Wireless Access in Vehicular Environments (WAVE). The simulation results showed that the proposed algorithm reduces the effect of the attack Significantly since it increases the throughput and packet delivery ratio.
comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا