车载AD-HOC网络中各种基于信任的安全算法分析

K. Tripathi, S. Sharma, A. Yadav
{"title":"车载AD-HOC网络中各种基于信任的安全算法分析","authors":"K. Tripathi, S. Sharma, A. Yadav","doi":"10.1109/ICRIEECE44171.2018.9009288","DOIUrl":null,"url":null,"abstract":"Due to the exponential growth in the automobile industry and road transport, there is need of intelligence transportation system (ITS). Vehicular ad-hoc is a part of intelligence transportation system (ITS), which provides security, traffic efficiency and ease to the user. In Vehicular network various nodes exchange the messages and data for the communication. For transmitting the data from source to destination node, we have to rely on intermediate nodes due to limited range of the vehicular nodes. To check the reliability of data delivery we have to find out that which node is trustable or which node is faulty. There are various algorithms presents by various authors to compute the trust of different-different nodes presents in the network. Trust based algorithms are easy to implement and requires very less calculation overhead.The authors have studied and analyzed various trust based security algorithms in terms of approach and tools used by different authors. The different attacks and the limitations of the various trust based security algorithms are briefly summarize in table-1. Further authors have compiled in table-2 the attacks with targeted services and possible solutions. The various simulation tools used to simulate the vehicular ad-hoc network are summarized in table-3. The paper is useful for the bingers who wish to carry out further analysis on trust based security algorithms for vehicular ad-hoc network (VANET).","PeriodicalId":393891,"journal":{"name":"2018 International Conference on Recent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Analysis of Various Trust based Security Algoithm for the Vehicular AD-HOC Network\",\"authors\":\"K. Tripathi, S. Sharma, A. Yadav\",\"doi\":\"10.1109/ICRIEECE44171.2018.9009288\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to the exponential growth in the automobile industry and road transport, there is need of intelligence transportation system (ITS). Vehicular ad-hoc is a part of intelligence transportation system (ITS), which provides security, traffic efficiency and ease to the user. In Vehicular network various nodes exchange the messages and data for the communication. For transmitting the data from source to destination node, we have to rely on intermediate nodes due to limited range of the vehicular nodes. To check the reliability of data delivery we have to find out that which node is trustable or which node is faulty. There are various algorithms presents by various authors to compute the trust of different-different nodes presents in the network. Trust based algorithms are easy to implement and requires very less calculation overhead.The authors have studied and analyzed various trust based security algorithms in terms of approach and tools used by different authors. The different attacks and the limitations of the various trust based security algorithms are briefly summarize in table-1. Further authors have compiled in table-2 the attacks with targeted services and possible solutions. The various simulation tools used to simulate the vehicular ad-hoc network are summarized in table-3. The paper is useful for the bingers who wish to carry out further analysis on trust based security algorithms for vehicular ad-hoc network (VANET).\",\"PeriodicalId\":393891,\"journal\":{\"name\":\"2018 International Conference on Recent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Recent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRIEECE44171.2018.9009288\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Recent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRIEECE44171.2018.9009288","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

随着汽车工业和道路交通的迅猛发展,人们对智能交通系统(ITS)的需求日益迫切。车辆自组织是智能交通系统(ITS)的一部分,它为用户提供安全、高效和便捷的交通。在车载网络中,各个节点交换信息和数据进行通信。由于车辆节点的范围有限,将数据从源节点传输到目的节点必须依靠中间节点。为了检查数据传输的可靠性,我们必须找出哪个节点是可信的,哪个节点是故障的。不同的作者提出了不同的算法来计算网络中不同节点的信任。基于信任的算法易于实现,并且需要很少的计算开销。作者根据不同作者使用的方法和工具,研究和分析了各种基于信任的安全算法。表1简要总结了各种基于信任的安全算法的不同攻击和局限性。进一步的作者在表2中列出了针对目标服务的攻击和可能的解决方案。表3总结了用于模拟车载自组织网络的各种仿真工具。本文对希望进一步分析基于信任的车载自组织网络(VANET)安全算法的研究人员有一定的帮助。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Analysis of Various Trust based Security Algoithm for the Vehicular AD-HOC Network
Due to the exponential growth in the automobile industry and road transport, there is need of intelligence transportation system (ITS). Vehicular ad-hoc is a part of intelligence transportation system (ITS), which provides security, traffic efficiency and ease to the user. In Vehicular network various nodes exchange the messages and data for the communication. For transmitting the data from source to destination node, we have to rely on intermediate nodes due to limited range of the vehicular nodes. To check the reliability of data delivery we have to find out that which node is trustable or which node is faulty. There are various algorithms presents by various authors to compute the trust of different-different nodes presents in the network. Trust based algorithms are easy to implement and requires very less calculation overhead.The authors have studied and analyzed various trust based security algorithms in terms of approach and tools used by different authors. The different attacks and the limitations of the various trust based security algorithms are briefly summarize in table-1. Further authors have compiled in table-2 the attacks with targeted services and possible solutions. The various simulation tools used to simulate the vehicular ad-hoc network are summarized in table-3. The paper is useful for the bingers who wish to carry out further analysis on trust based security algorithms for vehicular ad-hoc network (VANET).
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信