利用可靠功能消除VANET中的恶意节点,提高安全性

Raksha Tiwari, Tripti Saxena
{"title":"利用可靠功能消除VANET中的恶意节点,提高安全性","authors":"Raksha Tiwari, Tripti Saxena","doi":"10.1109/ICACAT.2018.8933798","DOIUrl":null,"url":null,"abstract":"Vehicular ad hoc network is a rising direction of research in improves network and communication. It is a type of ad hoc network in which there is a decentralized type ofwireless network. It is a communication less which makes them powerless against assaults like dos. The incoming traffic flooding the victim originates from many different sources. this effectively makes it impossible to stop the attack simply by blocking a single source. an existing paper they used maliciousand irrelevant packet detection algorithm for detecting malicious node on the basis of node velocity and the frequency of packet generated depend on node maximum velocity. Basically vehicles move with speedy which cannot efficaciousrecognize malicious nodes. in our proposed work, we calculatethe average speed of vehicles and check the performance ofvehicles so that we can recognize the true malicious nodes thenapplying reliable function to detect malicious nodes. In our results, we improved packet delivery ratio, routing overheadand throughput of the network.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"20 1","pages":"1-5"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Reliable Function used to Improved Security by Eliminating Malicious Nodes in VANET\",\"authors\":\"Raksha Tiwari, Tripti Saxena\",\"doi\":\"10.1109/ICACAT.2018.8933798\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Vehicular ad hoc network is a rising direction of research in improves network and communication. It is a type of ad hoc network in which there is a decentralized type ofwireless network. It is a communication less which makes them powerless against assaults like dos. The incoming traffic flooding the victim originates from many different sources. this effectively makes it impossible to stop the attack simply by blocking a single source. an existing paper they used maliciousand irrelevant packet detection algorithm for detecting malicious node on the basis of node velocity and the frequency of packet generated depend on node maximum velocity. Basically vehicles move with speedy which cannot efficaciousrecognize malicious nodes. in our proposed work, we calculatethe average speed of vehicles and check the performance ofvehicles so that we can recognize the true malicious nodes thenapplying reliable function to detect malicious nodes. In our results, we improved packet delivery ratio, routing overheadand throughput of the network.\",\"PeriodicalId\":6575,\"journal\":{\"name\":\"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)\",\"volume\":\"20 1\",\"pages\":\"1-5\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACAT.2018.8933798\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACAT.2018.8933798","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

车载自组织网络是改进网络和通信的一个新兴研究方向。它是一种自组织网络,其中有一种分散类型的无线网络。这是一种交流的减少,使他们对像dos这样的攻击无能为力。淹没受害者的传入流量来自许多不同的来源。这有效地使得仅仅通过阻止单个源来阻止攻击是不可能的。在已有的一篇论文中,他们采用基于节点速度的恶意无关数据包检测算法来检测恶意节点,而生成数据包的频率取决于节点的最大速度。车辆移动速度较快,无法有效识别恶意节点。在我们提出的工作中,我们计算车辆的平均速度并检查车辆的性能,以便我们能够识别真正的恶意节点,然后应用可靠的功能来检测恶意节点。在我们的结果中,我们改进了数据包传送率、路由开销和网络吞吐量。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Reliable Function used to Improved Security by Eliminating Malicious Nodes in VANET
Vehicular ad hoc network is a rising direction of research in improves network and communication. It is a type of ad hoc network in which there is a decentralized type ofwireless network. It is a communication less which makes them powerless against assaults like dos. The incoming traffic flooding the victim originates from many different sources. this effectively makes it impossible to stop the attack simply by blocking a single source. an existing paper they used maliciousand irrelevant packet detection algorithm for detecting malicious node on the basis of node velocity and the frequency of packet generated depend on node maximum velocity. Basically vehicles move with speedy which cannot efficaciousrecognize malicious nodes. in our proposed work, we calculatethe average speed of vehicles and check the performance ofvehicles so that we can recognize the true malicious nodes thenapplying reliable function to detect malicious nodes. In our results, we improved packet delivery ratio, routing overheadand throughput of the network.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信