The Data Dissemination Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks
K. Premkumar1 , R. Baskaran2
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-7 , Page no. 7-13, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.713
Online published on Jul 31, 2019
Copyright © K. Premkumar, R. Baskaran . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: K. Premkumar, R. Baskaran, “The Data Dissemination Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.7-13, 2019.
MLA Style Citation: K. Premkumar, R. Baskaran "The Data Dissemination Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks." International Journal of Computer Sciences and Engineering 7.7 (2019): 7-13.
APA Style Citation: K. Premkumar, R. Baskaran, (2019). The Data Dissemination Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks. International Journal of Computer Sciences and Engineering, 7(7), 7-13.
BibTex Style Citation:
@article{Premkumar_2019,
author = {K. Premkumar, R. Baskaran},
title = {The Data Dissemination Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2019},
volume = {7},
Issue = {7},
month = {7},
year = {2019},
issn = {2347-2693},
pages = {7-13},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4712},
doi = {https://doi.org/10.26438/ijcse/v7i7.713}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i7.713}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4712
TI - The Data Dissemination Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks
T2 - International Journal of Computer Sciences and Engineering
AU - K. Premkumar, R. Baskaran
PY - 2019
DA - 2019/07/31
PB - IJCSE, Indore, INDIA
SP - 7-13
IS - 7
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
583 | 516 downloads | 239 downloads |
Abstract
To increased safety and efficiency of road transportation system have promoted automobile manufacturers to integrate wireless communications and networking into vehicles. VANETs have the potential to transform the way people travel through the creation of a safe, interoperable wireless communications network that includes cars, buses, traffic signals, cell phones, and other devices. Due to increasing reliance on communication, computing, and control technologies have become vulnerable to security threats in VANET. To provide the security in VANET by developing the new mechanism which is integrity(data trust), confidentiality, non-repudiation, access control, real-time operational constraints/demands, availability, and data dissemination technique. In our proposed system propose the novel scheme which is called as trust management scheme data dissemination in order to eavesdroppers with threshold based malicious node detection algorithm (TMD) for VANETs that is able to accurately detect and cope with malicious attacks and also evaluate the trustworthiness of both data and mobile nodes in VANETs. At first the data trust is evaluated based on the data sensed and collected from multiple vehicles; after that we evaluate the node trust in two dimensions, i.e., functional trust and recommendation trust. The functional trust is indicating how likely a node can fulfill its functionality. The recommendation trust is indicating how trustworthy the recommendations from a node for other nodes will be, respectively. Finally our experimental result shows our proposed trust management theme is applicable to a wide range of VANET applications to improve traffic safety, mobility, and environmental protection with enhanced trustworthiness.
Key-Words / Index Term
Vehicular Ad-hoc Networks, Wireless Sensor Networks, Time Division Multiple Access
References
[1] Z. Fei, B. Li, S. Yang, C. Xing, H. Chen, and L. Hanzo, “A survey of multi-objective optimization in wireless sensor networks: Metrics, algorithms, and open problems,” IEEE Communications Surveys Tutorials, vol. 19, no. 1, pp. 550–586, Firstquarter 2017.
[2] L. M. Borges, F. J. Velez, and A. S. Lebres, “Survey on the characterization and classification of wireless sensor network applications,” IEEE Communications Surveys Tutorials, vol. 16, no. 4,pp. 1860–1890, Fourthquarter 2014.
[3] H. Karl and A. Willig, Protocols and architectures for wireless sensor networks. Hoboken, NJ: Wiley, May 2005.
[4] A. B. Noel, A. Abdaoui, T. Elfouly, M. H. Ahmed, A. Badawy, and M. S. Shehata, “Structural health monitoring using wireless sensor networks: A comprehensive survey,” IEEE Communications Surveys Tutorials, vol. 19, no. 3, pp. 1403–1423, third quarter 2017.
[5] D. N. Sandeep and V. Kumar, “Review on clustering, coverage and connectivity in underwater wireless sensor networks: A communication techniques perspective,” IEEE Access, vol. 5, pp.11 176–11 199, 2017.
[6] A. M. Abu-Mahfouz and G. P. Hancke, “Alwadha localization algorithm: Yet more energy efficient,” IEEE Access, vol. 5, pp.6661–6667, 2017.
[7] Y. S. Chen, D. J. Deng, and C. C. Teng, “Range-based localization algorithm for next generation wireless networks using radical centers,” IEEE Access, vol. 4, pp. 2139–2153, 2016.
[8] A. Alomari, W. Phillips, N. Aslam, and F. Comeau, “Dynamic fuzzy-logic based path planning for mobility-assisted localization in wireless sensor networks,” Sensors, vol. 17, no. 8, 2017.
[9] S. Halder and A. Ghosal, “A survey on mobile anchor assisted localization techniques in wireless sensor networks,” Wireless Networks, vol. 22, no. 7, pp. 2317–2336, 2016
[10] N. A. Alrajeh, M. Bashir, and B. Shams, “Localization techniques in wireless sensor networks,” International Journal of DistributedSensor Networks, vol. 9, no. 6, p. 304628, 2013.
[11] G. Han, J. Jiang, C. Zhang, T. Q. Duong, M. Guizani, and G. K. Karagiannidis, “A survey on mobile anchor node assisted localization in wireless sensor networks,” IEEE Communications Surveys Tutorials, vol. 18, no. 3, pp. 2220–2243, thirdquarter 2016.
[12] S. Mirjalili, S. M. Mirjalili, and A. Lewis, “Grey wolf optimizer,” Advances in Engineering Software, vol. 69, pp. 46 – 61, 2014.
[13] S. Mirjalili and A. Lewis, “The whale optimization algorithm,” Advances in Engineering Software, vol. 95, pp. 51 – 67, 2016.
[14] A. Alomari, F. Comeau, W. Phillips, and N. Aslam, “New path planning model for mobile anchor-assisted localization in wireless sensor networks,” Wireless Networks, pp. 1–19, 2017.
[15] D. Koutsonikolas, S. M. Das, and Y. C. Hu, “Path planning of mobile landmarks for localization in wireless sensor networks,” Comput. Commun., vol. 30, no. 13, pp. 2577–2592, Sep. 2007.
[16] Yusuf Perwej “The Hadoop Security in Big Data: A Technological Viewpoint and Analysis”, International Journal of Scientific Research in Computer Science and Engineering, Vol.7, Issue.3, pp.1-14, 2019.
[17] Rucha Pawar, “Wireless Mesh Network Link Failure Issues and Challenges: A Survey”, IJSRNSC, Vol -6, Issue-3, 2018.