Open Access   Article Go Back

False Node Identification in VANETs for Inmproved Security

Neethu Maria John1 , Simy Mary Kurian2 , Vinodh P Vijayan3 , Neema George4

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-8 , Page no. 1028-1032, Aug-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.10281032

Online published on Aug 31, 2018

Copyright © Neethu Maria John, Simy Mary Kurian, Vinodh P Vijayan, Neema George . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Neethu Maria John, Simy Mary Kurian, Vinodh P Vijayan, Neema George, “False Node Identification in VANETs for Inmproved Security,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.1028-1032, 2018.

MLA Style Citation: Neethu Maria John, Simy Mary Kurian, Vinodh P Vijayan, Neema George "False Node Identification in VANETs for Inmproved Security." International Journal of Computer Sciences and Engineering 6.8 (2018): 1028-1032.

APA Style Citation: Neethu Maria John, Simy Mary Kurian, Vinodh P Vijayan, Neema George, (2018). False Node Identification in VANETs for Inmproved Security. International Journal of Computer Sciences and Engineering, 6(8), 1028-1032.

BibTex Style Citation:
@article{John_2018,
author = {Neethu Maria John, Simy Mary Kurian, Vinodh P Vijayan, Neema George},
title = {False Node Identification in VANETs for Inmproved Security},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {8},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {1028-1032},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5500},
doi = {https://doi.org/10.26438/ijcse/v6i8.10281032}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.10281032}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5500
TI - False Node Identification in VANETs for Inmproved Security
T2 - International Journal of Computer Sciences and Engineering
AU - Neethu Maria John, Simy Mary Kurian, Vinodh P Vijayan, Neema George
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 1028-1032
IS - 8
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
91 132 downloads 82 downloads
  
  
           

Abstract

The best test of vehicular adhoc network is to distinguish the false node in the network. These false node can cause numerous perilous circumstances to the vehicles. The answer for this is the F measure based VANET.F measure bunch the se of hubs into groups and appoint a load to every hub in light of the contention in the network.The most noteworthy clash causing node set will get most elevated weight value and those node set will considered as false in the network. This permits the organization to identify bogus hubs all the more precisely with greatest accuracy and least review. Framework utilizes a half encryption strategy to lessen the time intricacies in the network. This assists with moving alongthe exactness and proficiency of the network.

Key-Words / Index Term

F measure, half encryption

References

[1] Manuel Fogue, Francisco J. Martinez, Member, IEEE, Piedad Garrido, Member, IEEE, “Securing Warning Message Dissemination in VANETs Using Cooperative Neighbor Position Verification”, IEEE transactions on vehicular technology, Vol. 64, Issue . 6, 2015
[2] Zhengming Li, Congyi Liu, and Chunxiao Chigan,” On Secure VANET-Based Ad Dissemination With Pragmatic Cost and Effect Control”, IEEE transactions on intelligent transportation systems, Vol. 14, Issue 1, 2013.
[3] Mina Rahbari and Mohammad Ali Jabreil Jamali,” Efficient Detection of Sybil Attack Based on Cryptography in VANET “,International Journal of Network Security & Its Applications (IJNSA), Vol.3, Issue .6, 2011
[4] Osama Abumansoor, Member, IEEE, and Azzedine Boukerche, Senior Member, IEEE, “A Secure Cooperative Approach for Nonline-of- Sight Location Verification in VANET”, IEEE transactions on vehicular technology, Vol. 61, Issue 1, 2012.
[5] Ming Li, Kai Zeng , Wenjing Lou,” Opportunistic broadcast of event-driven warning messages in Vehicular Ad Hoc Networks with lossy links”, Computer networks, Vol 9, Issue 5, 2011
[6] Soufiene Djahel and Yacine Ghamri-Doudane, “A Robust Congestion Control Scheme for Fast and Reliable Dissemination of Safety Messages in VANETs”, IEEE Wireless Communications and Networking Conference,pp 2264-2269, 2012.
[7] Robert K. Schmidtx, Tim Leinm¨ullerx, Elmar Schoch, “Vehicle Behavior Analysis to Enhance Security in VANETs”, article on telematics and computer networks, 2014