Vehicular Adhoc Network (VANETs) Security Enhancement Using Autonomic Framework and Trust Based Routing Algorithm
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 3
Abstract
Abstract: The security protocols in the area of Vehicular Ad-hoc Networks (VANETs) have gained an immense importance from the research community. A noteworthy improvement in the research associated to trust management in the VANETs is detected. The security, privacy and safety of private user information are the prime requirements for the deployment of the protocols in vehicular ad-hoc networks. Nodes in the VANETs network uses packet forwarding for smooth functionality of the network. Some selfish nodes avoid packet forwarding and save the network resources for their own interest or can broadcast malicious information in the network. To isolate these selfish nodes from taking part in the network communication Autonomic Trust and Reputation Monitoring Scheme (ATRMS) is proposed which provides security services like access control, authentication and malicious node detection. The proposed framework uses trust monitoring scheme based on autonomic principles with trust and reputation based data transfer protocol for trust management in VANETs. The proposed system gives associate uniform up-to-date trust information throughout the network with minimum overhead, and it also reduces the impact of double-face attacks.
Authors and Affiliations
Sunita Karande , Govindkumar Lohiya
Face Recognition using Feed Forward Neural Network
Abstract: In this paper, we propose four techniques for extraction of facial features namely 2DPCA, LDA, KPCA and KFA. The purpose of face feature extraction is to capture certain discriminative features that are unique...
A Survey Report on the Novel Approach on Use ofRecommendation Outline in Query Recommender System
Abstract: The DBMS applications are becoming increasingly popular in the scientific community to supportthe interactive exploration of huge data. A result of heavy usage has also lead to a lot of tavles generated i...
A Flexible Method Using Identity Based Message Key Distribution for Securing Workflow Signatures
Abstract: The increase in advancement of information technology led the migration of workflows from paper based to electronic workflow systems. Basically a workflow consists of a number of tasks and each of these t...
Real Time Monitoring Of Urban Water Systems for Developing Countries
Abstract: The safe and satisfactory provision of water related services in urban areas of developing countries remain a major challenge mainly attributed to limited resources and inability to promptly detect operat...
Implementation of Web Based Manufacturing Process Planning Workflow in a Pressure Die Casting Industry
Abstract : Today’s manufacturing industry requires product data management system (PDM) for efficient product development and production. Manufacturing industries must deal with competition, time to market, reducti...