Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Zahra, Syed Rameem
- MNP:Malicious Node Prevention in Vehicular Ad Hoc Networks
Abstract Views :242 |
PDF Views:1
Authors
Affiliations
1 School of Computer Science & Engineering, SMVD University, J&K, IN
1 School of Computer Science & Engineering, SMVD University, J&K, IN
Source
International Journal of Computer Networks and Applications, Vol 5, No 2 (2018), Pagination: 9-21Abstract
Today, traffic security has become an obligation rather than a necessity. Hence to secure the traffic, provide comfort to the driver and the passengers, ensure safety of the pedestrians, infrastructure as well as the one’s sitting inside the cars, Intelligent Transport System (ITS) was created. The base of ITS is formed by a class of networks called as VANET. The VANETs make communication between vehicles and vehicle to infrastructure possible. They vary from other Ad-hoc network because of their rare characteristics. VANETs are the networks which lack centralized control and infrastructure, in which the nodes are highly mobile, topology is extremely dynamic and the links are volatile. Consequently, VANET security is threatened- the network is vulnerable to number of mischief. The easiest of all the attacks on VANETs is that on the availability – the Black-hole attack. This attack is carried out by the malicious nodes which can even be the authentic users of the network, implying that the security procedures involving encryption and authentication will not help. Therefore, to secure the VANETs against this common type of attack, we have proposed an algorithm MNP-Malicious Node Prevention. MNP improves DMV (Detection of Malicious Vehicle algorithm) as well as DMN (Detection of Malicious Nodes algorithm) in a way that MNP simply prevents the malicious nodes from participating in the packet forwarding while as both DMV & DMN first identify the malicious nodes and then remove them. This way, DMV as well as DMN cause the loss of many data packets which may be important. Hence MNP greatly improves the performance of the network when under malicious attack.Keywords
ITS, VANET, Black Hole Attack, MNP, DMV, DMN.References
- Richard Gilles Engoulou, Martine Bellaiche, Samuel Pierre, Alejandro Quintero, “VANET security surveys”, in: computer communications Elsevier, 1- 13, 2014.
- O. Trullols, M. Fiore, C. Casetti, C.-F.Chiasserini, J.M. BarceloOrdinas, “Planning roadside infrastructure for information dissemination in intelligent transportation systems”, Comput. Commun.33 (4) 432–442, 2010.
- S.S. Kaushik, “Review of different approaches for privacy scheme in VANETs”, Int. J. 5 ISSN 2231-1963, 2012.
- A.Stampoulis, Z.Chai, “A Survey of Security in Vehicular Networks”, Project CPSC 534,2007.
- J.-P. Hubaux, S. Capkun, J. Luo, “The security and privacy of smart vehicles”, IEEE Secur.Priv. 2 (3) 49–55, 2004.
- C.Wei, Y,Jianding, L. Xiangjun, “The design of electronic license plate recognition terminal system based on nRF24LE1”, in : 2012 Fifth International Symposium on Computational Intelligence and Design (ISCID), pp. 127-129, 2012.
- M. J.-P. Hubaux, S. Capkun, J. Luo, “The security and privacy of smart vehicles”, IEEE, J.-P.Hubaux, Securing vehicular ad hoc networks, J. Comput. Secur.15 (1) 39–68, 2007.
- Qing Xu, Tony Mak, Jeff Ko, Raja Sengupta “Vehicle-to-Vehicle Safety Messaging in DSRC” ACM 1-58113-922-5/04/0010, October 1, 2004.
- I.C. Society, “802.11p–IEEE standard for information technology – local-and metropolitan area networks – specific requirements – part 11”: Wireless LAN medium access control, (mac) and physical layer (phy) specifications amendment 6: wireless access in vehicular environments, 2010.
- DSRC, Dsrc, http://grouper.ieee.org/groups/scc32/dsrc/.
- ETSI, European Telecommunications Standards Institute (ETSI), http://www. etsi.org.
- ITS, ITS standards fact sheets of IEEE, http://www.standards.its.dot.gov/factsheets/factsheet/80, seen, April 19, 2014.
- L. Miao, K. Djouani, B.J. van Wyk, Y. Hamam, “Evaluation and enhancement of IEEE 802.11 p standard: a survey”, Mob. Comput.1 (1) 2012.
- G.Jyoti, M.S.Gaur, in: S, Auerbach (Ed.), “Security of Self-organising Networks MANET, WSN, WMN, VANET”, CRC Press, 2010.
- Y.wang, F.Li, “Vehicular Ad Hoc Networks”, Springer-Verlag, London, 2009.
- H. Hartenstein , Kennith P. Laberteaux, “A tutorial survey on vehicular ad hoc networks”, IEEE commun. Mag., 2008.
- SalehYousefi ,MahmoodSiadatMousavi, MahmoodFathy, “Vehicular Ad Hoc Networks (VANETs) : Challenges and Perspectives”, in : International conference on ITS Telecommunications Proceedings, pp. 1151- 1155, 2006.
- J. Kakarla, S. Siva Sathya, B.G. Laxmi, B. Ramesh Babu, “A survey on routing protocols and its issues in VANET”, Int. J. Comput. Appl. 28 (4) ISSN 0975-8887, 2011 .
- L.K. Qabajeh, M.L.M. Kiah, M.M. Qabajeh, “A scalable and secure position-based routing protocols for ad-hoc networks”, Malays. J. Comput. Sci. 22 (2) 99–120, 2009.
- F.D. Rango, J.-C. Cano, M. Fotino, C. Calafate, P. Manzoni, S. Marano, “OLSR vs DSR: a comparative analysis of proactive and reactive mechanisms from an en- ergetic point of view in wireless ad hoc networks”, Comput. Commun.31 (16) 3843–3854, 2008.
- Philippe Jacquet, Paul Muhlethaler, Thomas Clausen, AnisLaouiti, Amir Qayyum, Laurent Viennot, “Optimized link state routing protocol for ad hoc net- works”, in: Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century. Proceedings.IEEE International, IEEE, pp. 62–68, 2001.
- M. Osman, “The performance of aodv routing protocol based on dropped packet and throughput metrics: a simulation and comparative study for VANET”, Int. J. Manag. Inform. Technol. 4 (2) 265–279, 2013.
- B. Karp and H.T. Kung, “GPSR: Greedy perimeter stateless routing for wireless networks”, in Proceedings of the ACM/IEEE International Conference on MobileComputing and Networking (MobiCom), 2000.
- R. Jain, A. Puri, R. Sengupta, “Geographical routing using partial information for wireless ad hoc networks”, IEEE Pers. Commun. 8 (1) 48–57, 2001.
- H. Rahbar, K. Naik, A. Nayak, “Dtsg: dynamic time-stable geo-cast routing in vehicular ad hoc networks”, in: 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), IEEE, pp. 1–7, 2010.
- S.-Y. Wang, C.-C.Lin, K.-C.Liu, W.-J. Hong, “On multi-hop forwarding over wbss-based IEEE 802.11 (p)/1609 networks”, in: IEEE 20th International Sympo- sium on Personal, Indoor and Mobile Radio Communications, 2009, IEEE, pp. 3040–3044, 2009.
- L. Miao, K. Djouani, B.J. van Wyk, Y. Hamam, “Evaluation and enhancement of IEEE 802.11 p standard: a survey”, Mob. Comput.1 (1), 2012.
- B. Ducourthial, F. El Ali, et al., “Architecture pour communication vehicular-infrastructure”, in: CFIP, 2009.
- J.T.Isaac, S. Zeadally, J.S. Camara, “Security attacks and solutions for vehicular ad hoc networks”, IET commun, 4 894-903, 2010-04-30.
- V.S. Yadav, S. Misra, M. Afaque, “Security of Wireless and Self-Organising Networks: Security in Vehicular Ad hoc Networks”, CRC Press, pp.227-250, 2010.
- M Raya, P. Papadimitratos, J.P. Hubaux, “Securing vehicular communications, IEEE wireless”, Commun, 13 8-15, 2006.
- S. Zeadally, R. Hunt, Y.-S. Chen, A. Irwin, A. Hassan, “Vehicular ad hoc networks (VANETs): status, results, and challenges”, Telecommun. Syst. 50 (4) 217–241, 2012.
- A. Dhamgaye, N. Chavhan, “Survey on security challenges in VANET”, Int. J. Com- put. Sci. 2 88–96, ISSN 2277-5420, 2013.
- J.M. d. Fuentes, A.I. Gonzalez-Tablas, A. Ribagorda, “Overview of security issuesin vehicular ad-hoc networks”, in: Maria Manuela Cruz-Cunha, Fernando Moreira (Eds.), Handbook of Research on Mobility and Computing, IGI Global, 2010.
- B. Schneier, “Applied Cryptographic protocols, Algorithms, and Source Code in C”, John Wiley & Sons, Inc., 1996.
- R. Minhas, M. Tilal, “Effects of jamming on IEEE 802.11 p systems”, Chalmers University of Technology, 2010.
- A. Hamieh, J. Ben-Othman, A. Gueroui, F. Naït-Abdesselam, “Detecting greedy behaviors by linear regression in wireless ad hoc networks”, in: IEEE Interna- tional Conference on Communications, ICC’09, IEEE, pp. 1–6, 2009.
- J.R. Douceur, “The sybil attack”, in: Peer-to-Peer Systems, Springer, pp. 251–260, 2002.
- M.S. Al-kahtani, “Survey on security attacks in vehicular ad hoc networks (VANETs)”, in: 6th International Conference on Signal Processing and Commu- nication Systems (ICSPCS), IEEE, pp. 1–9, 2012.
- Nadeem T, Shankar P “A comparative study of data dissemination models for VANETs”, IEEE Mob Ubiquitous SystNetwServ: 1–10, 2006.
- AmenehDaeinabi, Akbar Ghaffarpour Rahbar “Detection of malicious vehicles (DMV) through monitoring in vehicular Ad-hoc Networks” in : Springer, pp 325-338, 2013 .
- Abdulhamid H, Tepe KE, Abdel-Raheem E “Performance of DSRC systems using conventional channel estimation at high velocities”, Int J Electron Commun: 556–561, 2007.
- Picconi F, Ravi N, Gruteser M, Iftode L “Probabilistic validation of aggregated data in Vehicular Ad Hoc Networks”, International Conference on Mobile Computing and Networking, Los Angeles, CA, USA: 76–85, 2006.
- Raya M, Papadimitratos P, Aad I, Jungels D, Hubaux JP “Eviction of Misbehaving and Faulty Nodes in Vehicular Networks”, IEEE J Sel Areas Commun 25(8):1557–1568, 2007.
- Ghosh M, Varghese A, Gupta “A Distributed misbehaviour detection in VANETs”, IEEE WirelCommun Network Conf: 2909-2914, 2009.
- Ghosh M, Varghese A, Kherani AA, Gupta A, Muthaiah SN “Detecting misbehaviour in VANET with integrated ischolar_main cause analysis”, Elsevier AD Hoc Networks 8:778-790, 2010.
- Gelle P, Grren D, Staddon J “Detection and correcting malicious data in VANETs”, in Proc VANETS’04: 29–37, 2004.
- Guo J, Baugh JP, Wang SH “A group signature based secure and privacy-preserving vehicular communication framework”, Mob NetwVeh Environments: 103–108, 2007.
- Li ChT, Hwang MSh, Chu YP, “A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc network”, ComputCommun 31(12):2803–2814, 2008.
- Raya M, Hubaux JP, “The security of vehicular ad hoc networks”, J ComputSecur Spec Issue Secur Ad Hoc Sensor Netw 15(1):39–68, 2007.
- Wang NW, Hauang YM, Chen WM, “A novel secure communication scheme in vehicular ad hoc networks”, ComputCommun 31(12):2827–2837, 2008.
- Wua B, Wua J, Fernandeza EB, Ilyasa M, Magliveras S, “Secure and efficient key management in mobile ad hoc networks”, J NetwComputAppl 30:937–954, 2007.
- Yan G, Olariu S, Weigle MC, “Providing VANET security through active position”, ComputCommun 31(12):2883–2897, 2008.
- Wang Z, Chigan CH, “Countermeasure uncooperative behaviors with dynamic trust-token in VANETs”, Proc IEEE IntConfCommun: 3959–3964, 2007.
- Wex P, Breuer J, Held A, Leinmuller T, Delgrossi L, “Trust issues for Vehicular Ad-Hoc Networks”, VTC.2008: 2800–2804, 2008.
- Fonseca E, Festag A, “A survey of existing approaches for secure Ad Hoc routing and their applicability to VANETS”, Technical Report NLE-PR, NEC Network Laboratories, 2006.
- Uzma Khan, Shikha Agarwal, Sanjay Silakari, “Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks”, in: Elsevier, pp 965-972, 2015.
- A Diffie-Hellman and Two Step Verification based Secure Cloud Computing Paradigm
Abstract Views :372 |
PDF Views:0
Authors
Affiliations
1 Institute of Technology, University of Kashmir, J&K, IN
2 Shri Mata Vaishno Devi University, J&K, IN
1 Institute of Technology, University of Kashmir, J&K, IN
2 Shri Mata Vaishno Devi University, J&K, IN
Source
International Journal of Computer Networks and Applications, Vol 5, No 3 (2018), Pagination: 22-31Abstract
The foundation of cloud computing has been laid on five important traits: self-service on appeal, wide network access, pooling of resources (location independence), quick elasticity and quantified service. In least complex terms, it is to say that any cloud product (whether infrastructure, platform or software) is offered in a way that it can be rented by consumers over the internet (pay for what you use on demand). Owing to all these characteristics, there are enormous advantages from the viewpoint of both the vendor and the user and hence the cloud is gaining limelight day by day. However, it should not be forgotten that every coin has two sides; the level of dangers against IT frameworks is specifically corresponding to the level of developing technology. In order to make any new reliable technology, the security professionals need to pay attention to discover any new threats that could possibly be launched against it. Cloud computing has various issues, like privacy issues, confidentiality of user’s data etc. which majorly depress the extensive benefits of cloud computing is restricted. Also, the concept of multi-tenancy offered by cloud computing poses new challenges to the security professionals. In this research article, we enlighten the security issues related to cloud computing and propose the corresponding possible solutions to balance out these threats.Keywords
Cloud Computing, Security Issues, Multi-Tenancy, Privacy, Confidentiality.References
- Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, 2011.
- M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A.Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, etal, A view of cloud computing, Communications of the ACM 53 (4) (2010) 50–58.
- Jun-jie Wang and Sen Mu, “Security issues and countermeasures in cloud computing,” in 2011 IEEE International Conference on GreySystems and Intelligent Services (GSIS), 2011, pp. 843–846.
- “Final Version of NIST Cloud Computing Definition Published.”[Online]. Available: http://www.nist.gov/itl/csd/cloud-102511.cfm.[Accessed: 18-Mar-2012].
- Haoyong Lv and Yin Hu, “Analysis and Research about Cloud Computing Security Protect Policy,” in 2011 International Conference on Intelligence Science and Information Engineering (ISIE), 2011, pp. 214–216.
- H. Takabi, J. Joshi, G. Ahn, Security and privacy challenges in cloud computing environments, IEEE Security & Privacy 8 (6) (2010) 24–31.
- Rabi Prasad Padhy, Manas Ranjan Patra, Suresh Chandra Satapathy, Cloud Computing: Security Issues and Research Challenges, IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS) Vol. 1, No. 2, December 2011.
- Diogo A. B. Fernandes, Liliana F. B. Soares, João V. Gomes, Mário M. Freire, Pedro R. M. Inácio, Security issues in cloud environments: a survey, Int. J. Inf. Secur. 13:113–170 (2014) DOI 10.1007/s10207-013-0208-7.
- Aguiar, E., Zhang, Y., Blanton, M.: An Overview of Issues and Recent Developments in Cloud Computing and Storage Security, pp. 1–31, Springer, Berlin (2013).
- “T. Grance, and P. Mell, ‘The NIST definition of Cloud Computing,’ National Institute of Standards and Technology (NIST), 2009.”
- B. Gowrigolla, S. Sivaji, and M. R. Masillamani, “Design and auditing of Cloud computing security,” in 2010 5th International Conference on Information and Automation for Sustainability (ICIAFs), 2010, pp. 292–297.
- C. Wang, Q. Wang, and K. Ren, “Towards Secure and Effective Utilization over Encrypted Cloud Data,” in Proc. of ICDCS’11 Workshops, 2011.
- P. Samarati and S. De Capitani di Vimercati, “Data Protection in Outsourcing Scenarios: Issues and Directions,” in Proc. of ASIACCS, 2010.
- M. Li, S. Yu, N. Cao, and W. Lou, “Authorized private keyword search over encrypted personal health records in cloud computing,” in Proc. of ICDCS, 2011.
- GoGrid API, http://www.gogrid.com/company/press-releases/gogridmoves- api-specification-to-creativecommons.php, 2011.
- Storage Network Industry Alliance, http://www.snia.org, 2011.
- Amazon Web Services, “Amazon Simple Storage Service (Amazon S3),” http://aws.amazon.com/s3/, 2009.
- H. Lo, R. Wang, J. P. Garbani, E. Daley, R. Iqbal, and C. Green, Forrester report, The State of Enterprise Software: 2009, 2009.
- M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, “On Technical Security Issues in Cloud Computing,” in Proc. of IEEE International Conference on Cloud Computing, 2009.
- Hacker4Lease, “Backdoor and Debug Options,” http://www.hacker4l ease.com/attack methods/backdoor/, 2011.
- R. Bhadauria, R. Chaki, N. Chaki, and S. Sanyal, “A Survey on Security Issues in Cloud Computing,” in ArXiv 2011.
- Q. Duan, Y. Yan, A.V. Vasilakos, A survey on service oriented network virtualization toward convergence of networking and cloud computing, IEEE Transactions on Network and Service Management 9 (4) 373–392 (2012).
- W. A. Wayne, “Cloud hooks: Security and privacy issues in cloud computing,” in Proc. of Hawaii International Conference on System Sciences, 2011.
- Texiwill, “Is Network Security the Major Component of Virtualization Security?,” http://www.virtualizationpractice.com/blog/?p=35, 2009.
- Sabahi and Farzadl, “Virtualization-level security in cloud computing,” in Proc. of IEEE International Conference on Communication Software and Networks, 2011.
- Slawomir Grzonkowski and Peter M. Corcoran "Sharing Cloud Services: User Authentication for Social Enhancement of Home Networking", IEEE Transactions on Consumer Electronics, vol. 57, no. 3, 2011.
- G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, Provable data possession at untrusted stores, in: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS‘07), Alexandria, Virginia, USA, October 28–31, 2007.
- D. Boneh, C. Gentry, B. Lynn, H. Shacham, Aggregate and verifiably encrypted signatures from bilinear maps, in: International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2003), Warsaw, Poland, May 4–8, 2003.
- D. Boneh, B. Lynn, H. Shacham, Short signatures from the Weil pairing, Journal of Cryptology 17 (4) 297–319 (2004).
- R. Merkle, Protocols for public key cryptosystems, in: IEEE Symposium on Security and Privacy, Oakland, California, USA, April, 1980.
- P. Rewagad and Y. Pawar "Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing", IEEE International Conference on CSNT, pp.437 – 439, 2013.
- Dimitrios Zissis, Dimitrios Lekkas, Addressing cloud computing security issues, Future Generation Computer Systems 28 583–592 (2012).
- B. Kang, C. Boyd, E. Dawson, A novel identity-based strong designated verifier signature scheme, Journal of Systems and Software 82 (2) 270–273 (2009).
- VeriSign. Directories and public—key infrastructure (PKI), Directories and Public—Key Infrastructure, PKI.
- W. Du, J. Jia, M. Mangal, M. Murugesan, Uncheatable grid computing, in: Proceedings of the 24th International Conference on Distributed Computing System (ICDCS‘04), Hachioji, Tokyo, Japan, March 24–26, 2004.
- Chirag Modi, Dhiren Patel, Hiren Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan, A survey of intrusion detection techniques in Cloud, Journal of Network and Computer Applications, 36(1), pp. 42-57 (2013).
- K. Vieira, A. Schulter, C. B. Westphall, and C. M. Westphall, ―Intrusion detection techniques for Grid and Cloud Computing Environment,‖ IT Professional, IEEE Computer Society, vol.: 12, issue 4, pp. 38-43, 2010.