Figure 4 - uploaded by Sandeep Kumar Arora
Content may be subject to copyright.
Black Hole Attack ii) Worm Hole attack: In this type of attack somebody receives packets at one point within the network, tunnels them to a different purpose within the network, so replays them into the network from that time. This tunnel between two adversaries referred to as wormhole. It is often established through one long-range wireless link or a wired link between the 2 adversaries. Therefore, it's easy for the somebody to form the tunneled packet arrive before different packets transmitted over a traditional multi-hop route as shown in Figure 5.  

Black Hole Attack ii) Worm Hole attack: In this type of attack somebody receives packets at one point within the network, tunnels them to a different purpose within the network, so replays them into the network from that time. This tunnel between two adversaries referred to as wormhole. It is often established through one long-range wireless link or a wired link between the 2 adversaries. Therefore, it's easy for the somebody to form the tunneled packet arrive before different packets transmitted over a traditional multi-hop route as shown in Figure 5.  

Source publication
Article
Full-text available
In the near future we know that vehicles will communicate with each other to make Vehicular ad hoc network and gives the concept of intelligent transportation system. In this paper we presented the review of security in VANET. Consequently, several researchers represented the attacks and solutions in vehicular communication We analyzed some of the...

Similar publications

Article
Full-text available
Vehicular Ad-hoc NETworks (VANETs) enable cooperative behaviors in vehicular environments and are seen as an integral component of Intelligent Transportation Systems (ITSs). The security of VANETs is crucial for their successful deployment and widespread adoption. A critical aspect of preserving the security and privacy of VANETs is the efficient r...

Citations

... These indicate that there is a high probability that this type of connection is part of the top 5 most vulnerable network connections [19]. [ 16] Black Hole Attacks Black Hole Attacks are one of the major attacks in the Mobile Ad Hoc Network (MANET). These attacks happen when a node consumes all of the routes in the MANET. ...
Chapter
Full-text available
Cybersecurity is currently a topic of utmost significance in tech sectors. The ever-evolving landscape of this field makes it particularly difficult to navigate. This paper aims to help the reader understand the complexity of network attacks and also show how we may never ‘solve’ the problem of cyber attacks. Our paper may be accessible to the layman, but a basic understanding of networking fundamentals would be desirable. Computer security, cybersecurity, or information technology security may all be used interchangeably throughout the paper. An ‘attack’ will refer to a breach in security to an online system that may cause (but is not limited to) the following: unauthorized information disclosure, theft of technology, or disruption of services.Keywordscybersecuritynetworksystemattacksecurity
... They realize the temporary certificates for vehicle-to-vehicle and vehicle-to-road communications by using a combination of permanently valid authentication integers and temporary pseudonym certificates. Kumar and Arora [18] enhance the confidentiality of data in the IoV through unicast communication in V2V (Vehicle to Vehicle) mode. Wu et al. [19] put forward a new and efficient identity-based message authentication scheme. ...
Article
Full-text available
Because of a large number of vehicles in Internet of Vehicle(IoV), distributed nodes and complex driving environment, data security and certification speed are easily affected. Blockchain enables different devices that do not trust each other to work together, maintain the general state in the process of information dissemination and sharing, and protect the privacy of devices. However, at present, the speed of vehicle certification in IoV is slow, and the use of idle resources is not considered. To address this problem, this paper provides a blockchain-based vehicle identity verification scheme by using a hybrid identity code verification method to ensure the nodes in the network securely share information. Meanwhile, a task processing algorithm based on time window is proposed to optimize the utilization of idle resources. In addition, the method is evaluated by simulation experiment, and the designed scheme can reduce malicious behavior of a registered vehicle in the network, and can shorten the processing task delay.
... accuracy, the form, and the mum data for ned from the ig. 11 FIGURE 11. Transceiver packets graph at the vehicle (vehicle2). ...
Article
Full-text available
Thanks to the rapid development in mobile vehicles and wireless technologies, Internet of Vehicles (IoV) has become an attractive application that can provide a large number of mobile services for drivers. Vehicles can be informed of the mobile position, direction, speed and other real-time information of nearby vehicles to avoid traffic jams and accidents. However, the environments of IoV could be dangerous in the absence of security protections. Due to the openness and self-organization of Internet of Vehicles, there are enormous malicious attackers. To guarantee the safety of mobile services, we propose an effective decentralized authentication mechanism for Internet of Vehicles on the basis of the consensus algorithm of blockchain technology. The simulation under the Veins framework is carried out to verify the feasibility of the scheme in reducing the selfish behavior and malicious attacks in Internet of Vehicles.
... Assim, essa troca de informaçinformaç˜informações, qué e frequente, deve ser confiável e verificada quantò a integridade. A confiabilidade dos dadosédados´dadosé maisútilmais´maisútil do que a confiabilidade dos nós que os transmitem [Kumar and Arora 2016]. ...
... • Integridade: Inalterabilidade de dados. A assinatura digitaí e usada para garantir que a integridade de mensagens e dados enviados através da rede não foram corrompidos [Kumar and Arora 2016]. ...
... Atacantes de VANETs e seus perfis representam uma dasáreasdas´dasáreas de interesse e estudo de muitos pesquisadores, como em [ Kumar and Arora 2016] e [Dak et al. 2012]. Alguns são definidos com base em suas açaç˜ações e objetivos pretendidos, e possuem nomenclaturas já consolidadas na literatura, como descrito na Figura 1 : ...
Chapter
Full-text available
This chapter has the objective to present the applicability of technological solutions using Gamification as a strategy for user engagement. We will see the concept of gamification, examples of its use in several areas and contexts and the importance of making a good gamification design, showing some frameworks used by researchers and professionals in the field. This chapter is a result of the mini-course presented at the Enucompi 2018 in the city of Floriano-PI. The course was offered to students and professionals in the area of technology, marketing, psychology and education who are interested in motivating and engaging individuals for purposes beneficial to society.
... Rapid technology advances on electronic device and communication technologies, it has been probable to construct unmanned aerial vehicle (UAV) system, which can fly separately or can be manage slightly [10]. The small operating experience (adaptability, elasticity and easy equipment) usage of UAV assures the modern methods both military and civilian applications. ...
... Architecture of MANET, VANET and FANET[10] ...
Article
Full-text available
Security is one of the key important factors in ad hoc network due to the open wireless medium and dynamic topology of the network. MANET, VANET and FANET are type of ad hoc network and their applications are served the end users in real environment. VANET and FANET are next generation network and due to safety applications more attractions for end users in these networks. In this paper, we will provide the survey on security issues and challenges in the field of MANET, VANET and FANET. The successful implementation of these networks in real environment, it is require the network will be secure and end user can take benefit from their life safety applications.