Anticipation of Vulnerable Attacks In Vanet Using Blockchain Technique

International Journal of Computer Science and Engineering
© 2021 by SSRG - IJCSE Journal
Volume 8 Issue 1
Year of Publication : 2021
Authors : M. Selvavathi , S.Edwin raja

pdf
How to Cite?

M. Selvavathi , S.Edwin raja, "Anticipation of Vulnerable Attacks In Vanet Using Blockchain Technique," SSRG International Journal of Computer Science and Engineering , vol. 8,  no. 1, pp. 19-23, 2021. Crossref, https://doi.org/10.14445/23488387/IJCSE-V8I1P104

Abstract:

Vehicular imprompt organization (VANET) are otherwise called insightful transportation frameworks. VANET guarantees convenient and precise interchanges between vehicle to vehicle (V2V) and vehicle to foundation (V2I) to improve street security and upgrade the proficiency of traffic stream. Because of its open remote limit and high versatility, VANET is defenseless against malignant hubs that could obtain entrance into the organization and complete genuine medium access control(MAC) layer dangers, for example, repudiation of administration (DOS) assaults, information alteration assaults, pantomime assaults, Sybil assaults, and replay assaults. This could influence the organization's security and protection, making it hurt its data trade by veritable hubs and increment deadly efforts out and about. This paper proposes a tree-based information preparing technique to deal with enormous informational indexes of vehicular subtleties gathered and transferred by the VANET stage. The security chiefs (SMS) assume a critical part in the structure by catching the vehicle flight data, typifying squares to ship keys, and afterward executing rekeying to vehicles inside a similar security space. This idea is proposed to streamline the dispersed key administration in VANET and utilize the powerful exchange assortment period to diminish the key exchange time during vehicle handover. In this way, blockchain innovation has been proposed to build security and protection to alleviate MAC layer assaults.

Keywords:

Blockchain, MAC

References:

[1] Bhoi, S.K., Nayak, R, P., Dash, D.,& Rout, J, P.(2013). RRP: a strong routing protocol for transport impromptu Network against hole
generation.2013 international conference on communication and signal process.
[2] Karumanchi,M.D., Sheeba,J.I.,& Devanevan.S.P.(2019). Cloud-based mostly offer chain management system victimization blockchain. 2019 fourth international conference on electrical, physical science, communication, laptop technologies, and optimization Techniques (ICEECCOT)
[3] Hao, X., Xiao-hong, S.,& Dian, Y.,(2018) Muti-Agent System for E-commerce security dealing with blockchain technology, 2018 International Conference in sensing and instrumentation in IOT Era (ISSI).
[4] Liu,Q., & Li,K,(2018). Decentration group action methodology supported blockchain Technology. 2018 International conference on intelligent Transportation, huge knowledge & good town (ICITBS).
[5] Kitatami, M., & Matsuoka, k.(2018). Associate in Nursing Attack –Tolerant Agreement formula for the block chain. 2018 IEEE twenty-third Pacific Rim International Conference on Dependable Computing (PRDC).
[6] Geol, U., Sonanis, R., Rastogi, l., Lal, S., & De, A.(2020). Criticality Aware Ordered for Heterogeneous Transaction in Blockchain. 2020 IEEE International Conference on the block chain and cryptocurrency (ICBC).
[7] Biswas, S., Shaif, K., Li, F., Nour, B., & Wang, Y.(2018). An ascendible blockchain Framework for Secure Transactions in IoT. IEEE net of Things Journal,1-1.
[8] Singh, A., & Sharma, P.(2015). Aunique mechanism for sleuthing DOS attack inVANET victimization increased attacked packet Detection formula (EAPDA). 2015 second International Conference on Recent Advances in Engineering & process Science(RAECS).
[9] Roselin Mary, S., Maheshwari, M.,& Thamaraiselvan, M., (2013). Early detection of DOS attacks in VANET victimization Attacked Packet Detection Formula (APDA). 2013 International conference on data communication and Embedded System (ICICES).
[10] Goyal, A, K., Kumar Tripathi, A., & Agarwal, G.(2019). Security Attacks, necessities and Authentication Schemes in VANET. 2019 International Conference on problems and Challenges in Intelligent Computing Techniques(ICICT).