127
Views
0
CrossRef citations to date
0
Altmetric
Articles

A Secured Zobrist Hash Symmetric Sentinel List Based Malicious Attack Detection in Vanet

&
 

Abstract

VANET enables communication between the vehicles and Road Side units (RSUs). With the ever fast growth in industry and research necessitates the design of smart transportation system. Moreover, VANET success lies in the security features provided and it cannot be achieved precisely due to all type of security attacks. To secure the VANET against these types of security attacks, most of the research persons have proposed different security mechanisms based on lightweight and one way hash function. While both lightweight and one way hash function are efficient to certain degree, each method has some weakness to entirely secure the network. In this paper, we propose a list-based malicious attack detection scheme based on Zobrist Hash, called, Secured Zobrist Hash Symmetric Attack Detection (SZ-HSAD) to secure VANET to a larger extent. A system initialization is an essential part of trust establishment and secure communications between vehicles, the proposed SZ-HSAD integrates symmetric cryptography based initialization for efficient and robust trust management scheme. The system initialization includes Zobrist Hash Optimal Distance Registration. The trusted authority (TA) evaluates key for both the Road Side Unit (RSU) and vehicles based on the identity. Next, a list-based malicious attack detection using symmetric and sentinel node is designed for timely and early attack detection in VANET. The results are acquired with immense simulations to validate the proposed scheme. The results show that the proposed scheme converge security prerequisites, therefore reducing the average traffic overhead with minimum execution time and verification delay.

Acknowledgement

I thank the God almighty for giving me the research opportunity. I thank my guide Dr.M.Madheswaran for his constant assistant towards the improvement of my research activity. I thank my family, friends and colleagues for their continuous support.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Additional information

Notes on contributors

G. Jeyaram

Jeyaram G, the corresponding author from Kannankulam, Tirunelveli district is pursuing research in Anna University, Chennai. He has done BTech – IT, from Mepco Schlenk Engineering College in 2008.Then MTech – IT from Anna University of Technology, Coimbatore in 2010; MBA – Information Technology from Annamalai University in 2014. His interested domain is vehicular ad-hoc networks.

M. Madheswaran

M Madheswaran is working in Department of Electronics and Communications Engineering, in Muthayammal Engineering College, Rasipuram, Namakkal District, Tamil Nadu, India. He has done BE – ECE from Madurai Kamaraj University in 1990. He continued with ME – ECE from Birla Institute of Technology, Ranji in 1992. He has also done MBA – Human Resource Management from Periyar University, Salem in 2008. Finally, he completed PhD–ECE from IIT Varanasi in 1999. His interested domains are image processing, VLSI design and nano electronics. Email: [email protected]

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.