127
Views
0
CrossRef citations to date
0
Altmetric
Articles

A Secured Zobrist Hash Symmetric Sentinel List Based Malicious Attack Detection in Vanet

&
Pages 611-622 | Published online: 08 Feb 2022
 

Abstract

VANET enables communication between the vehicles and Road Side units (RSUs). With the ever fast growth in industry and research necessitates the design of smart transportation system. Moreover, VANET success lies in the security features provided and it cannot be achieved precisely due to all type of security attacks. To secure the VANET against these types of security attacks, most of the research persons have proposed different security mechanisms based on lightweight and one way hash function. While both lightweight and one way hash function are efficient to certain degree, each method has some weakness to entirely secure the network. In this paper, we propose a list-based malicious attack detection scheme based on Zobrist Hash, called, Secured Zobrist Hash Symmetric Attack Detection (SZ-HSAD) to secure VANET to a larger extent. A system initialization is an essential part of trust establishment and secure communications between vehicles, the proposed SZ-HSAD integrates symmetric cryptography based initialization for efficient and robust trust management scheme. The system initialization includes Zobrist Hash Optimal Distance Registration. The trusted authority (TA) evaluates key for both the Road Side Unit (RSU) and vehicles based on the identity. Next, a list-based malicious attack detection using symmetric and sentinel node is designed for timely and early attack detection in VANET. The results are acquired with immense simulations to validate the proposed scheme. The results show that the proposed scheme converge security prerequisites, therefore reducing the average traffic overhead with minimum execution time and verification delay.

Acknowledgement

I thank the God almighty for giving me the research opportunity. I thank my guide Dr.M.Madheswaran for his constant assistant towards the improvement of my research activity. I thank my family, friends and colleagues for their continuous support.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Additional information

Notes on contributors

G. Jeyaram

Jeyaram G, the corresponding author from Kannankulam, Tirunelveli district is pursuing research in Anna University, Chennai. He has done BTech – IT, from Mepco Schlenk Engineering College in 2008.Then MTech – IT from Anna University of Technology, Coimbatore in 2010; MBA – Information Technology from Annamalai University in 2014. His interested domain is vehicular ad-hoc networks.

M. Madheswaran

M Madheswaran is working in Department of Electronics and Communications Engineering, in Muthayammal Engineering College, Rasipuram, Namakkal District, Tamil Nadu, India. He has done BE – ECE from Madurai Kamaraj University in 1990. He continued with ME – ECE from Birla Institute of Technology, Ranji in 1992. He has also done MBA – Human Resource Management from Periyar University, Salem in 2008. Finally, he completed PhD–ECE from IIT Varanasi in 1999. His interested domains are image processing, VLSI design and nano electronics. Email: [email protected]

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 61.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 100.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.