A Proficient and Reserve of DOS in VANET Approach
||International Journal of P2P Network Trends and Technology (IJPTT)||
|© 2018 by IJPTT Journal|
|Year of Publication : 2018|
|Authors : Dumadi Ismaya, Amisha Mawar|
MLA Style: Dumadi Ismaya, Amisha Mawar "A Proficient and Reserve of DOS in VANET Approach" International Journal of P2P Network Trends and Technology 8.3 (2018): 9-13.
APA Style:Dumadi Ismaya, Amisha Mawar, (2018). A Proficient and Reserve of DOS in VANET Approach. International Journal of P2P Network Trends and Technology, 8(3), 9-13.
In this network protection communication distribution deprived of every interruption has to be important to avoid any collision in the system. On the source of revision of different methods in VANET greatest tactic can be removed that can be used for this network in actual world applications. A kind of Wireless Ad hoc in which node has extraordinary tractability, and thus the topology of the network system is extremely forceful. This process possible to intensification highway protection, improve traffic proficiency. Basically used to provide various infotainment facilities to each and every end user; these services are further responsible to deliver a proficient dynamic environment. The results has high throughput and packet delivery ratio at stumpy density of nodes and the worth of these limitations convert low at high density of nodes. The preclusion scheme is proficient to inhibit DOS attack.
 Joanne Mun-Yee Lim “Cognitive VANET with Enhanced Priority Scheme” IEEE Conf. on International Conference on Telecommunications and Multimedia,2014,pp-116-121.
 Hyun Yu , JoonYoo, SanghyunAhn, “A VANET Routing based on the Real-time Road Vehicle Density in the City Environment”, IEEE Conf. On Ubiquitous and Future Networks (ICUFN),2013,pp. 333–337.
 Pallvi Minhas, Pallavi Jindal,” Evaluation of Hybrid framework for Detection of Sybil Attack in VANET, International Journal of Computer & Organization Trends (IJCOT), Volume - 6 Issue – 2,2016.
 Gandhi, U.D., Keerthana, R.V.S.M. “Request ResponseDetection Algorithm for detecting DoS attack in VANET”, IEEE Conf. on Optimization, Reliability, andInformation Technology,2014,pp.192–194.
 Nikumbh, D.M.; Kharadkar, R.D.; Bhoi, A.D.; Deshmukh, A.Y “Analysis of distance based routingprotocol in VANET” IEEE Conf. On Computing for Sustainable Global Development, 2014, pp. 829– 834.
 Ravi, K. ; Praveen, K “AODV routing in VANET for message authentication using ECDSA” IEEE Conf. onCommunications and Signal Processing, 2014,pp. 1389–1393.
 Carpenter, S.E. “Obstacle Shadowing Influences inVANET Safety” IEEE Conf. On Network Protocols, 2014, pp. 480 – 482.
 B. Muthamizh , S. Siva Sathya , M. Chitra,”Spanning Tree Based Broadcasting for VANET”, International Journal of P2P Network Trends and Technology (IJPTT), Volume - 4 Issue – 2,2014.
 Yong Hao, Jin Tang, and Yu Cheng, “ Secure Cooperative Data Downloading in Vehicular Ad Hoc Networks”, Journal On Selected Areas In Communications/Supplement, , pp. 523-537, Vol. 31,No. 9, September 2013, IEEE.
 Yuan Yao, Lei Rao, and Xue Liu, “Performance and Reliability Analysis of IEEE 802.11p Safety Communication in a Highway Environment”, Transactions on Vehicular Technology, Pp. 4198-4212, Vol. 62, No. 9, November 2013, IEEE.
 Yuen Liu, Jun Bi, Ju Yang, “Research on Vehicular Ad hoc Networks”, 2009 Chinese Control and Decision Conference (CCDC 2009),978-1-4244-2723-9/09/2009 IEEE
 Richard Gilles Engoulou, M. B. (2014). VANET security survey. Computer Communications, Vol 44 (2014) 1-13.
 Qingzi Liu, Q. W. (2013). A hierarchical security architecture of VANET. University of Armed Police Force,
 Shuai Chen, W. N. (2013). Key Indices Analysis of IEEE 802.11p Based Vehicle to Infrastructure System in Highway Environment. 13th COTA International Conference of Transportation Professionals (CICTP 2013). Jiangsu, China: Procedia Social and Behavioral Science.
 Lu Chen, H. T. (2013). Analysis of VANET security based on routing protocol information. Fourth International Conference on Intelligent Control and Information Processing (ICICIP). Bejing, China.
16] Hu, Y.-C., A. Perrig, and D.B. Johnson. Packet leashes: a defense against wormhole attacks in wireless networks. in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies. 2003: IEEE.
 Ngai, E.C.H., L. Jiangchuan, and M.R. Lyu. On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks. in Communications, 2006. ICC `06. IEEE International Conference on. 2006.
 Lo, N.-W. And H.-C. Tsai. Illusion attack on VANET applications-A message plausibility problem. InGlobecom Workshops, 2007 IEEE. 2007: IEEE.
 Douceur, J.R., The sybil attack, in Peer-to-peer Systems. 2002, Springer. p. 251-260.
 He, L. and W.T. Zhu. Mitigating DoS attacks against signature-based authentication in VANETs. In Computer Science and Automation Engineering (CSAE), 2012 IEEE International Conference on. 2012: IEEE.
 Verma, K., H. Hasbullah, and A. Kumar. An efficient defense method against UDP spoofed flooding traffic of denial of service (DoS) attacks in VANET. In Advance Computing Conference (IACC), 2013 IEEE 3rd International. 2013: IEEE.
VANET, communication, network, security, Dos