Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
International Journal of Ad hoc, Sensor & Ubiquitous Computing
International Journal of Computer Applications, 2013
Vehicular ad-hoc network (VANET) is a promising approach that provides safety measures and other application to the drivers on the vehicles. The focus of VANETs is to fulfil user's requirements on road side area which increases the safe and comfortable journey for users. It provides good communication like mobile ad-hoc network (MANET) when there is no intruders exist in the network. In VANET, communication depends on road safety such as emergency situation, vehicles tracking, messages monitoring and tracking of vehicles. But many attackers like black hole attack, wormhole attack and Sybil attack are more vulnerable to VANET. In order to provide efficient communication, we provide a malicious node identification routing mechanism which gives the valid route between two vehicles. To avoid several attacks, we introduce a protection mechanism that includes key management for preventing our network. Our proposed system provides efficient communication on VANET that focus on throughput, end-to-end delay, packet delivery ratio, detection rate and misdetection rate.
2013
Vehicular Ad hoc Network (VANET) needs security to implement the wireless environment and serves users with safety and comfort applications. Attackers generate different attacks in vehicular network. In this paper, first phase implementation of attacker node in AODV routing protocol in VANET and in second phase identify malicious node with watchdog intrusion detection system. Once the attacker node is identified we will prevent it to communicate with other neighbor nodes in network with the help of Beyesian network theory. From Beyesian network theory find probability of the neighbouring node being attacker node. To make secure AODV connection with generate new Route Request Packet (RREQ) in VANET.
International Journal of Intelligent Computing and Technology (IJICT), 2020
Today, traffic security has become an obligation rather than a necessity. Hence to secure the traffic, provide comfort to the driver and the passengers, ensure safety of the pedestrians, infrastructure as well as the one's sitting inside the cars, Intelligent Transport System (ITS) was created. The base of ITS is formed by a class of networks called as VANET. The VANETs make communication between vehicles and vehicle to infrastructure possible. They vary from other Ad-hoc network because of their rare characteristics. VANETs are the networks which lack centralized control and infrastructure, in which the nodes are highly mobile, topology is extremely dynamic and the links are volatile. Consequently, VANET security is threatened-the network is vulnerable to number of mischief. The easiest of all the attacks on VANETs is that on the availability – the Black-hole attack. This attack is carried out by the malicious nodes which can even be the authentic users of the network, implying that the security procedures involving encryption and authentication will not help. Therefore, to secure the VANETs against this common type of attack, we have proposed an algorithm MNP-Malicious Node Prevention. MNP improves DMV (Detection of Malicious Vehicle algorithm) as well as DMN (Detection of Malicious Nodes algorithm) in a way that MNP simply prevents the malicious nodes from participating in the packet forwarding while as both DMV & DMN first identify the malicious nodes and then remove them. This way, DMV as well as DMN cause the loss of many data packets which may be important. Hence MNP greatly improves the performance of the network when under malicious attack.
2013
Abstract-A Mobile Ad hoc Network (MANET) is a system of wireless mobile nodes which can freely and dynamically self-organize and co-operative in to arbitrary and temporary network topologies. Security of AODV protocol is compromised by a particular type of attack called 'Black Hole' attack. In this attack a malicious node advertises itself as having the shortest path to the node whose packets it wants to intercept. If there are multiple malicious nodes in a network and are co-operating with each other then it is known as "cooperative black hole attack". In this work a hybrid approach is proposed for implementing H-AODV, by preventing malicious nodes from network and improving efficiency. The proposed H-AODV protocol is simulated on ns-3 simulator and results are compared and analysed with base AODV protocol, based on important performance metrics like packet delivery fraction, end-to-end delay and throughput. It is concluded from the result that H-AODV with propo...
2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies, 2009
2018
Thead-hoc on demand distance vector protocol AODV is the most reactive protocol that is widely used to implement mobile ad-hoc networks (MANETs). As a responsive protocol, it seeks to set up a route on demand when two nodes in the networks need to communicate. When a source node needs a route to a destination, the AODV looks for the route in its routing table where the previously allocated routes are stored. If the route is not in the route table, AODV will launch a route discovery process that aims to return a route to the destination if a network path exists to the destination. Route discovery process fails when a wrong route is returned, or no route is restored although a network path to the destination exists. Both fails are due to misbehaving by one or more nodes in the network. This node misbehaving is due either to a selfishness behavior or malicious behavior. Discovering misbehaving nodes during route discovery is essential to maintain a fresh correct route to destinations. ...
PNAS - Proceedings of National Academy of Sciences of the United States of America, 2024
Elites played a pivotal role in the formation of post-Roman Europe on both macro- and microlevels during the Early Medieval period. History and archaeology have long focused on their description and identification based on written sources or through their archaeological record. We provide a different perspective on this topic by integrating paleogenomic, archaeological, and isotopic data to gain insights into the role of one such elite group in a Langobard period community near Collegno, Italy dated to the 6-8th centuries CE. Our analysis of 28 newly sequenced genomes together with 24 previously published ones combined with isotope (Sr, C, N) measurements revealed that this community was established by and organized around a network of biologically and socially related individuals likely composed of multiple elite families that over time developed into a single extended pedigree. The community also included individuals with diverse genetic ancestries, maintaining its diversity by integrating newcomers and groups in later stages of its existence. This study highlights how shifts in political power and migration impacted the formation and development of a small rural community within a key region of the former Western Roman Empire after its dissolution and the emergence of a new kingdom. Furthermore, it suggests that Early Medieval elites had the capacity to incorporate individuals from varied backgrounds and that these elites were the result of (political) agency rather than belonging to biologically homogeneous groups.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Les agglomérations dans le monde celtique et ses marges. Nouvelles approches et perspectives de recherche, 2023
C. Thomsen Thörnqvist and J. Toivanen (eds.), "Forms of Representation in the Aristotelian Tradition. Volume 2: Dreaming", 2022
Universal Journal of Accounting and Finance, 2021
Faith in the World: Post-Secular Readings of Hannah Arendt (Berlin & Chicago), 2021
Kitap İncelemesi: "Samet Ağaoğlu, “Kuvayı Milliye Ruhu”, Kaynak Yayınları, İstanbul 1999, 243 sf., İkinci Baskı, ISBN: 975-343-255-0.". Çağdaş Türkiye Tarihi Araştırmaları Dergisi 18 / - (Aralık 2018): 375-381.
Proceedings of the 7th International Conference on Photonics, Optics and Laser Technology, 2019
Experimental Thermal and Fluid Science, 1993
Ecotropicos, 2007
2018
The American Journal of Cardiology, 2012
Schizophrenia Bulletin, 2018
2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM), 2021