πŸ“ž +91-7667918914 | βœ‰οΈ ijarcce@gmail.com
International Journal of Advanced Research in Computer and Communication Engineering
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 1, ISSUE 7, SEPTEMBER 2012

Malicious Data Detection in VANET

Gurpreet Singh, Seema

M.Tech. Student (Computer Engineering)1, Assistant Professor (Computer Engineering) (Supervisor) Yadavindra College of Engineering, Punjabi University Guru Kashi Campus, Talwandi Sabo, Bathinda, Punjab, India.

Abstract: Vehicular networks are becoming wide technology in traffic system. The entities that are part of a vehicular communication system can be private or public vehicles, road-side infrastructure, and authorities, with the latter considered primarily as network entities. Poorly designed VANETs that permit serious attacks on the network can jeopardize the goal of increased driving safety. The unwanted data can disturb the network communication. The wrong information or inject large volume of data can jam the traffic on roads, this type of data is known as malicious data/unsolicited data. Also, the life safety becomes critical and non trusted behaviour of network. Thus the specific characteristics of VANETs result in hard to address security issues, which make the field of secure inter-vehicular communications. Therefore, we have done work on securing VANET and develop a framework for understanding impact of attack. We tried to detect malicious data under VANET environment. In this thesis work, we will present the techniques that have been proposed so far to ensure accurate data transmission between nodes. VANET have configurable no. of nodes and multiple sensors/actuators. Next, To develop a model of all on board sensors based on their past data set. This may be created by using adapting thresholding, Simulate abnormal behaviour in data arrival rate and volume of data arrival. The Proposed work is related to develop simulator with CAN protocol.

Keywords: Malicious data, VANET attacks, CAN, Intrusion Detection.
πŸ‘ 31 views
Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.

How to Cite:

[1] Gurpreet Singh, Seema, β€œMalicious Data Detection in VANET,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE)

Share this Paper