Providing a Framework to Enhance the Security and Control of Data Flow in VANET s Contingency Networks by Applying Semantic Rules on Data Transmission

Publish Year: 1397
نوع سند: مقاله کنفرانسی
زبان: English
View: 417

This Paper With 11 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

TECCONF04_045

تاریخ نمایه سازی: 30 شهریور 1398

Abstract:

Vehicles in mobile ad-hoc networks are independent systems that are interconnected by wireless communications. Distribution of information between vehicles at long distances in the contingency networks of vehicles is a challenging process, since sharing information, especially when confidential information, such as military applications, always has the risk of exposing information. The previous proposed methods to ensure the security of packets in the contingency networks of vehicles have not used the discussion of data flow control, and their main focus in this area is on methods such as encryption on the message itself. The proposed method in this study, by controlling the flow of data, has improved the security of confidential messages. Another feature of this approach is the ability to confidante the message from the specific subset of network users. All the ad-hocs described are accomplished by connecting the policies to the packages. The mode of operation of the proposed method is that each packet is placed in a specific security class according to the requirements determined by the sender. The policies associated with each packet are added to the packet and the nodes receiving the packet can only operate within the scope of the defined policies for that packet. All of these are managed by four sections. These components must exist on each single node in the network. To evaluate the proposed framework of the NS-2 simulator, two factors were used to check the effectiveness of the proposed policy-based operating protocol using two overhead and latency criteria. Several scenarios are also presented to illustrate the way data flow control is conducted by information producer policies. The results of these ad-hoc studies illustrate the feasibility of the method presented in this research.

Authors

malihe mirshekari

Department of Computer, Faculty of Engineering, Islamic Azad University, Zahedan Branch,Zahedan, Iran

hosseinkhani

Department of Computer, Faculty of Engineering, Islamic Azad University, Zahedan Branch,Zahedan, Iran