Visible to the public Malicious Vehicles Identifying and Trust Management Algorithm for Enhance the Security in 5G-VANET

TitleMalicious Vehicles Identifying and Trust Management Algorithm for Enhance the Security in 5G-VANET
Publication TypeConference Paper
Year of Publication2020
AuthorsPerarasi, T., Vidhya, S., Moses M., Leeban, Ramya, P.
Conference Name2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA)
Date Publishedjul
KeywordsClustering algorithms, composability, Conferences, digital signature, group public key, group re-cipher key, hash chain, information trust, Interference, Node trust, NOMA, Prediction algorithms, pubcrawl, resilience, Resiliency, Scalability, Secret key, security, Trust Routing, vehicular ad hoc networks
AbstractIn this fifth generation of vehicular communication, the security against various malicious attacks are achieved by using malicious vehicles identification and trust management (MAT) algorithm. Basically, the proposed MAT algorithm performs in two dimensions, they are (i) Node trust and (ii) information trust accompanied with a digital signature and hash chain concept. In node trust, the MAT algorithm introduces the special form of key exchanging algorithm to every members of public group key, and later the vehicles with same target location are formed into cluster. The public group key is common for each participant but everyone maintain their own private key to produce the secret key. The proposed MAT algorithm, convert the secrete key into some unique form that allows the CMs (cluster members) to decipher that secrete key by utilizing their own private key. This key exchanging algorithm is useful to prevent the various attacks, like impersonate attack, man in middle attack, etc. In information trust, the MAT algorithm assigns some special nodes (it has common distance from both vehicles) for monitoring the message forwarding activities as well as routing behavior at particular time. This scheme is useful to predict an exact intruder and after time out the special node has dropped all the information. The proposed MAT algorithm accurately evaluates the trustworthiness of each node as well as information to control different attacks and become efficient for improving a group lifetime, stability of cluster, and vehicles that are located on their target place at correct time.
DOI10.1109/ICIRCA48905.2020.9183184
Citation Keyperarasi_malicious_2020