Main Reference PaperVehicular Security Through Reputation and Plausibility Checks, IEEE Systems Journal, June 2014
  • It employs sensors in a reputation-based system and presents a very robust yet cost efficient approach as it utilizes just vehicle to vehicle communication, thereby reducing the security issues and cost associated with the roadside infrastructure. The algorithm has been simulated and tested on various scenarios and has been observed to be very effective and efficient in terms of the percentage of malicious nodes detected, number of control packets sent after detection of malicious nodes, average time taken to detect nodes which are generating false information, number of packets dropped, and the number of packets received by malicious nodes.

+ Description
  • It employs sensors in a reputation-based system and presents a very robust yet cost efficient approach as it utilizes just vehicle to vehicle communication, thereby reducing the security issues and cost associated with the roadside infrastructure. The algorithm has been simulated and tested on various scenarios and has been observed to be very effective and efficient in terms of the percentage of malicious nodes detected, number of control packets sent after detection of malicious nodes, average time taken to detect nodes which are generating false information, number of packets dropped, and the number of packets received by malicious nodes.

  • To presents a very robust yet cost efficient approach in VANET, by utilizing the sensors in a reputation-based system

  • To eliminates attacks pertaining to false event generation completely by utilizing the plausibility of data collected through sensors as well as the trust value of the sending nodes

  • To reduce the control overheads, the proposed work, forwards the information intelligently instead of forwarding in a brute force manner

+ Aim & Objectives
  • To presents a very robust yet cost efficient approach in VANET, by utilizing the sensors in a reputation-based system

  • To eliminates attacks pertaining to false event generation completely by utilizing the plausibility of data collected through sensors as well as the trust value of the sending nodes

  • To reduce the control overheads, the proposed work, forwards the information intelligently instead of forwarding in a brute force manner

  • Reputation value based on mobility is contributed through Vehicular Security Reputation which is apply to highly stable greedy forwarding distance between destination and highly stable neighbors are calculated. The neighbor which is having the minimum distance is selected as forwarder and its reputation value is increased.

+ Contribution
  • Reputation value based on mobility is contributed through Vehicular Security Reputation which is apply to highly stable greedy forwarding distance between destination and highly stable neighbors are calculated. The neighbor which is having the minimum distance is selected as forwarder and its reputation value is increased.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, SUMO & MOVE, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, SUMO & MOVE, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.