False Node Identification in VANETs for Inmproved Security

Authors

  • John NM Department of Computer Science&Engineering, Mangalam College of Engineering, Kerala, India
  • Kurian SM Department of Computer Science&Engineering, Mangalam College of Engineering, Kerala, India
  • Vijayan VP Department of Computer Science&Engineering, Mangalam College of Engineering, Kerala, India
  • George N Department of Computer Science&Engineering, Mangalam College of Engineering, Kerala, India

Keywords:

F measure, half encryption

Abstract

The best test of vehicular adhoc network is to distinguish the false node in the network. These false node can cause numerous perilous circumstances to the vehicles. The answer for this is the F measure based VANET.F measure bunch the se of hubs into groups and appoint a load to every hub in light of the contention in the network.The most noteworthy clash causing node set will get most elevated weight value and those node set will considered as false in the network. This permits the organization to identify bogus hubs all the more precisely with greatest accuracy and least review. Framework utilizes a half encryption strategy to lessen the time intricacies in the network. This assists with moving alongthe exactness and proficiency of the network

References

[1] Manuel Fogue, Francisco J. Martinez, Member, IEEE, Piedad Garrido, Member, IEEE, “Securing Warning Message Dissemination in VANETs Using Cooperative Neighbor Position Verification”, IEEE transactions on vehicular technology, Vol. 64, Issue . 6, 2015

[2] Zhengming Li, Congyi Liu, and Chunxiao Chigan,” On Secure VANET-Based Ad Dissemination With Pragmatic Cost and Effect Control”, IEEE transactions on intelligent transportation systems, Vol. 14, Issue 1, 2013.

[3] Mina Rahbari and Mohammad Ali Jabreil Jamali,” Efficient Detection of Sybil Attack Based on Cryptography in VANET “,International Journal of Network Security & Its Applications (IJNSA), Vol.3, Issue .6, 2011

[4] Osama Abumansoor, Member, IEEE, and Azzedine Boukerche, Senior Member, IEEE, “A Secure Cooperative Approach for Nonline-of- Sight Location Verification in VANET”, IEEE transactions on vehicular technology, Vol. 61, Issue 1, 2012.

[5] Ming Li, Kai Zeng , Wenjing Lou,” Opportunistic broadcast of event-driven warning messages in Vehicular Ad Hoc Networks with lossy links”, Computer networks, Vol 9, Issue 5, 2011

[6] Soufiene Djahel and Yacine Ghamri-Doudane, “A Robust Congestion Control Scheme for Fast and Reliable Dissemination of Safety Messages in VANETs”, IEEE Wireless Communications and Networking Conference,pp 2264-2269, 2012.

[7] Robert K. Schmidtx, Tim Leinm¨ullerx, Elmar Schoch, “Vehicle Behavior Analysis to Enhance Security in VANETs”, article on telematics and computer networks, 2014

Downloads

Published

2025-11-15

How to Cite

[1]
N. M. John, S. M. Kurian, V. P. Vijayan, and N. George, “False Node Identification in VANETs for Inmproved Security”, Int. J. Comp. Sci. Eng., vol. 6, no. 8, pp. 1028–1032, Nov. 2025.

Issue

Section

Research Article