CIVILICA We Respect the Science
(ناشر تخصصی کنفرانسهای کشور / شماره مجوز انتشارات از وزارت فرهنگ و ارشاد اسلامی: ۸۹۷۱)

Providing a Framework to Enhance the Security and Control of Data Flow in VANET s Contingency Networks by Applying Semantic Rules on Data Transmission

عنوان مقاله: Providing a Framework to Enhance the Security and Control of Data Flow in VANET s Contingency Networks by Applying Semantic Rules on Data Transmission
شناسه ملی مقاله: TECCONF04_045
منتشر شده در چهارمین کنفرانس ملی فناوری در مهندسی برق، کامپیوتر در سال 1397
مشخصات نویسندگان مقاله:

malihe mirshekari - Department of Computer, Faculty of Engineering, Islamic Azad University, Zahedan Branch,Zahedan, Iran
hosseinkhani - Department of Computer, Faculty of Engineering, Islamic Azad University, Zahedan Branch,Zahedan, Iran

خلاصه مقاله:
Vehicles in mobile ad-hoc networks are independent systems that are interconnected by wireless communications. Distribution of information between vehicles at long distances in the contingency networks of vehicles is a challenging process, since sharing information, especially when confidential information, such as military applications, always has the risk of exposing information. The previous proposed methods to ensure the security of packets in the contingency networks of vehicles have not used the discussion of data flow control, and their main focus in this area is on methods such as encryption on the message itself. The proposed method in this study, by controlling the flow of data, has improved the security of confidential messages. Another feature of this approach is the ability to confidante the message from the specific subset of network users. All the ad-hocs described are accomplished by connecting the policies to the packages. The mode of operation of the proposed method is that each packet is placed in a specific security class according to the requirements determined by the sender. The policies associated with each packet are added to the packet and the nodes receiving the packet can only operate within the scope of the defined policies for that packet. All of these are managed by four sections. These components must exist on each single node in the network. To evaluate the proposed framework of the NS-2 simulator, two factors were used to check the effectiveness of the proposed policy-based operating protocol using two overhead and latency criteria. Several scenarios are also presented to illustrate the way data flow control is conducted by information producer policies. The results of these ad-hoc studies illustrate the feasibility of the method presented in this research.

کلمات کلیدی:
Data Flow Control, VANET’s Contingency, Semantic Rules, Security Enhancement

صفحه اختصاصی مقاله و دریافت فایل کامل: https://civilica.com/doc/928891/