شماره ركورد كنفرانس :
4848
عنوان مقاله :
ارائه يك چارچوب در جهت ارتقا امنيت و كنترل جريان دادهها در شبكههاي اقتضاييVANET با اعمال قواعد معنايي در ارسال داده ها
عنوان به زبان ديگر :
Providing a Framework to Enhance the Security and Control of Data Flow in VANET s Contingency Networks by Applying Semantic Rules on Data Transmission
پديدآورندگان :
Mirshekaari Maliheh mirshekariasal@gmail.com دانشگاه آزاد اسلامي واحد زاهدان; , Hosseinkhani Javad jhkhani@gmail.com دانشگاه آزاد اسلامي واحد زاهدان;
كليدواژه :
Data Flow Control , VANET’s Contingency , Semantic Rules , Security Enhancement
عنوان كنفرانس :
چهارمين كنفرانس ملي فناوري در مهندسي برق، كامپيوتر
چكيده فارسي :
Vehicles in mobile ad-hoc networks are independent systems that are interconnected by wireless communications. Distribution of information between vehicles at long distances in the contingency networks of vehicles is a challenging process, since sharing information, especially when confidential information, such as military applications, always has the risk of exposing information. The previous proposed methods to ensure the security of packets in the contingency networks of vehicles have not used the discussion of data flow control, and their main focus in this area is on methods such as encryption on the message itself. The proposed method in this study, by controlling the flow of data, has improved the security of confidential messages. Another feature of this approach is the ability to confidante the message from the specific subset of network users. All the ad-hocs described are accomplished by connecting the policies to the packages. The mode of operation of the proposed method is that each packet is placed in a specific security class according to the requirements determined by the sender. The policies associated with each packet are added to the packet and the nodes receiving the packet can only operate within the scope of the defined policies for that packet. All of these are managed by four sections. These components must exist on each single node in the network. To evaluate the proposed framework of the NS-2 simulator, two factors were used to check the effectiveness of the proposed policy-based operating protocol using two overhead and latency criteria. Several scenarios are also presented to illustrate the way data flow control is conducted by information producer policies. The results of these ad-hoc studies illustrate the feasibility of the method presented in this research.
چكيده لاتين :
Vehicles in mobile ad-hoc networks are independent systems that are interconnected by wireless communications. Distribution of information between vehicles at long distances in the contingency networks of vehicles is a challenging process, since sharing information, especially when confidential information, such as military applications, always has the risk of exposing information. The previous proposed methods to ensure the security of packets in the contingency networks of vehicles have not used the discussion of data flow control, and their main focus in this area is on methods such as encryption on the message itself. The proposed method in this study, by controlling the flow of data, has improved the security of confidential messages. Another feature of this approach is the ability to confidante the message from the specific subset of network users. All the ad-hocs described are accomplished by connecting the policies to the packages. The mode of operation of the proposed method is that each packet is placed in a specific security class according to the requirements determined by the sender. The policies associated with each packet are added to the packet and the nodes receiving the packet can only operate within the scope of the defined policies for that packet. All of these are managed by four sections. These components must exist on each single node in the network. To evaluate the proposed framework of the NS-2 simulator, two factors were used to check the effectiveness of the proposed policy-based operating protocol using two overhead and latency criteria. Several scenarios are also presented to illustrate the way data flow control is conducted by information producer policies. The results of these ad-hoc studies illustrate the feasibility of the method presented in this research.