![]() There are three different types of black holes: supermassive black hole, intermediate mass black hole, and stellar mass black hole. What Are the Different Types of Black Holes? All objects pulled in are subjected to an unimaginable crushing gravitational force as they are pulled toward the super dense end point of the black hole known as the singularity. The gravitational pull of a black hole is so immense that even light is sucked inside. The edge of a black hole is known as the event horizon and once something crosses this point, there is no escape. The density of the star creates a massive gravitational pocket and pulls everything within its vicinity into it. What Would Happen If They Were to Interact?Ī black hole is created when a large star collapses in on itself during a supernova explosion.What Are the Differences Between a Black Hole and a Wormhole?.What Are the Different Types of Wormholes?.What Are the Different Types of Black Holes?.Nandy, T., Noor, M., Bhattacharyya, S., Idris, M.Y.I.B.: T-BCIDS: trust-based collaborative ıntrusion detection system for VANET. In: Industrial Cyber-Physical Systems (ICPS) (2018)Īhmad, F., Kurugollu, F., Adnane, A., Hussain, R., Hussain, F.: MARINE: Man-in-the-middle Attack Resistant trust model IN connEcted vehicles. Krundyshev, V., Kalinin, M., Zegzhda, P.: Artificial swarm algorithm for VANET protection against routing attacks. Taleb, T., Sakhaee, E., Jamalipour, A., Hashimoto, K., Kato, N., Nemoto, Y.: A stable routing protocol to support ITS services in VANET networks. ![]() Ghafoor, K.Z., Mohammed, M.A.: Routing protocols in vehicular ad hoc networks: survey and research challenges. In: 11th IEEE International Conference on Computer and Information Technology, Cyprus (2011) Gaikwad, D.S., Zaveri, M.: A novel mobility model for realistic behavior in vehicular ad hoc networks. In: Proceeding of 2nd Workshop on Next Generation Wireless Networks (2006) Mahajan, A., Potnis, N., Gopalan, K., Wang, A.: Urban mobility models for VANETs. Hao, Y., Cheng, Y., Zhou, C., Song, W.: A distributed key management framework with cooperative message authentication in VANETs. Li, G., Boukhatem, L., Wu, J.: Adaptive quality-of-service based routing for vehicular ad hoc networks with ant colony optimization. Yang, X.-S., Mehmet, K.: Swarm Intelligence and Bio-Inspired Computation (2013) Muhammad, A., Wang, G., Bhuiyan, Z.A., Wang, T., Chen, C.: A survey on security attacks in VANETs: communication, applications and challenges. Mokhtar, B., Azab, M.: Survey on security ıssues in vehicular ad hoc networks. Toor, Y., Muhlethaler, P., Laouiti, A.: Vehicle ad hoc networks: applications and related technical issues. Book on Computer Communication and Networks. Wang, Y., Li, F.: Vehicular ad hoc networks. The performance of previous IDS, attacker and proposed IPS is measure through performance metrics. Simulation results confirm that the proposed IPS scheme with PSO provides better performance in the presence of both attackers in VANET. The main task of the proposed security system is the effective management of vehicles in the presence of an intruder. The traffic data exchange is monitored by RSU to identified malicious actions. In the proposed IPS scheme, vehicles also receive traffic data from the leading vehicles and also forward traffic information to other vehicles. The particle swarm optimization (PSO) confirms the attacker’s presence and delivers effective traffic information. ![]() The IPS algorithm is applied to the RSU to recognize the malicious actions of an attacking vehicle by swarm optimization approach. This paper proposes an intrusion detection and prevention (IPS) scheme to secure vehicle to RSU (V-RSU) communication from malicious (Blackhole) as well as wormhole attack in VANET. The abnormal behavior of the malicious nodes (Blackhole Attacker) and wormhole attacker is recognized by the reliable security mechanism. Attacker vehicles are sending false messages of route information and not accepting traffic status packets or data packets. Vehicles or nodes in Vehicular Ad hoc Network (VANET) are forwarding the traffic information for validation route information.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |