EconPapers    
Economics at your fingertips  
 

An approach to preventing vehicular ad-hoc networks from malicious nodes based on blockchain

Azath M () and Vaishali Singh ()

Review of Computer Engineering Research, 2023, vol. 10, issue 1, 16-27

Abstract: This study presents a revolutionary blockchain-based security mechanism that authenticates vehicles and instantly alerts other vehicles to unlawful messages. Access should only be allowed to authenticated vehicles in order to increase the network security, and access should be restricted or revoked for any vehicles that exhibit inappropriate behaviour. Vehicles linked to the Vehicular Ad Hoc Network (VANET) can share data and take immediate action with the help of adjacent infrastructure devices, like streetlights and traffic signals, as well as with one another. In order to maintain efficiency and safety, an intelligent transportation system depends on the flow of information between vehicles. Intelligent vehicles are vulnerable to hacking attacks because they have numerous technical flaws. A proposed security scheme identifies malicious nodes and detects forged messages, based on multiple factors like sender reputation, time and distance effectiveness. This is accomplished by employing environmental sensory data and authenticating the packets, allowing a vehicle to add numerous blocks to the blockchain. Research has been conducted on the bases of safety protection for vehicle systems as a result of security concerns. When the proposed approach is tested on different vehicle and attacker densities, the results indicate that it has a lower authentication delay and higher communication overhead than the other existing approaches. This study explored various threats from malicious nodes and the techniques in which our proposed methodology handles such attacks.

Keywords: Blockchain; Dynamic vehicular network; Intelligent transportation system Internet of vehicle; Intelligent vehicles; Internet of things sensors; Intrusion detection system; Malicious nodes; Security attacks; Vehicular ad hoc network. (search for similar items in EconPapers)
Date: 2023
References: Add references at CitEc
Citations:

Downloads: (external link)
https://archive.conscientiabeam.com/index.php/76/article/view/3324/7467 (application/pdf)
https://archive.conscientiabeam.com/index.php/76/article/view/3324/7618 (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:pkp:rocere:v:10:y:2023:i:1:p:16-27:id:3324

Access Statistics for this article

More articles in Review of Computer Engineering Research from Conscientia Beam
Bibliographic data for series maintained by Dim Michael ().

 
Page updated 2025-03-19
Handle: RePEc:pkp:rocere:v:10:y:2023:i:1:p:16-27:id:3324