IDEAS home Printed from https://ideas.repec.org/a/pkp/rocere/v10y2023i1p16-27id3324.html
   My bibliography  Save this article

An approach to preventing vehicular ad-hoc networks from malicious nodes based on blockchain

Author

Listed:
  • Azath M
  • Vaishali Singh

Abstract

This study presents a revolutionary blockchain-based security mechanism that authenticates vehicles and instantly alerts other vehicles to unlawful messages. Access should only be allowed to authenticated vehicles in order to increase the network security, and access should be restricted or revoked for any vehicles that exhibit inappropriate behaviour. Vehicles linked to the Vehicular Ad Hoc Network (VANET) can share data and take immediate action with the help of adjacent infrastructure devices, like streetlights and traffic signals, as well as with one another. In order to maintain efficiency and safety, an intelligent transportation system depends on the flow of information between vehicles. Intelligent vehicles are vulnerable to hacking attacks because they have numerous technical flaws. A proposed security scheme identifies malicious nodes and detects forged messages, based on multiple factors like sender reputation, time and distance effectiveness. This is accomplished by employing environmental sensory data and authenticating the packets, allowing a vehicle to add numerous blocks to the blockchain. Research has been conducted on the bases of safety protection for vehicle systems as a result of security concerns. When the proposed approach is tested on different vehicle and attacker densities, the results indicate that it has a lower authentication delay and higher communication overhead than the other existing approaches. This study explored various threats from malicious nodes and the techniques in which our proposed methodology handles such attacks.

Suggested Citation

  • Azath M & Vaishali Singh, 2023. "An approach to preventing vehicular ad-hoc networks from malicious nodes based on blockchain," Review of Computer Engineering Research, Conscientia Beam, vol. 10(1), pages 16-27.
  • Handle: RePEc:pkp:rocere:v:10:y:2023:i:1:p:16-27:id:3324
    as

    Download full text from publisher

    File URL: https://archive.conscientiabeam.com/index.php/76/article/view/3324/7467
    Download Restriction: no

    File URL: https://archive.conscientiabeam.com/index.php/76/article/view/3324/7618
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:pkp:rocere:v:10:y:2023:i:1:p:16-27:id:3324. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Dim Michael (email available below). General contact details of provider: https://archive.conscientiabeam.com/index.php/76/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.