week 9th

In this 9th week, I have completed the whole of the methodology regarding my project. I stated the methodology in chapter 3

here in this chapter, I have explained about the kind of the data I am going to use in this project.here in this report I am using the secondary data which is related to DoS and DDoS attacks against VANET and autonomous vehicles. An Analysis of detection and preventive methods has been done and the best solution will be recommended. The major challenges while implementing the preventive solutions or identification methods for a certain DoS attack have been discussed with an importance in the conceptual learning.

here in this methodology, I have stated whether ima going to use the simulation techniques or practical implementation.

I clearly mentioned that the data used for this report is secondary data and simulation results are taken from others work

by stating the whole methodology it was stated that

This chapter discussed data collection for the research undertaken. Various scenarios in which DoS and DDoS attacks are launched were discussed. Then, identification and prevention techniques were named. These techniques are explained in detail in the fourth chapter.

I have analyzed the kinds of attacks also from the article namely “IDENTIFICATION OF MALICIOUS VEHICLE IN VANET ENVIRONMENT FROM DDOS ATTACK” written by Ayonija Pathre, Chetan Agrawal, Anurag Jain.

like 1) DoS attack on Vehicle to Vehicle communication

here in this the review can be done as the vehicle is used for the attack on another vehicle

Attacker overwhelming the  node resources:

here in this kind of the attack the attacker overwhelms the node resources and makes vehicle unavailable to perform tasks. it makes the vehicle unable to get work well as it is getting  messages the legitimate nodes

 

blg2

 

2)Jamming the channel in the extended level of Denial of Service attack

this is a kind of attack where the channel is jammed by an attacker

here in    below figure, high-frequency signals are sent to the communication channel, jamming communication occurring between nodes. Nodes in this domain become incapable of sending or receiving messages. Only when the nodes leave that domain do, they become able to send messages to other nodes or receive from them.

blg2

3)DoS attack on Vehicle to Infrastructure communication:

In this attack, a DoS attack is launched to jam the communication channel that exists between vehicles and infrastructure. the main intention in this attack is to jam the communication channel that exists between vehicles and infrastructure. It can be seen in the figure below, in which the   attacker launches a  DoS attack near a Road Side Unit (RSU), which can be also called as infrastructure in vehicular networks. RSU gets very busy as the attacker sends messages continuously, disabling other vehicles  communication with RSU. Continuous messages and verification by RSU halts all other communications, leading to breakdown of the network. Messages do not get delivered to nodes or nodes are not able to receive messages from other nodes, thus, network accessibility  fails

blg3

this is the review and main concept that has grasped from the articles
hope these might be helpful to all
thank you…………..