SlideShare a Scribd company logo
Using the Grades Mechanism to
Differentiate the Users in
Vehicular Ad hoc Network (VANET)
Dr I.A.Sumra
 End user is the key module of a future vehicular
network and safety and non safety applications
mostly focuses on the user’s safety and comfortable
during the journey.
 Security of these applications are very significant
and these life saving messages cannot be altered by
any attacker.
 In this slide, the role of the end user in a vehicular
network will be discussed in detail and three levels
of trust grades for users will be proposed.
 It is necessary for secure vehicular communication
that the user’s role in the network should be in a
positive direction, and other users should take more
benefits from this new future technology.
2
 Vehicular ad-hoc network is a special kind of network in which nodes
(Vehicles) can communicate with each other on the road and with its
Infrastructure.
3
 Safety Applications
 Non Safety Applications
Work
in Progress
Plz! use Alt.
route
Work Zone
Warning:!!!
Work Zone
Warning:!!!
Shopping MALL
Parking Slot
Available!!!
RSU Parking Slot
Available!!!
4
 Role of end user is most important in VANET and
objective of VANET applications to serve the users
and reduces the death rate due to road accident.
Car manufacturers provide smart vehicles while
government agencies provide the basic
infrastructure needed to implement applications
and serve the users.
 VANET applications and smart vehicles are major
modules and users directly communicate with them
and send and receive safety and non safety
messages.
5
6
 User is the main entity in vehicular work and objective of
this new technology is to serve users and safe their lives
from road accidents.
 Safety and non safety VANET applications meet the all
users requirement during their journey like send or receive
safety message to other vehicles and use the
entertainment services.
7
8
9
Resources
Outsider Insider
Coverage Area
Technical
Expertise
 Users are important entities in a network and the purpose of
VANET applications to serve the end user and provide safety
on the highway.
 Applications serve the end users when these applications are
secured and user should be trusted, otherwise these
applications create more problems for users of the network.
 Good or bad user always remains part of the network and it is
difficult to predict his/her behavior on the road due to the
dynamic topology of the network.
 Therefore, trust grades for vehicular users have been
proposed and objective of these grades to differentiate
between good users and malicious users in a network. The
Figure.3 shows the Trust grades for End Users.
10
11
 Zero Trusted User (ZTU) (Attackers) – Trust Grade (0)
 Zero Trusted Users (ZTUs) are those users that do not possess
the trusted credentials and could potentially be the kind of
attackers who create problems for legitimate users by
launching some type of attack.
 In the vehicular network, their role is more prominent
because they can potentially change the life critical
information on the road. All types of attackers which we have
discussed in related work is also considered in zero trusted
users.
12
Zero Trusted Users (ZTUs)-
[Trust Grade-0]
13
 These people are not attackers, but their behavior indirectly
effects the main functionality of network. These are the factors
that change the behavior of the users and assign weak trusted
users.
 The Figure 6 describes weak users’ type and we have assigned
the one grade to these types of users.
Weak Trusted User (WTU) –
[Trust Grade-1]
14
 Strong Trusted Users (STUs) are those people who perform their tasks properly and
achieve the security requirements in the network.
 Security requirements are important factor for all components of vehicular
network, so every module should be secured and work properly to serve the users.
Applications and other modules should be fulfilling the maximum levels of security
requirements.
Strong Trusted User (STU) –
[Trust Grade-2]
15
 End users require more safety on the road in future
vehicular networks and this could be possible by the
successful implementing of VANET in real environment with
its potential applications.
 Vehicular applications must be secured; if non-trusted
users (attackers) change the content of safety applications
then other users are directly effected.
 Attackers change their attacking behavior and they launch
different attacks at different times.
 The proposed trust grades of attackers are expected to be
helpful to identify and understand the behavior of
different types of users.
 The Implementation of this future human life saving
network could be easy if users play their positive roles and
make secure communications.
16
 This is journal research paper and please
download complete research paper from
research gate.
17
18

More Related Content

PPT
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
Dr.Irshad Ahmed Sumra
 
PPT
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Dr.Irshad Ahmed Sumra
 
PPT
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Dr.Irshad Ahmed Sumra
 
PPT
Using Computing Methods to Secure VANET
Dr.Irshad Ahmed Sumra
 
PPT
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Dr.Irshad Ahmed Sumra
 
PPT
Security issues and challenges in MANET,VANET and FANET: A Survey
Dr.Irshad Ahmed Sumra
 
PDF
Security attacks and solutions in vehicular ad hoc networks a survey
pijans
 
PPT
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Dr.Irshad Ahmed Sumra
 
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
Dr.Irshad Ahmed Sumra
 
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Dr.Irshad Ahmed Sumra
 
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Dr.Irshad Ahmed Sumra
 
Using Computing Methods to Secure VANET
Dr.Irshad Ahmed Sumra
 
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Dr.Irshad Ahmed Sumra
 
Security issues and challenges in MANET,VANET and FANET: A Survey
Dr.Irshad Ahmed Sumra
 
Security attacks and solutions in vehicular ad hoc networks a survey
pijans
 
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Dr.Irshad Ahmed Sumra
 

What's hot (19)

PDF
VANET SECURITY AND PRIVACY – AN OVERVIEW
IJNSA Journal
 
PDF
VANET SECURITY AND PRIVACY – AN OVERVIEW
IJNSA Journal
 
PDF
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
Editor IJCATR
 
PPT
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
Dr.Irshad Ahmed Sumra
 
PDF
SURVEY ON SECURE ROUTING IN VANETS
IJNSA Journal
 
PDF
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
Editor IJCATR
 
PPT
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Dr.Irshad Ahmed Sumra
 
PDF
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET Journal
 
PDF
Security issues and solutions in vehicular adhoc network a review approach
csandit
 
PDF
F0332838
iosrjournals
 
PPTX
VANET
Pranav Gontalwar
 
PDF
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANET
IJNSA Journal
 
PPT
[Ppt] Survey Of Vehicular Network Security
Lim Jung
 
PDF
A REVIEW ON SYBIL ATTACK DETECTION TECHNIQUES
Journal For Research
 
PDF
Master Thesis on Vehicular Ad-hoc Network (VANET)
Prof Ansari
 
PDF
VANET for Security using Cryptography
Pallavi Agarwal
 
PDF
Ktr an efficient key management scheme for secure data access control in wire...
ambitlick
 
PDF
Security and Trust Management in VANET
Pallavi Agarwal
 
PDF
Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Atta...
Innopolis University
 
VANET SECURITY AND PRIVACY – AN OVERVIEW
IJNSA Journal
 
VANET SECURITY AND PRIVACY – AN OVERVIEW
IJNSA Journal
 
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
Editor IJCATR
 
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
Dr.Irshad Ahmed Sumra
 
SURVEY ON SECURE ROUTING IN VANETS
IJNSA Journal
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
Editor IJCATR
 
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Dr.Irshad Ahmed Sumra
 
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET Journal
 
Security issues and solutions in vehicular adhoc network a review approach
csandit
 
F0332838
iosrjournals
 
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANET
IJNSA Journal
 
[Ppt] Survey Of Vehicular Network Security
Lim Jung
 
A REVIEW ON SYBIL ATTACK DETECTION TECHNIQUES
Journal For Research
 
Master Thesis on Vehicular Ad-hoc Network (VANET)
Prof Ansari
 
VANET for Security using Cryptography
Pallavi Agarwal
 
Ktr an efficient key management scheme for secure data access control in wire...
ambitlick
 
Security and Trust Management in VANET
Pallavi Agarwal
 
Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Atta...
Innopolis University
 
Ad

Similar to Using the grades mechanism to differentiate the users in VANET (20)

PPT
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Dr.Irshad Ahmed Sumra
 
PPT
VANET Applications and User Requirement
Dr.Irshad Ahmed Sumra
 
PPT
Trust and Trusted Computing in VANET
Dr.Irshad Ahmed Sumra
 
PDF
Security Requirements for IVC Network
IRJET Journal
 
PPT
Forming Vehicular Web of Trust in VANET
Dr.Irshad Ahmed Sumra
 
PDF
Trustworthy Service Enhancement in Mobile Social Network
ijsrd.com
 
PPT
Classes of Attacks in VANET
Dr.Irshad Ahmed Sumra
 
PDF
SURVEY ON SECURE ROUTING IN VANETS
IJNSA Journal
 
PDF
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
IRJET Journal
 
PDF
Review of authentication techniques for wireless networks & manet
eSAT Journals
 
PPT
Trusted Computing in VANET
Dr.Irshad Ahmed Sumra
 
PDF
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
IJNSA Journal
 
PDF
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
IJNSA Journal
 
PDF
IRJET- Root Security Firewall
IRJET Journal
 
PDF
IRJET- Root Security Firewall
IRJET Journal
 
PDF
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
IJERA Editor
 
PDF
VANET SECURITY AND PRIVACY – AN OVERVIEW
IJNSA Journal
 
PDF
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
Editor IJCATR
 
PPT
Comparative study of security hardware modules in VANET
Dr.Irshad Ahmed Sumra
 
PDF
Review Paper on VANET
Pallavi Agarwal
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Dr.Irshad Ahmed Sumra
 
VANET Applications and User Requirement
Dr.Irshad Ahmed Sumra
 
Trust and Trusted Computing in VANET
Dr.Irshad Ahmed Sumra
 
Security Requirements for IVC Network
IRJET Journal
 
Forming Vehicular Web of Trust in VANET
Dr.Irshad Ahmed Sumra
 
Trustworthy Service Enhancement in Mobile Social Network
ijsrd.com
 
Classes of Attacks in VANET
Dr.Irshad Ahmed Sumra
 
SURVEY ON SECURE ROUTING IN VANETS
IJNSA Journal
 
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
IRJET Journal
 
Review of authentication techniques for wireless networks & manet
eSAT Journals
 
Trusted Computing in VANET
Dr.Irshad Ahmed Sumra
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
IJNSA Journal
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
IJNSA Journal
 
IRJET- Root Security Firewall
IRJET Journal
 
IRJET- Root Security Firewall
IRJET Journal
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
IJERA Editor
 
VANET SECURITY AND PRIVACY – AN OVERVIEW
IJNSA Journal
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
Editor IJCATR
 
Comparative study of security hardware modules in VANET
Dr.Irshad Ahmed Sumra
 
Review Paper on VANET
Pallavi Agarwal
 
Ad

More from Dr.Irshad Ahmed Sumra (20)

PPTX
Basic Concept of Smart Healthcare System
Dr.Irshad Ahmed Sumra
 
PPTX
Introduction to Smart Vehicles and its Working
Dr.Irshad Ahmed Sumra
 
PPTX
Introduction to Artificial Intelligence (AI)(AI) and its Applications
Dr.Irshad Ahmed Sumra
 
PPTX
Basic concept of Digital Logic Design and its working
Dr.Irshad Ahmed Sumra
 
PPTX
Basic concept of Data-Science and its Applications
Dr.Irshad Ahmed Sumra
 
PPTX
Basic concept of Data-Mining and it Applications
Dr.Irshad Ahmed Sumra
 
PPTX
The Transformative Power of AI in Biomedical Science
Dr.Irshad Ahmed Sumra
 
PPTX
AI-in-Public-Health-A-New-Era-of-Precision-and-Equity
Dr.Irshad Ahmed Sumra
 
PPTX
Artificial Intelligence(AI) in Petroleum-Engineering.pptx
Dr.Irshad Ahmed Sumra
 
PPTX
Artificial Intelligence(AI) in Nuclear-Engineering.pptx
Dr.Irshad Ahmed Sumra
 
PPTX
Artificial Intelligence(AI) in Molecular-Life-Science
Dr.Irshad Ahmed Sumra
 
PPTX
Role of Artificial Intelligence(AI) in Mechanical Engineering
Dr.Irshad Ahmed Sumra
 
PPTX
AI Applications:AI-in-Electrical-Engineering
Dr.Irshad Ahmed Sumra
 
PPTX
AI application: AI in Earth Science and Future Trends
Dr.Irshad Ahmed Sumra
 
PPTX
AI in Civil Engineering and Future Trends
Dr.Irshad Ahmed Sumra
 
PPTX
AI in Aerospace Engineering science and AI future Trends
Dr.Irshad Ahmed Sumra
 
PPTX
Basic concept of Virtual-Reality and its Applications
Dr.Irshad Ahmed Sumra
 
PPTX
Basic Concept of VANET-Security-Challenges-and-Solutions
Dr.Irshad Ahmed Sumra
 
PPTX
Basic concept of Outcome-Based-Education-OBE and Key Features
Dr.Irshad Ahmed Sumra
 
PPTX
Basic Concept of Image-Processing and its Applications
Dr.Irshad Ahmed Sumra
 
Basic Concept of Smart Healthcare System
Dr.Irshad Ahmed Sumra
 
Introduction to Smart Vehicles and its Working
Dr.Irshad Ahmed Sumra
 
Introduction to Artificial Intelligence (AI)(AI) and its Applications
Dr.Irshad Ahmed Sumra
 
Basic concept of Digital Logic Design and its working
Dr.Irshad Ahmed Sumra
 
Basic concept of Data-Science and its Applications
Dr.Irshad Ahmed Sumra
 
Basic concept of Data-Mining and it Applications
Dr.Irshad Ahmed Sumra
 
The Transformative Power of AI in Biomedical Science
Dr.Irshad Ahmed Sumra
 
AI-in-Public-Health-A-New-Era-of-Precision-and-Equity
Dr.Irshad Ahmed Sumra
 
Artificial Intelligence(AI) in Petroleum-Engineering.pptx
Dr.Irshad Ahmed Sumra
 
Artificial Intelligence(AI) in Nuclear-Engineering.pptx
Dr.Irshad Ahmed Sumra
 
Artificial Intelligence(AI) in Molecular-Life-Science
Dr.Irshad Ahmed Sumra
 
Role of Artificial Intelligence(AI) in Mechanical Engineering
Dr.Irshad Ahmed Sumra
 
AI Applications:AI-in-Electrical-Engineering
Dr.Irshad Ahmed Sumra
 
AI application: AI in Earth Science and Future Trends
Dr.Irshad Ahmed Sumra
 
AI in Civil Engineering and Future Trends
Dr.Irshad Ahmed Sumra
 
AI in Aerospace Engineering science and AI future Trends
Dr.Irshad Ahmed Sumra
 
Basic concept of Virtual-Reality and its Applications
Dr.Irshad Ahmed Sumra
 
Basic Concept of VANET-Security-Challenges-and-Solutions
Dr.Irshad Ahmed Sumra
 
Basic concept of Outcome-Based-Education-OBE and Key Features
Dr.Irshad Ahmed Sumra
 
Basic Concept of Image-Processing and its Applications
Dr.Irshad Ahmed Sumra
 

Recently uploaded (20)

PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 

Using the grades mechanism to differentiate the users in VANET

  • 1. Using the Grades Mechanism to Differentiate the Users in Vehicular Ad hoc Network (VANET) Dr I.A.Sumra
  • 2.  End user is the key module of a future vehicular network and safety and non safety applications mostly focuses on the user’s safety and comfortable during the journey.  Security of these applications are very significant and these life saving messages cannot be altered by any attacker.  In this slide, the role of the end user in a vehicular network will be discussed in detail and three levels of trust grades for users will be proposed.  It is necessary for secure vehicular communication that the user’s role in the network should be in a positive direction, and other users should take more benefits from this new future technology. 2
  • 3.  Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure. 3
  • 4.  Safety Applications  Non Safety Applications Work in Progress Plz! use Alt. route Work Zone Warning:!!! Work Zone Warning:!!! Shopping MALL Parking Slot Available!!! RSU Parking Slot Available!!! 4
  • 5.  Role of end user is most important in VANET and objective of VANET applications to serve the users and reduces the death rate due to road accident. Car manufacturers provide smart vehicles while government agencies provide the basic infrastructure needed to implement applications and serve the users.  VANET applications and smart vehicles are major modules and users directly communicate with them and send and receive safety and non safety messages. 5
  • 6. 6
  • 7.  User is the main entity in vehicular work and objective of this new technology is to serve users and safe their lives from road accidents.  Safety and non safety VANET applications meet the all users requirement during their journey like send or receive safety message to other vehicles and use the entertainment services. 7
  • 8. 8
  • 10.  Users are important entities in a network and the purpose of VANET applications to serve the end user and provide safety on the highway.  Applications serve the end users when these applications are secured and user should be trusted, otherwise these applications create more problems for users of the network.  Good or bad user always remains part of the network and it is difficult to predict his/her behavior on the road due to the dynamic topology of the network.  Therefore, trust grades for vehicular users have been proposed and objective of these grades to differentiate between good users and malicious users in a network. The Figure.3 shows the Trust grades for End Users. 10
  • 11. 11
  • 12.  Zero Trusted User (ZTU) (Attackers) – Trust Grade (0)  Zero Trusted Users (ZTUs) are those users that do not possess the trusted credentials and could potentially be the kind of attackers who create problems for legitimate users by launching some type of attack.  In the vehicular network, their role is more prominent because they can potentially change the life critical information on the road. All types of attackers which we have discussed in related work is also considered in zero trusted users. 12
  • 13. Zero Trusted Users (ZTUs)- [Trust Grade-0] 13
  • 14.  These people are not attackers, but their behavior indirectly effects the main functionality of network. These are the factors that change the behavior of the users and assign weak trusted users.  The Figure 6 describes weak users’ type and we have assigned the one grade to these types of users. Weak Trusted User (WTU) – [Trust Grade-1] 14
  • 15.  Strong Trusted Users (STUs) are those people who perform their tasks properly and achieve the security requirements in the network.  Security requirements are important factor for all components of vehicular network, so every module should be secured and work properly to serve the users. Applications and other modules should be fulfilling the maximum levels of security requirements. Strong Trusted User (STU) – [Trust Grade-2] 15
  • 16.  End users require more safety on the road in future vehicular networks and this could be possible by the successful implementing of VANET in real environment with its potential applications.  Vehicular applications must be secured; if non-trusted users (attackers) change the content of safety applications then other users are directly effected.  Attackers change their attacking behavior and they launch different attacks at different times.  The proposed trust grades of attackers are expected to be helpful to identify and understand the behavior of different types of users.  The Implementation of this future human life saving network could be easy if users play their positive roles and make secure communications. 16
  • 17.  This is journal research paper and please download complete research paper from research gate. 17
  • 18. 18