• No results found

A Survey to Prevent Different Types of Attacks in VANET

N/A
N/A
Protected

Academic year: 2020

Share "A Survey to Prevent Different Types of Attacks in VANET"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

(1)

A Survey to Prevent Different Types of Attacks

in VANET

Pawan Kumar Sharma

Research Scholar

Department of Computer Science & Engineering, SIRT, Bhopal

Sunil Malviya

Assistant Professor Department of Computer Science &

Engineering, SIRT, Bhopal

Yogadhar Pandey

Associate Professor Department of Computer Science &

Engineering, SIRT, Bhopal

Abstract-Vehicular ad hoc networks (VANETs) are usually a future engineering science that is certainly getting impetus in recent years. Which can be why the actual community attracts increasingly more interest from both equally manufacture and academe? Due to minimal data transfer rate of cellular connection method, scalability is often a significant problem. Facts corporate are usually a solution to this kind of. The goal of data collective is to join the particular messages as well as disseminate this specific inwards much larger area. Although performing group integrity from the information is not easily approved along with assaults might be doable. Consequently collective has to be risk-free. However are several studies addressing VANETs, they just don't focus on security troubles especially in data group.

I. INTRODUCTION

generally a special form of cell ad-hoc multilevel(Recently, using the progress within community technological know-how and Wi-Fi marketing communications vehicle ad-hoc multilevel (VANET) is becoming probable. The particular theory aim associated with VANET will be to supply basic safety as well as traffic information to be able to their guests, nevertheless caused by flexibility of men business women as well as wide of the mark using world-wide-web, nowadays the thing would be to provide business as well as documentary film data in order to it is individuals along with people. With America Committed Quick Range Marketing communications (DSRC) [1] regular continues to be designed to help you vehicle marketing and sales communications even though the same may be developed in European countries by the Car2Car Transmission Range [2].Vehicular advertisement-hoc network (VANET), isMANET) through which vehicles behave as cellular nodes of which seeks to

supply marketing and sales communications amid regional autos generally known as entomb vehicle marketing and sales communications(V2V or perhaps IVC) and between motor vehicles and also regional Roadside units as well as RSUs, termed as automobile to help commercial infrastructure communications (V2I as well as RVC). Besides this specific, there may be cross interaction which includes V2V and also V2I [3]. Autos equip using devices named in-aboard unit (OBU) that might consult with various other motor vehicles applying devoted limited stove communication (DSRC). OBUs consult with other OBUs or even RSUs. Transmission is finished between wayside products through feeling stimulated as well as instant networks to be able to spread this announcements in order to more substantial places. Your Rely on power (TA) is often a dependable get together the reason for authenticating motor vehicles and pinpointing A detrimental identity in the event that virtually any question occurs. The approval waiter (Visitors Keeping track of Core) manages devising additionally investigation along with presenting comments towards the RSUs subsequently obtaining the dealings connected facts. Several vehicles are equipped with the monkey resistant device of which provides selected safeguarded operations. Purposes usually are classified while basic safety, transport proficiency in addition to data /amusement applications[4]

(2)

II. SECURE FACTS GROUP

Secure info group is usually a subject matter very well examined throughout sensing unit networks. Even so, because of the range of motion mother nature associated with vehicle adhoc sites in addition to the undeniable fact that nodes shift pursuing distinct routes, the particular sell of radio sensor multilevel safeguarded info collective (SDA) system is not possible inside VANET [5]. Files corporate are already proposed inwards VANETs to be able to solve the particular bandwidth use problem. Corporate approaches could be classified equally syntactical or semantic (Picconi et al.). Syntactic collective shrink or scribe the effects coming from many cars in an attempt to suit the details in a distinctive report as well as framework, electronic some sort of software program in which components A subset of single file as well as brings that for a single report is lowering the first facts. Semantic corporate signifies that info through particular person finite is definitely described, E.gary the gadget guy. a software that will in contrast to delivering the placement of each auto, alone(p) reviews the amount connected with autos from the presumption spot. Besides this, many creators of these studies rich person inked cryptanalytic collective for the signatures along with carts to relieve data transfer. Withal, corporate exacerbates the protection dilemma.

III. FEASIBLE ATTACKS OR PERHAPS ADVERSARIES

The foremost danger for you to VANET group system is definitely fake selective information dispersion [6]. Centering merely inside corporate procedure, these kind of attacks could be achievable [7,8]:

• Making new associated with atomic studies: An attacker train station might forge an original communication in so doing impact farther collective. • Forging of group: An assailant might direct build group using human judgments information and also provide these people into your multilevel.

• Quelling connected with collective: Because of larger facts tariff of collective, adversary programs whitethorn stamp down corporate, ultimately causing one-sided data diffusion.

Nevertheless crushing involving group and making new of atomic accounts influence group techniques, yet the best tone-beginning may be the advent of the entirely false blend, as a result group could move information on arbitrary size along with prices.

IV. TECHNIQUES FOR UNAFRAID INFO CORPORATE

Wischhof et alibi. [9.10] format the (non-ordered) group system, mixing every one of the identified residence to each one preset-time-span street part to a single typical price. On reception, a new guest looks at a good get worse “greater” if it possesses modern timestamp.

Nadeem et alibi. [11] current this Site visitors Check out system with different fixed highway partitioning, which usually uses semantic collective. The objective of Site visitors Survey is always to provide you with the driver of a vehicle along with info concerning targeted traffic along with road disorders. Your perfume with the scheme should be to cod in addition to share site visitors facts between your autos though travel. They present a couple of processes regarding group: relation-centered and also expense-centered. Inside [12], these people utilized data group when using the semantics involving net facts utilizing proportion based mostly process. They concentrate on facts drive connection modeling my spouse and atthe.exchange house elevators a few motor vehicles often by racing along with distributing.

(3)

few sorts of put together signatures: concatenated signature, onion plant touch as well as cross unique. Most of these strategies come in the actual realm of asymmetrical secret writing the reason why they've already created a mechanism named lapping teams and that is relying on symmetric cryptography. They've already explained another program named powerful grouping key formation which can be based on symmetrical cryptography without having shedding the actual non renunciation house involving electronic digital signatures.

In Eichleret alibi. [14] communications support the lymph gland Username, information Identity, as well as a neighborhood No . .Communications are mass after they are actually a comparable content and block No .. Corporate depends on the actual patness from your information along with the variableness on the occasion.

Picconi et al.[15] offer an alternative regarding validating aggregate information simply by subtracting speed in addition to web site data which may be present tense primarily car software. That they pay attention to spoofing and counterfeit details violence. Their option is determined by syntactic corporate, even though it can be suitable to particular circumstances involving semantic group. His or her structures depends upon PKI dependent hallmark and also assume a large number of auto carries a tinker resistant overhaul of which has sure unafraid operations including sign language, time period stamping as well as haphazard amount technology. The primary looked at their option would be to help obstacle the actual collector to provide a explanation you can use to probabilistically verify the actual aggregated document. An aggregative file is finished by simply incorporating and also compression selective information contained on the inside several particular person records. To help corroborate your mass report the particular collector will be asked make use of a aimlessly chosen master agreed upon record.

Saleet et al.[16] provide a location question standard protocol that will group info with VANETs. Your standard protocol splits the street in to sections, plus the lymph node cupboard around the center while using portion plays your forum position. Each and

every automobile occasionally programming it is selective information, along with the host guest makes up keeping these details, aggregating that, after which it broadcast medium this.

Lochert et al. [17] presented A information corporate mechanism intended for examining data in VANET apps. It can be based on probabilistic files mental representation Flajolet-Martin study, which they extend to produce a gentle-talk about different connected with FM drawings where by earlier put aspects perish following their TTL (Occasion for this to call home) possesses out of date, unless of course there actually are refreshed simply by newer paying attention. In their program, many collective for a similar location tend to be combined, giving up an alternative incorporating just about every section of information inwards individuals corporate. On top of that, the idea will allow decrease-flat corporate being reinforced-into a previously existent larger-levels combination when.

Within Catch-In place Yu et al. [18] designed a technique of which assures that reviews are generally aggregate. The primary strategy should be to cut-in A wait just before furtherance a report to another location record hop. I mean the reason why a wonderful solution is unacceptable pertaining to security messaging software nevertheless properly appropriate pertaining to basic visitors details. Into their structure, they will partition the road straight into sectors and also period in supports, the crossing is termed consequence framing. Stories tend to be aggregated if they are within the very same road part and within the same point. Desire to is always to produce any questionnaire reputation by means of acting features just like Greatest extent, MIN, AVG and many others. They will designing any type to establish some good important things about unlike hold up-command guidelines consequently set up a choice sapling to assist car or truck choose a great ideal insurance plan on the view associated with extensive incentives.

(4)

aggregated numerous signatures with each other unique in addition to conduct your order check with the aggregator trademark in a manner that the whole proof period could be diminished. Your planned plan can be capable of doing conditional personal privacy ongoing availability as a result of usage of pseudo-identities in so doing records are certainly not necessary and granny smash is usually appreciably diminished.

Cascade down, Ibrahim as well as Weigle [20] is a bunch-centered accurate syntactical collective plan. It can be a number of main factors, neighborhood survey, extensive survey, data security measures along with data airing that offer a simple yet effective strategy to the condition associated with scalability regarding VANET purposes. Every car occasionally programming its car information to create a main track record. The main data representing motor vehicles ahead of the latest car or truck comprise a new close by look at that's split up into groupings. The primary record will be closed over the master vehicle making use of ECDSA. The certification as part of the figure provides open essential on the finite gestural on the Los Angeles in which is the reason why an assailant can be easily tracked as well as replay episodes are invalidated using the reputation of that time period timestamp through the authorized main document. Every single vehicle regularly compresses and corporate the main documents to use nearby survey directly into a great mass report along with program this for you to nearby autos which provide essentials of vehicles past the area survey, adding to a protracted look at.

Zhu etalii. [21] recommend a aggregated unexpected emergency communication authorization (AEMA) program in order to proficiently formalize the disaster emails with VANETS. The fundamental strategy would be the fact within the urgent situation meaning files sending method, an automobile might take many communications, that's aggregate in a one till you finite air the idea in the community. The particular recommended AEMA scheme usually takes good thing about syntactical along with cryptographic group strategy to lessen the sign charge and also take in portion substantiation solution to reduce the working out cost. To their review, these people blend these signatures in addition to accreditation as well as

utilize portion verification technique to confirm this. That they mostly think about the phony files hypodermic injection assault or perhaps collusion strike.

Zhang etali. [22] introduced the RSU-aided content certification system branded Boost, which are RSU the boss of meaning certification as well as hashes corporate. Than the car must assess if the results came back with the RSU is authentic or perhaps you cannot. This explores thousand-namelessness strategy to conserve end user privacy. That they even more proposed A additional structure named COMET which will beautiful the lack of some sort of RSU. Your plan achieves conditional seclusion availability due to the entry to pseudo-individual along with action replay episode is prevented via timestamping.

The main objective associated with Scheuermann et al. [23] is actually on the minimum amount group requirements intended for scalable dispersion purposes, considering that the dispersion associated with dynamical details coming from numerous options to several destinations is a cardinal concern pertaining to VANET apps. These people prove that will any suited collective program need to reduce the data transfer rate where data pertaining to a part can be shown for the cars and trucks asymptotically quicker when compared with (1/d2). The resources exactly where corporate as well as dissemination data hails from is named way of measuring items in addition to sessions places (pair of motor vehicles that are serious about details from your description point).

(5)

Wasefet alibi. [26] suggested a good combination signatures and also accreditation (ASIC) affirmation scheme which allows every single fomite for you to concurrently affirm your signatures and accreditation from your senders. Considering that every single car could obtain a great number of communications from the border automobiles, one of several unavoidable VANET troubles may be the power per vehicle to be sure that a large number of communications promptly. ASIC importantly lifts the car opportunity to verify many signatures as well as certificates regularly.

Tsai et al.. [3] recommended a good aggregating information dispersion algorithm (Include) within car random networks to lessen the data airing expense. His or her Create algorithmic rule is actually rectify pertaining to virtually every degree circle with different hierarchal gridiron composition. Inwards to each one level mobile, a wayside model can be picked because centre whole and that is to blame for gathering, aggregating as well as comprehending info on the centre whole regarding amphetamine stage. His or her Create protocol may well provide the mass info of assorted inquiry assortment dimension for several question requirements. In line with the criteria the dealings data is definitely aggregated as well as residing in this fringe associated with place as well as users might get your thorough data for under a smaller location along with higher reliability and might acquire compendious files for the huge place together with reduce accuracy and reliability.

Viejo et al. [27] presented the scheme with regard to honest car or truck-made notices mail messages upon VANETs that uses priori measures next to central enemies (vehicles on the VANET giving phony messages). They have applied multiple signatures over a HoleDiffie-Hellman grouping to be able to aggregate notices consequently rock-bottom communication cost. His or her suggestion is appropriate with regard to arrangement in the deterministic (at the any freeway) as well as not for-deterministic (e.g.a town) cases. Pertaining to level of privacy, the actual offered process works on the mechanics to make available unlink potential for the cars. Privacy is realized using pseudonyms.

Dietzeletaliae. [7] present a generic design regarding group that may be suitable to massive amount apps. The structure is like this specific: The listing dimensions indicate the place in addition to moment regarding that a get worse consists of information. The particular values will be the real info along with the meta- selective information has more details utilized to verify combination rightness. Within their security procedure, that they logically go for subset coming from all nuclear reports for getting a great aggregated replication. They have acknowledged a few sorts of episodes: making new of nuclear reports, making new connected with group and stifling involving corporate which the 2d is a vital a single as being the coming involving entirely fictive corporate along with the aggressor pretends this particular fake blend is definitely replicated by a variety of some other cars and so the trustiness can be substantial.

Lochertet alibi. [28] introduce the concept of gentle-express drawings for probabilistic hierarchic data corporate created by Flajolet Martin drawings (FM drawings). Locally saved sketches usually are occasionally broadcasted to the auto one-hop friends and neighbors, which often on wedding reception merges all of them with it is. Previously injected components die off immediately after their TTL possesses run out, unless these include rejuvenated with a new declaration.

Han et al. [29] current a secure probabilistic info group system (SAS) with regard to motor realizing communities, that is based on Flajolet-Martin draw along with a volume of draw substantiation techniques. Additionally they reviewed. the particular tradeoff between data transfer efficiency and the evaluation accuracy and reliability.

(6)

compressed to allow them to follow saved for extended periods regarding liability study.

Molina et al.. [8] savoir-faire the safety condition in VANETs in which ascertains whether or not path targeted visitors data prepared to take a motorist is trustful or otherwise. These people explained 3 geographic zones dependent upon reported celebration: Hazard Zona, Skepticism Area and also Security measures Zona. The actual rationale notion is the fact motor vehicles that go along with the made selective information can indication this mailboat. 2d, to help sabotage that the supply expands forever, signatures ar generated as outlined by some sort of graininess identified with regards to the kind of street as well as which makes it inconceivable on an opponent any supply customization. The thing will be to choose signatures and this can be dispersed from the aggregate place my partner and i.age, packages from boundaries and extra stories through additional places to offer trustworthiness.

Tseng et al. [32] propose to her a new risk-free aggregative communication assay-mark (SAMA) structure in certificateless general public cardinal settings for you to formalise disaster communications with VANETS. Inside their structure, the vehicle works by while using partially non-public essential created through the KGC as well as the individual important chosen because of this to come up with this signatures around the disaster communications. Many people professed that when compared with Zhu et al..’s program the scheme achieves to a greater extent monetary value-powerful assay-mark about crisis messages. Many people secondhand Petrinet from the security measures analysis as well as demonstrated that the recommended system can certainly productively secure forgery assaults and ensure the particular conditional personal privacy ongoing availability and traceability connected with vehicles.

Dietzeletalii. [33, 34] launched the which way for VANET corporate to attain compare as it's needed to properly calculate accuracy, efficiency along with productivity. The product claims to cut back data transfer rate requirements as well as enable scalability. The actual acting approach consists of iii models: the actual architectural mastery design, the knowledge circulation type as well as the group

condition graphical record product. They implement just about every model method of many of the existing collective systems as well as go over the pros and cons you can use pertaining to scheming a more common collective program.

V. PROPOSAL

We can propose to her a good Infected Package Detection Algorithmic program(APDA) employing information collective technique which frequently will use to be able to find the net attacks in vehicular Ad hoc multilevel till you confirmation period. This might lessen this smash delay for processing and also boosts the security in VANET. This kind of offered organization is useful to help the safety of VANET program so as to steer clear of the hold off cost to do business at the begining of time. The particular algorithmic program is often employed prior to confirmation meter delay cost is definitely lessened and will help the security of VANET. We will reap the benefits of this particular recommended protocol regarding numerous broken request send via a number of autos at the same time and also identify the actual assaults during the early approach.

VI. SUMMARY

(7)

cryptographically collective strategies to be able to scale back data transfer and also defines scalability. Most of them employ semantic collective. To avoid action replay episode, timestamps are engaged. Agree to this employing APDA along with data group we might cope with the protection problems.

REFERENCES

[1] J. Nzouonta, N. Rajgure, G. Wang, and C. Borcea, “VANET routing on city roads usingreal-time vehicular traffic information,” IEEE Transactions on Vehicular Technology, vol. 58, no. 7, 2009.

[2] National Institute of Standards and Technology (NIST), “NIST debuts new approach toad hoc networks for first responders,” http://www.itl.nist.gov/breadcrumb2.pdf. Last accessed April 2009.

[3] The National Oceanic and Atmospheric Administration (NOAA), “NOAA unmanned aircraft system,” http://uas.noaa.gov/. Last accessed April 2009.

[4] US Northern Command, “Military airborne imagery supported immediate hurricane recovery efforts,”

http://www.northcom.mil/news/2008/091908I.ht ml. Last accessed April 2009.

[5] “Wireless: The new backseat driver?”

http://news.com.com/2100-11389-5933641.html?tag=tb. Last accessed April 2009. [6] Cars get PCs despite safety concerns,

http://www.postgazette.com/pg/06026/644908 .stm. Last accessed April 2009.

[7] “Chrysler plans in-car web access this year,” http://www.washingtonpost.com/wpdyn/content/ article/2008/03/19/AR2008031903447.html. Last accessed April 2009.

[8] Task 3 Final Report, “Identify intelligent vehicle safety applications enabled by DSRC, DOT HS 809 859,” http://www-nrd.nhtsa.dot.gov/pdf/nrd-12/1665CAMP3web/index.html. Last accessed April 2009.

[9] S. Dashtinezhad, T. Nadeem, B. Dorohonceanu, C. Borcea, P. Kang, and L. Iftode, “Trafficview: A driver assistant device for traffic monitoring based on car-tocar communication,” in Proceedings 59th IEEE Semiannual Vehicular Technology Conference, Milan, Italy, May 2004, pp. 2946–2950.

[10] P. Zhou, T. Nadeem, P. Kang, C. Borcea, and L. Iftode, “EZCab: A Cab Booking Application using Short-range Wireless Communication,” in Proceedings 3rd IEEE international Conference on Pervasive Computing and Communications

(PERCOM), Kauai Island, HI, USA, March 2005, pp. 27–38.

[11] O. Riva, T. Nadeem, C. Borcea, and L. Iftode, “Context-aware migratory services in ad-hocnetworks,” IEEE Transactions on Mobile Computing, vol. 6, no. 12, pp. 1313–1328, December 2007.

[12] H. Luo, R. Ramjee, P. Sinha, L. Li, and S. Lu, “UCAN: a unified cellular and ad-hoc network architecture,” in Proceedings 9th Annual International Conference on Mobile Computing and Networking (MOBICOM), San Diego, CA, USA, September 2003, pp.353–367.

[13] J. Nzouonta and C. Borcea, “STEID: A protocol for emergency information. Disseminationin vehicular networks,” Technical Report, Computer Science Department, NJIT, December 2006,http://www.cs.njit.edu/borcea/papers/steid. pdf. Last accessed April 2009.

[14] CDMA Development Group, “3G - CDMA2000 1xEV-DOTechnologies,”

http://www.cdg.org/technology/3g1xEV-DO.asp. Last accessed April 2009.

[15] “Edge introduction of high-speed data in gsm/gprsnetworks,”http://www.ericsson.com/sol utions/tems/library/tech papers/tech related/edge wp technical.pdf. Last accessed April 2009. [16] Autonet Mobile, http://www.autonetmobile.com.

Last accessed April 2009.

[17] E. C. Baig, “Autonet car-based wi-fi system was neatbutabitbumpy,”http://www.usatoday.com/tec h/columnist/edwardbaig/2008-10-29-baig-autonetreviewN.htm. Last accessed April 2009. [18] CarTel, MIT, http://cartel.csail.mit.edu.

[19] O. Riva, J. Nzouonta, and C. Borcea, “Context-aware fault tolerance in migratory services,” in Proceedings 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous), Dublin, Ireland, July 2008. [20] Q. Sun, S. Y. Tan, and K. C. Teh, “Analytical

formulae for path loss prediction in urban street grid microcellular environments,” IEEE Transactions on Vehicular Technology,vol. 54, no. 4, pp. 1251–1258, July 2005.

[21] X. Zhao, T. Rautiainen, K. Kalliola, and P. Vainikainen, “Path-loss models for urbanmicrocells at 5.3 ghz,” IEEE Antennas and Wireless Propagation Letters, vol. 5, pp.152– 154, April 2006.

(8)

[23] V. Naumov and T. Gross, “Connectivity-aware routing (CAR) in vehicular adhoc networks,” in Proceedings IEEE International Conference on Computer Communications, Anchorage, AK, USA, May 2007, pp. 1919–1927.

[24] C. E. Perkins and E. M. Royer, “Ad hoc on-demand distance vector routing,” in Proceedings2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, USA, February 1999, pp. 90–100. [25] D. B. Johnson and D. A. Maltz, “Dynamic

source routing in ad hoc wireless networks,”Mobile Computing, vol. 353, no. 5, pp. 153–161, 1996.

[26] B. Karp and H. T. Kung, “GPSR: greedy perimeter stateless routing for wireless networks,”in Proceedings 6th International Conference on Mobile Computing and Networking, Boston, MA, USA, August 2000, pp. 243–254.

[27] T. V. Lakshman, A. Neidhardt, and T. Ott, “The drop from front strategy in TCP and TCP over ATM,” in Proceedings IEEE International Conference on Computer Communications (INFOCOM), Los Angeles, CA, USA, March 1996, pp. 1242–1250.

[28] S. Floyd and V. Jacobson, “Random early detection gateways for congestion avoidance,”IEEE/ACM Transactions on Networking, vol. 1, no. 4, pp. 397–413, August 1993.

[29] J. Nzouonta, T. Ott, and C. Borcea, “Impact of queue disciplines on congestion in wirelessad hoc networks,” November 2008, Submitted to Elsevier Performance Evaluation.

[30] C. E. Perkins and P. Bhagwat, “Highly dynamic destination-sequenced distance vectorrouting (DSDV) for mobile computers,” in Proceedings ACM Conference on Communications Architectures, Protocols and Applications, London, United Kingdom, September 1994, pp. 234–244.

[31] V. Namboodiri and L. Gao, “Prediction-based routing for vehicular ad hoc networks,” IEEETransactions on Vehicular Technology, vol. 56, no. 4, pp. 2332–2345, July 2007.

[32] T. Taleb, E. Sakhaee, A. Jamalipour, K. Hashimoto, N. Kato, and Y. Nemoto, “A stablerouting protocol to support ITS services in VANET networks,” IEEE Transactions on Vehicular Technology, vol. 56, no. 6, pp. 3337– 3347, November 2007.

[33] P. Bose, P. Morin, I. Stojmenovic, and J. Urrutia, “Routing with guaranteed delivery inad hoc wireless networks,” ACM Wireless Networks, vol. 7, no. 6, pp. 609–616, November 2001.

References

Related documents

Methods and materials: In this study, 11 eyes of 11 patients affected by pseudophakic cystoid macular edema refractory to med- ical treatment were treated with a single

around the transition temperature. This is a typical behavior characteristic of SG materials suggesting the formation of the SG state in Pr 2 CuIn 3. Ac susceptibility technique is

This study concludes that although roller bar-type computer input devices require less muscular effort, their design may produce indirect unnecessary muscular tension

c+c%+c'ccc#c c Œou shouldn¶t go to India without visiting the ajMahal.c Oo deberías ir a la India sin visitar el TajGahal.c I¶minterested in studyingpsychology.c!c@stoy interesado

To cite this article: Jasper Eshuis & Lasse Gerrits (2019): The limited transformational power of adaptive governance: a study of institutionalization and materialization

[r]

■ Stop the engine, disconnect the spark plug wire, wait until the blade comes to a complete stop, and allow the product to cool down for the following cases:.. ● whenever you

The empirical investigation using both the partial correlation and regression analysis revealed that liquidity ratios measure by current ratio (CR), Liquid ratio (LR) and