Malicious node identification routing and protection mechanism for VANET against various attack

Authors

  • Er. Ritika Saini M.Tech Student, Computer Science Engineering Department, Punjab Technical University Rayat Institute of Engineering & Information Technology, Ropar, India
  • Harish Kundra Punjab Technical University, Rayat Institute of Engineering & Information Technology, Ropar, India,

DOI:

https://doi.org/10.24297/ijct.v20i.8852

Keywords:

OBU (On-board units)., Access Point, RSU (Road side unit), MANET (Mobile ad hoc network), VANET (Vehicular ad hoc network)

Abstract

With the help of road side unit vehicles communicate among themselves. This technique termed as VANET. This network helps us to improve the safety and efficiency of the occupants during travelling in vehicles. The basic idea of this technique is to send information about the traffic information to the road side unit or other vehicles. These vehicles get safe from attacks and misuse of their private data. The objective of this paper to secure the communication among the vehicles and the road side unit. In this technique the communication mainly dependant on the safety of the road such as vehicles tracking, emergency situations and message monitoring. There are various attacks like Sybil and Gray hole attack are vulnerable to VANET. To protect from these attacks our technique provide malicious node identification mechanism that help us to provide better facility to send data to vehicles safely. To avoid these types of attacks, our propose technique include feature like key management system to prevent the communication among the vehicles. Our proposed system mostly focus on Bandwidth, packet loss and packet delivery ratio [12].

Downloads

Download data is not yet available.

Author Biography

Harish Kundra, Punjab Technical University, Rayat Institute of Engineering & Information Technology, Ropar, India,

Hod (CSE) Computer Science Engineering Department,

References

. Raya, M., & Hubaux, J. P. “Securing vehicular ad hoc networks”, Journal of Computer Security, 15(1), pp.39-68, 2007.

. Iqbal, S., Chowdhury, S. R., Hyder, C. S., Vasilakos, A. V., & Wang, C. X. “ Vehicular communication: protocol design, test bed implementation and performance analysis”, In Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly , pp. 410-415, 2009.

. Verma Swati Bhawna Mallick Verma Poonam, “Impact of Gray Hole Attack in V ANET”, 1st International Conference on Next Generation Computing Technologies (NGCT-2015) Dehradun, India, 4-5 September 2015.

. Onkar V.chandure and Gaikwad V T. Article: Detection & Prevention of Gray Hole Attack in Mobile Ad-Hoc Network using AODV Routing Protocol. International Journal of Computer Applications 41(5):27-32, March 2012.

. Chang, S., Qi, Y., Zhu, H., Zhao, J., & Shen, X. “Footprint: Detecting sybil attacks in urban vehicular networks”, IEEE sponsored Parallel and Distributed Systems, IEEE Transactions on, 23(6), pp.1103-1114, 2011.

. Zhou Tong, Roy Romit Choudhury, Peng Ning, and Krishnendu Chakrabarty, “P2 DAP –Sybil Attacks Detection in Vehicular Ad Hoc Networks”, IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 3, MARCH 2011.

. Lee, B., Jeong, E., & Jung, I. “A DTSA (Detection Technique against a Sybil Attack) Protocol using SKC (Session Key based Certificate) on VANET”, International Journal of Security & Its Applications, 7(3), pp.1-10, 2013.

. Li, M., Xiong, Y., Wu, X., Zhou, X., Sun, Y., Chen, S., & Zhu, X.” A Regional Statistics Detection Scheme against Sybil Attacks in WSNs”, IEEE Sponsored In Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on pp. 285-291, 2013.

. Praba Lakshmi V., A.Ranichitra, “Isolating Malicious Vehicles and Avoiding Collision between Vehicles in VANET”, International conference on Communication and Signal Processing, April 3-5, 2013, India.

. Balamahalakshmi D., & Shankar M. K. V., “Sybil Attack Detection with Reduced Bandwidth Overhead in Urban Vehicular Networks”, International Journal of Engine ring Trends and Technology (IJETT)– Volume 12, pp. 578 – 584, IEEE, 2014.

. Hugo Michel "Self-Organized Traffic Control", VANET’10, September 24, o, Illinois, Reena Dadhich Department of MCA, Govt. College of Engineering, Ajmer, India,” Mobility Simulation of Reactive Routing Protocols for Vehicular Ad-hoc Networks” (2011)

. Jason J. Haas and Yih-Chun Hu University of Illinois at Urbana-Champaign Urbana, Illinois, U.S.A,” Real-World VANET Security Protocol Performance” (2007) p1-7.

. Josiane Nzouonta, Neeraj Rajgure, Guiling Wang, Member, IEEE, and Cristian Borcea, Member IEEE,” VANET Routing on City Roads using Real-Time Vehicular Traffic Information” (2008) p1-18.

. Kelatkar, Vrushali., Dere, Pravin (2015). Lightweight Sybil Attack Detection Technique, An Overview, IJCSMC, 4 (11), (November), 173 – 180.

. John R. Douceur, “The Sybil Attack”, In IPTPS 01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp. 251-260, London, UK, 2002. Springer-Verlag.

. James Newsome, Elaine Shi, Dawn Song, and Adrian Perrig, “The Sybil Attack in Sensor Networks: Analysis & Defenses”, In IPSN '04: Proceedings of the 3rd International Symposium on Information processing in Sensor Networks, New York

. Chen C., X. Wang, W. Han, and B. Zang, “A robust detection of the sybil attack in urban vanets,” in 29th IEEE International Conference on Distributed Computing Systems Workshops, 2009, pp. 270–276.

. Grover J., M. S. Gaur, V. Laxmi, and N. K. Prajapati, “A sybil attack detection approach using neighboring vehicles in VANET,” in Proceedings of the 4th international conference on Security of information and networks, 2011, pp. 151–158.

Downloads

Published

2020-09-21

How to Cite

Er. Ritika Saini, & Harish Kundra. (2020). Malicious node identification routing and protection mechanism for VANET against various attack. INTERNATIONAL JOURNAL OF COMPUTERS &Amp; TECHNOLOGY, 20, 110–122. https://doi.org/10.24297/ijct.v20i.8852

Issue

Section

Research Articles