International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

MNP: Malicious Node Prevention in Vehicular Ad hoc Networks

Author NameAuthor Details

Syed Rameem Zahra

Syed Rameem Zahra[1]

[1]Computer science and engineering, SMVD University, Jammu & Kashmir, India

Abstract

Today, traffic security has become an obligation rather than a necessity. Hence to secure the traffic, provide comfort to the driver and the passengers, ensure safety of the pedestrians, infrastructure as well as the one’s sitting inside the cars, Intelligent Transport System (ITS) was created. The base of ITS is formed by a class of networks called as VANET. The VANETs make communication between vehicles and vehicle to infrastructure possible. They vary from other Ad-hoc network because of their rare characteristics. VANETs are the networks which lack centralized control and infrastructure, in which the nodes are highly mobile, topology is extremely dynamic and the links are volatile. Consequently, VANET security is threatened- the network is vulnerable to number of mischief. The easiest of all the attacks on VANETs is that on the availability – the Black-hole attack. This attack is carried out by the malicious nodes which can even be the authentic users of the network, implying that the security procedures involving encryption and authentication will not help. Therefore, to secure the VANETs against this common type of attack, we have proposed an algorithm MNP- Malicious Node Prevention. MNP improves DMV (Detection of Malicious Vehicle algorithm) as well as DMN (Detection of Malicious Nodes algorithm) in a way that MNP simply prevents the malicious nodes from participating in the packet forwarding while as both DMV & DMN first identify the malicious nodes and then remove them. This way, DMV as well as DMN cause the loss of many data packets which may be important. Hence MNP greatly improves the performance of the network when under malicious attack.

Index Terms

ITS

VANET

Black hole attack

MNP

DMV

DMN

Reference

  1. 1.
    Richard Gilles Engoulou, Martine Bellaiche, Samuel Pierre, Alejandro Quintero, “VANET security surveys”, in: computer communications Elsevier, 1- 13, 2014.
  2. 2.
    O. Trullols, M. Fiore, C. Casetti, C.-F.Chiasserini, J.M. BarceloOrdinas, “Planning roadside infrastructure for information dissemination in intelligent transportation systems”, Comput. Commun.33 (4) 432–442, 2010.
  3. 3.
    S.S. Kaushik, “Review of different approaches for privacy scheme in VANETs”, Int. J. 5 ISSN 2231-1963, 2012.
  4. 4.
    A.Stampoulis, Z.Chai, “A Survey of Security in Vehicular Networks”, Project CPSC 534,2007.
  5. 5.
    J.-P. Hubaux, S. Capkun, J. Luo, “The security and privacy of smart vehicles”, IEEE Secur.Priv. 2 (3) 49–55, 2004.
  6. 6.
    C.Wei, Y,Jianding, L. Xiangjun, “The design of electronic license plate recognition terminal system based on nRF24LE1”, in : 2012 Fifth International Symposium on Computational Intelligence and Design (ISCID), pp. 127-129, 2012.
  7. 7.
    M. J.-P. Hubaux, S. Capkun, J. Luo, “The security and privacy of smart vehicles”, IEEE, J.-P.Hubaux, Securing vehicular ad hoc networks, J. Comput. Secur.15 (1) 39–68, 2007.
  8. 8.
    Qing Xu, Tony Mak, Jeff Ko, Raja Sengupta “Vehicle-to-Vehicle Safety Messaging in DSRC” ACM 1-58113-922-5/04/0010, October 1, 2004.
  9. 9.
    I.C. Society, “802.11p– IEEE standard for information technology – local- and metropolitan area networks – specific requirements – part 11”: Wireless LAN medium access control, (mac) and physical layer (phy) specifications amendment 6: wireless access in vehicular environments, 2010.
  10. 10.
    DSRC, Dsrc, http://grouper.ieee.org/groups/scc32/dsrc/.
  11. 11.
    ETSI, European Telecommunications Standards Institute (ETSI), http://www. etsi.org.
  12. 12.
    ITS, ITS standards fact sheets of IEEE, http://www.standards.its.dot.gov/ factsheets/factsheet/80, seen, April 19, 2014.
  13. 13.
    L. Miao, K. Djouani, B.J. van Wyk, Y. Hamam, “Evaluation and enhancement of IEEE 802.11 p standard: a survey”, Mob. Comput.1 (1) 2012.
  14. 14.
    G.Jyoti, M.S.Gaur, in: S, Auerbach (Ed.), “Security of Self-organising Networks MANET, WSN, WMN, VANET”, CRC Press, 2010.
  15. 15.
    Y.wang, F.Li, “Vehicular Ad Hoc Networks”, Springer-Verlag, London, 2009.
  16. 16.
    H. Hartenstein , Kennith P. Laberteaux, “A tutorial survey on vehicular ad hoc networks”, IEEE commun. Mag., 2008.
  17. 17.
    SalehYousefi ,MahmoodSiadatMousavi, MahmoodFathy, “Vehicular Ad Hoc Networks (VANETs) : Challenges and Perspectives”, in : International conference on ITS Telecommunications Proceedings, pp. 1151- 1155, 2006.
  18. 18.
    J. Kakarla, S. Siva Sathya, B.G. Laxmi, B. Ramesh Babu, “A survey on routing protocols and its issues in VANET”, Int. J. Comput. Appl. 28 (4) ISSN 0975-8887, 2011.
  19. 19.
    L.K. Qabajeh, M.L.M. Kiah, M.M. Qabajeh, “A scalable and secure position-based routing protocols for ad-hoc networks”, Malays. J. Comput. Sci. 22 (2) 99–120, 2009.
  20. 20.
    F.D. Rango, J.-C. Cano, M. Fotino, C. Calafate, P. Manzoni, S. Marano, “OLSR vs DSR: a comparative analysis of proactive and reactive mechanisms from an en- ergetic point of view in wireless ad hoc networks”, Comput. Commun.31 (16) 3843–3854, 2008.
  21. 21.
    Philippe Jacquet, Paul Muhlethaler, Thomas Clausen, AnisLaouiti, Amir Qayyum, Laurent Viennot, “Optimized link state routing protocol for ad hoc net- works”, in: Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century. Proceedings.IEEE International, IEEE, pp. 62–68, 2001.
  22. 22.
    M. Osman, “The performance of aodv routing protocol based on dropped packet and throughput metrics: a simulation and comparative study for VANET”, Int. J. Manag. Inform. Technol. 4 (2) 265–279, 2013.
  23. 23.
    B. Karp and H.T. Kung, “GPSR: Greedy perimeter stateless routing for wireless networks”, in Proceedings of the ACM/IEEE International Conference on MobileComputing and Networking (MobiCom), 2000.
  24. 24.
    R. Jain, A. Puri, R. Sengupta, “Geographical routing using partial information for wireless ad hoc networks”, IEEE Pers. Commun. 8 (1) 48–57, 2001.
  25. 25.
    H. Rahbar, K. Naik, A. Nayak, “Dtsg: dynamic time-stable geo-cast routing in vehicular ad hoc networks”, in: 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), IEEE, pp. 1–7, 2010.
  26. 26.
    S.-Y. Wang, C.-C.Lin, K.-C.Liu, W.-J. Hong, “On multi-hop forwarding over wbss-based IEEE 802.11 (p)/1609 networks”, in: IEEE 20th International Sympo- sium on Personal, Indoor and Mobile Radio Communications, 2009, IEEE, pp. 3040–3044, 2009.
  27. 27.
    L. Miao, K. Djouani, B.J. van Wyk, Y. Hamam, “Evaluation and enhancement of IEEE 802.11 p standard: a survey”, Mob. Comput.1 (1), 2012.
  28. 28.
    B. Ducourthial, F. El Ali, et al., “Architecture pour communication vehicular-infrastructure”, in: CFIP, 2009.
  29. 29.
    J.T.Isaac, S. Zeadally, J.S. Camara, “Security attacks and solutions for vehicular ad hoc networks”, IET commun, 4 894-903, 2010-04-30.
  30. 30.
    V.S. Yadav, S. Misra, M. Afaque, “Security of Wireless and Self-Organising Networks: Security in Vehicular Ad hoc Networks”, CRC Press, pp.227-250, 2010.
  31. 31.
    M Raya, P. Papadimitratos, J.P. Hubaux, “Securing vehicular communications, IEEE wireless”, Commun, 13 8-15, 2006.
  32. 32.
    S. Zeadally, R. Hunt, Y.-S. Chen, A. Irwin, A. Hassan, “Vehicular ad hoc networks (VANETs): status, results, and challenges”, Telecommun. Syst. 50 (4) 217–241, 2012.
  33. 33.
    A. Dhamgaye, N. Chavhan, “Survey on security challenges in VANET”, Int. J. Com- put. Sci. 2 88–96, ISSN 2277-5420, 2013.
  34. 34.
    J.M. d. Fuentes, A.I. González-Tablas, A. Ribagorda, “Overview of security issuesin vehicular ad-hoc networks”, in: Maria Manuela Cruz-Cunha, Fernando Moreira (Eds.), Handbook of Research on Mobility and Computing, IGI Global, 2010.
  35. 35.
    B. Schneier, “Applied Cryptographic protocols, Algorithms, and Source Code in C”, John Wiley & Sons, Inc., 1996.
  36. 36.
    R. Minhas, M. Tilal, “Effects of jamming on IEEE 802.11 p systems”, Chalmers University of Technology, 2010.
  37. 37.
    A. Hamieh, J. Ben-Othman, A. Gueroui, F. Naït-Abdesselam, “Detecting greedy behaviors by linear regression in wireless ad hoc networks”, in: IEEE Interna- tional Conference on Communications, ICC’09, IEEE, pp. 1–6, 2009.
  38. 38.
    J.R. Douceur, “The sybil attack”, in: Peer-to-Peer Systems, Springer, pp. 251–260, 2002.
  39. 39.
    M.S. Al-kahtani, “Survey on security attacks in vehicular ad hoc networks (VANETs)”, in: 6th International Conference on Signal Processing and Commu- nication Systems (ICSPCS), IEEE, pp. 1–9, 2012.
  40. 40.
    Nadeem T, Shankar P “A comparative study of data dissemination models for VANETs”, IEEE Mob Ubiquitous SystNetwServ: 1–10, 2006.
  41. 41.
    AmenehDaeinabi, Akbar Ghaffarpour Rahbar “Detection of malicious vehicles (DMV) through monitoring in vehicular Ad-hoc Networks” in : Springer, pp 325-338, 2013 .
  42. 42.
    Abdulhamid H, Tepe KE, Abdel-Raheem E “Performance of DSRC systems using conventional channel estimation at high velocities”, Int J Electron Commun: 556–561, 2007.
  43. 43.
    Picconi F, Ravi N, Gruteser M, Iftode L “Probabilistic validation of aggregated data in Vehicular Ad Hoc Networks”, International Conference on Mobile Computing and Networking, Los Angeles, CA, USA: 76–85, 2006.
  44. 44.
    Raya M, Papadimitratos P, Aad I, Jungels D, Hubaux JP “Eviction of Misbehaving and Faulty Nodes in Vehicular Networks”, IEEE J Sel Areas Commun 25(8):1557–1568, 2007.
  45. 45.
    Ghosh M, Varghese A, Gupta “A Distributed misbehaviour detection in VANETs”, IEEE WirelCommun Network Conf: 2909-2914, 2009.
  46. 46.
    Ghosh M, Varghese A, Kherani AA, Gupta A, Muthaiah SN “Detecting misbehaviour in VANET with integrated root cause analysis”, Elsevier AD Hoc Networks 8:778-790, 2010.
  47. 47.
    Gelle P, Grren D, Staddon J “Detection and correcting malicious data in VANETs”, in Proc VANETS’04: 29–37, 2004.
  48. 48.
    Guo J, Baugh JP, Wang SH “A group signature based secure and privacy-preserving vehicular communication framework”, Mob NetwVeh Environments: 103–108, 2007.
  49. 49.
    Li ChT, Hwang MSh, Chu YP, “A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc network”, ComputCommun 31(12):2803–2814, 2008.
  50. 50.
    Raya M, Hubaux JP, “The security of vehicular ad hoc networks”, J ComputSecur Spec Issue Secur Ad Hoc Sensor Netw 15(1):39–68, 2007.
  51. 51.
    Wang NW, Hauang YM, Chen WM, “A novel secure communication scheme in vehicular ad hoc networks”, ComputCommun 31(12):2827–2837, 2008.
  52. 52.
    Wua B, Wua J, Fernandeza EB, Ilyasa M, Magliveras S, “Secure and efficient key management in mobile ad hoc networks”, J NetwComputAppl 30:937–954, 2007.
  53. 53.
    Yan G, Olariu S, Weigle MC, “Providing VANET security through active position”, ComputCommun 31(12):2883–2897, 2008.
  54. 54.
    Wang Z, Chigan CH, “Countermeasure uncooperative behaviors with dynamic trust-token in VANETs”, Proc IEEE IntConfCommun: 3959–3964, 2007.
  55. 55.
    Wex P, Breuer J, Held A, Leinmuller T, Delgrossi L, “Trust issues for Vehicular Ad-Hoc Networks”, VTC.2008: 2800–2804, 2008.
  56. 56.
    Fonseca E, Festag A, “A survey of existing approaches for secure Ad Hoc routing and their applicability to VANETS”, Technical Report NLE-PR, NEC Network Laboratories, 2006.
  57. 57.
    Uzma Khan, Shikha Agarwal, Sanjay Silakari, “Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks”, in: Elsevier, pp 965- 972, 2015.
SCOPUS
SCImago Journal & Country Rank