Advertisement

Springer Nature is making Coronavirus research free. View research | View latest news | Sign up for updates

Modelling and Detection of Worm Propagation for Web Vehicular Ad Hoc Network (WVANET)

  • 53 Accesses

Abstract

Web Vehicular Ad Hoc Network becomes the major research platform these days. This web vehicular ad hoc network is fundamentally different from the earlier vehicular ad hoc network communication models as it makes use of web technology to disseminate the messages among the nodes. When web technology is integrated in vehicular ad hoc network, the communication performance is greatly increased. However, the new web vehicular ad hoc network communication model should be prevented from various security threats. The major security threat to web vehicular ad hoc network is worm propagation. As web VANET operates through web technology, it is possible to the nodes to get infected with the worms. Once a node is infected with worm, it can spread out to the other nodes in the network that are vulnerable. This worm can propagate to all the vulnerable nodes and infect them within a fraction of time. The entire communication architecture can be collapsed due to this worm propagation and even these worms can broadcast false messages in the network to create accidents or to divert the nodes in such a way it will lead to collision. All the nodes should not be vulnerable to prevent itself from worm infection. This paper provides the worm propagation model for web vehicular ad hoc network. Further it provides detection measures of worm to enhance the security concern of web vehicular ad hoc network.

This is a preview of subscription content, log in to check access.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

References

  1. 1.

    Mohammed, N. H., El-Moafy, H. N., Abdel-Mageid, S. M., & Marie, M. I. (2017). Mobility management scheme based on smart buffering for vehicular networks. International Journal of Computer Networks and Applications (IJCNA), 4(2), 35–46.

  2. 2.

    Abdel-Mageid, S. (2016). Self-correcting localization scheme for vehicle to vehicle communication. International Journal of Computer Networks and Applications (IJCNA), 3(5), 95–107. https://doi.org/10.22247/ijcna/2016/48829.

  3. 3.

    Abdel-Mageid, S. (2017). Connectivity based positioning system for underground vehicular ad hoc networks. International Journal of Computer Networks and Applications (IJCNA), 4, 1–14. https://doi.org/10.22247/ijcna/2017/41285.

  4. 4.

    Ramakrishnan, B., Nishanth, R., Milton, J., & Selvi, M. (2015). Cluster based emergency message broadcasting technique for vehicular ad hoc network. Journal of Wireless Networks. https://doi.org/10.1007/s11276-015-1134-6.

  5. 5.

    Ramakrishnan, B., Selvi, M., Nishanth, R., & Milton, J. (2016). An emergency message broadcasting technique using transmission power based clustering algorithm for vehicular ad hoc network. Journal of Wireless Personal Communications, 9, 99. https://doi.org/10.1007/s11277-016-3772-0.

  6. 6.

    Xiong, H., Chen, Z., & Li, F. (2012). Efficient and multi-level privacy-preserving communication protocol for VANET. Computers & Electrical Engineering, 38, 573–581.

  7. 7.

    Ramakrishnan, B., Milton Joe, M., & Bhagavath Nishanth, R. (2014). Modeling and simulation of efficient cluster based manhattan model for vehicular communication. Journal of Emerging Technologies in Web Intelligence, 6(2), 253–261.

  8. 8.

    Sandonis, Victor, Calderon, Maria, Soto, Ignacio, & Bernardos, Carlos J. (2013). Design and performance evaluation of a PMIPv6 solution for geonetworking-based VANETs. Ad Hoc Networks, 11, 2069–2082.

  9. 9.

    Duarte, P. B. F., Fadlullah, Z. M., Vasilakos, A. V., & Kato, N. (2012). On the partially overlapped channel assignment on wireless mesh network backbone: a game theoretic approach. IEEE Journal on Selected Areas in Communications, 30(1), 119–127.

  10. 10.

    Fonsecan, A., & Vazao, T. (2013). Applicability of position-based routing for VANET in highways and urban environments. Journal of Network and Computer Applications, 36(3), 961–973.

  11. 11.

    Duarte, P. B. F., Fadlullah, Z. M., Vasilakos, A. V., & Kato, N. (2012). On the partially overlapped channel assignment on wireless mesh network backbone: a game theoretic approach. IEEE Journal on Selected Areas in Communications, 30(1), 119–127.

  12. 12.

    Nouh, M. S. A., El-ramly, S. H., Zaki, M., & Elsayed, H. A. (2016). Enhanced route discovery mechanism of ad-hoc on demand distance vector for MANET. International Journal of Computer Networks and Applications (IJCNA), 3(6), 129–138.

  13. 13.

    Joe, M. M., & Ramakrishnan, B. (2015). WVANET: modelling a novel web based communication architecture for vehicular network. Wireless Personal Communications, 85(4), 1987–2001.

  14. 14.

    Joe, M. M., & Ramakrishnan, B. (2016). Review of vehicular ad hoc network communication models including WVANET (Web VANET) model and WVANET future research directions. Wireless Networks, 22(7), 2369–2386.

  15. 15.

    Xiang, X., Qin, W., & Xiang, B. (2014). Research on a DSRC-based rear-end collision warning model. IEEE Transactions on Intelligent Transportation Systems, 15(3), 1054–1065.

  16. 16.

    Wang, Y., Wen, S., Xiang, Y., & Zhou, W. (2014). Modeling the propagation of worms in networks: A survey. IEEE Communications Surveys & Tutorials, 16(2), 942–960.

  17. 17.

    Moore, D., Shannon, C., & Brown, J. (2002). Code-red: A case study on the spread and victims of an internet worm. In Proceedings of 2nd ACM SIGCOMM workshop on internet measurment (pp. 273–284). ACM. http://dl.acm.org/citation.cfm?id=637244. Accessed 3 May 2017.

  18. 18.

    Poor, H. V. (1988). An introduction to signal detection and estimation (Vol. 1). New York: Springer.

  19. 19.

    Weafer, V. (2010). Downadup/conficker and april fools day: One year later. http://www.symantec.com/connect/blogs/downadupconficker-andapril-fool-s-day-one-year-later. Accessed 8 May 2017.

  20. 20.

    Symantec. (2008). W32.downadup (win32/conficker). http://www.symantec.com/securityresponse/writeup.jsp?docid=2008-112203-2408-99. Accessed 8 May 2017.

  21. 21.

    Joe, M. M., Shaji, R. S., & Kumar, K. A. (2013). Prevention of worm at router level for providing seamless communication in network environment. International Journal of Engineering and Technology, 5(2), 586–593.

  22. 22.

    Yu, W., Wang, X., Calyam, P., Xuan, D., & Zhao, W. (2011). Modeling and detection of camouflaging worm. IEEE Transactions on Dependable and Secure Computing, 8(3), 377–390.

  23. 23.

    Kienzle, D. M., & Elder, M. C. (2003). Recent worms: A survey and trends. In Proceedings of 2003 ACM workshop on rapid malcode (pp. 1–10). ACM. http://dl.acm.org/citation.cfm?id=948189. Accessed 10 May 2017.

  24. 24.

    F-Secure. (2011). Love letter virus. http://www.fsecure.com/v-descs/love.shtml. Accessed 2 June 2017.

  25. 25.

    Iloveyou virus lessons learned report. Army Forces Command. http://www.dtic.mil/cgibin/GetTRDoc?AD=ADA415104&Location=U2&doc=GetTRDoc.pdf. Accessed 9 June 2017.

  26. 26.

    Symantec. (2001). W32.sircam.worm. http://www.symantec.com/securityresponse/writeup.jsp?docid=2001-071720-1640-99&tabid=2. Accessed 8 May 2017.

  27. 27.

    Joe, M. M., Ramakrishnan, B., & Das, R. (2016). Designing a novel two-tier authentication algorithm for web service architecture. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 8(9), 67–75.

  28. 28.

    Staniford, S., Paxson, V., Weaver, N., et al. (2002). How to own the internet in your spare time. In USENIX security symposium (pp. 149–167).

Download references

Author information

Correspondence to M. Milton Joe.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Milton Joe, M., Ramakrishnan, B., Karthika Bai, S. et al. Modelling and Detection of Worm Propagation for Web Vehicular Ad Hoc Network (WVANET). Wireless Pers Commun 109, 223–241 (2019). https://doi.org/10.1007/s11277-019-06561-1

Download citation

Keywords

  • WVANET
  • VANET
  • Worm propagation
  • Worm detection
  • Active worms
  • Scanning