D&PMV: New Approach for Detection and Prevention of Misbehave/Malicious Vehicles from VANET
VANET means vehicular ad hoc network is nothing but the group of independent vehicles nodes which are moving throughout the wireless network freely. Such kind of networks are temporary as the vehicles and their positions are not fixed and hence the all the routing paths which are established in order to make the communication in between the source and destination are on demand and depends on the nodes movement into the network. The architecture is not at all needed for such kind of networks. Role of routing protocols is most important for the VANET which is used to route the data from source to destination, but they are also vulnerable to the many of the security attacks in the VANET. Due to the unprotected nature of the VANET networks routing protocols, such networks also unprotected from the malicious vehicles in the network itself. This paper presents new approach for not only the detection of malicious vehicles attack but also their prevention from the VANET. Proposed algorithm is referred as Detection and Prevention of Malicious Vehicles (D&PMV). The malicious vehicles detected using the monitoring process over the VANET, once they are detected, proposed algorithm is applied for the prevention of the same. The detection of malicious vehicles is based on DMV algorithm presented earlier.
KeywordsAbnormal behavior Vehicular Ad Hoc Networks Honest vehicle Secure communication malicious vehicle Detection Prevention MANET
Unable to display preview. Download preview PDF.
- 1.Abdulhamid, H., Tepe, K.E., Abdel-Raheem, E.: Performance of DSRC systems using conventional channel estimation at high velocities. Int. J. Electron. Commun., 556–561 (2007)Google Scholar
- 3.Bettstetter, C.: Smooth is better than sharp: A random mobility model for simulation of wireless networks. In: 4th ACM International Work-shop on Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWiM 2001), Rome, Italy (2001)Google Scholar
- 4.Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks. AmenehDaeinabi & Akbar GhaffarpourRahbar Springer Science+Business Media, LLC (2011)Google Scholar
- 5.Raya, M., Hubaux, J.P.: The security of vehicular ad hoc networks. J. Comput. Secur. Spec. Issue Secur. Ad Hoc Sensor Netw. 15(1), 39–68 (2007)Google Scholar
- 10.Raya, M., Hubaux, J.P.: The Security of Vehicular Ad Hoc Networks. In: SASN 2005, Alexandria, Virginia, USA (November 7, 2005), Copyright 2005 ACM 95932275/05/0011Google Scholar
- 11.Raya, M., Papadimitratos, P., Hubaux, J.P.: Securing Vehicular Communications. IEEE Wireless Communications 13 (October 2006)Google Scholar
- 12.Golle, P., Greene, D., Staddon Detecting, J.: Staddon Detecting and Correcting Malicious Data in VANETs. In: VANET 2004, Philadelphia, Pennsylvania, USA (October 1, 2004), Copyright 2004 ACM 1581139225/04/0010Google Scholar
- 13.Abdalla, G.M.T., Senouci, S.M.: Current Trends in Vehicular Ad Hoc Networks. In: Proceedings of UBIROADS Workshop (2007)Google Scholar
- 14.Raya, M., Jungels, D., Papadimitratos, P., Aad, I., Hubaux, J.P.: Certificate Revocation in Vehicular Networks, Laboratory for Computer Communications and Applications (LCA) School of Computer and Communication Sciences. EPFL, Switzerland (2006)Google Scholar
- 15.Nadeem, T., Shankar, P.: A comparative study of data dissemination models for VANETs. IEEE Mob. Ubiquitous Syst. Netw. Serv., 1–10 (2006)Google Scholar
- 16.Picconi, F., Ravi, N., Gruteser, M., Iftode, L.: Probabilistic validation of aggregated data in Vehicular Ad Hoc Networks. In: International Conference on Mobile Computing and Networking, Los Angeles, CA, USA, pp. 76–85 (2006)Google Scholar
- 17.Parno, B., Perrig, A.: Challenges in Securing Vehicular NetworksGoogle Scholar