D&PMV: New Approach for Detection and Prevention of Misbehave/Malicious Vehicles from VANET

Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 247)

Abstract

VANET means vehicular ad hoc network is nothing but the group of independent vehicles nodes which are moving throughout the wireless network freely. Such kind of networks are temporary as the vehicles and their positions are not fixed and hence the all the routing paths which are established in order to make the communication in between the source and destination are on demand and depends on the nodes movement into the network. The architecture is not at all needed for such kind of networks. Role of routing protocols is most important for the VANET which is used to route the data from source to destination, but they are also vulnerable to the many of the security attacks in the VANET. Due to the unprotected nature of the VANET networks routing protocols, such networks also unprotected from the malicious vehicles in the network itself. This paper presents new approach for not only the detection of malicious vehicles attack but also their prevention from the VANET. Proposed algorithm is referred as Detection and Prevention of Malicious Vehicles (D&PMV). The malicious vehicles detected using the monitoring process over the VANET, once they are detected, proposed algorithm is applied for the prevention of the same. The detection of malicious vehicles is based on DMV algorithm presented earlier.

Keywords

Abnormal behavior Vehicular Ad Hoc Networks Honest vehicle Secure communication malicious vehicle Detection Prevention MANET 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Abdulhamid, H., Tepe, K.E., Abdel-Raheem, E.: Performance of DSRC systems using conventional channel estimation at high velocities. Int. J. Electron. Commun., 556–561 (2007)Google Scholar
  2. 2.
    Artimy, M.: Local density estimation and dynamic transmission-range assignment in Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 8(3), 400–412 (2007)CrossRefGoogle Scholar
  3. 3.
    Bettstetter, C.: Smooth is better than sharp: A random mobility model for simulation of wireless networks. In: 4th ACM International Work-shop on Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWiM 2001), Rome, Italy (2001)Google Scholar
  4. 4.
    Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks. AmenehDaeinabi & Akbar GhaffarpourRahbar Springer Science+Business Media, LLC (2011)Google Scholar
  5. 5.
    Raya, M., Hubaux, J.P.: The security of vehicular ad hoc networks. J. Comput. Secur. Spec. Issue Secur. Ad Hoc Sensor Netw. 15(1), 39–68 (2007)Google Scholar
  6. 6.
    Wang, N.W., Hauang, Y.M., Chen, W.M.: A novel secure communication scheme in vehicular ad hoc networks. Comput. Commun. 31(12), 2827–2837 (2008)CrossRefGoogle Scholar
  7. 7.
    Fan, P., Haran, J.G., Dillenburg, J., Nelson, P.C.: Cluster-Based Framework in Vehicular Ad-Hoc Networks. In: Syrotiuk, V.R., Chávez, E. (eds.) ADHOC-NOW 2005. LNCS, vol. 3738, pp. 32–42. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  8. 8.
    Hu, Y.-C., Perrig, A.: Survey of Secure Wireless Ad Hoc Routing. IEEE Security & Privacy 2(3), 28–39 (2004), doi:10.1109/MSP.2004.1CrossRefGoogle Scholar
  9. 9.
    Yan, G., Olariu, S., Weigle, M.C.: Providing VANET security through active position. Comput. Commun. 31(12), 2883–2897 (2008)CrossRefGoogle Scholar
  10. 10.
    Raya, M., Hubaux, J.P.: The Security of Vehicular Ad Hoc Networks. In: SASN 2005, Alexandria, Virginia, USA (November 7, 2005), Copyright 2005 ACM 95932275/05/0011Google Scholar
  11. 11.
    Raya, M., Papadimitratos, P., Hubaux, J.P.: Securing Vehicular Communications. IEEE Wireless Communications 13 (October 2006)Google Scholar
  12. 12.
    Golle, P., Greene, D., Staddon Detecting, J.: Staddon Detecting and Correcting Malicious Data in VANETs. In: VANET 2004, Philadelphia, Pennsylvania, USA (October 1, 2004), Copyright 2004 ACM 1581139225/04/0010Google Scholar
  13. 13.
    Abdalla, G.M.T., Senouci, S.M.: Current Trends in Vehicular Ad Hoc Networks. In: Proceedings of UBIROADS Workshop (2007)Google Scholar
  14. 14.
    Raya, M., Jungels, D., Papadimitratos, P., Aad, I., Hubaux, J.P.: Certificate Revocation in Vehicular Networks, Laboratory for Computer Communications and Applications (LCA) School of Computer and Communication Sciences. EPFL, Switzerland (2006)Google Scholar
  15. 15.
    Nadeem, T., Shankar, P.: A comparative study of data dissemination models for VANETs. IEEE Mob. Ubiquitous Syst. Netw. Serv., 1–10 (2006)Google Scholar
  16. 16.
    Picconi, F., Ravi, N., Gruteser, M., Iftode, L.: Probabilistic validation of aggregated data in Vehicular Ad Hoc Networks. In: International Conference on Mobile Computing and Networking, Los Angeles, CA, USA, pp. 76–85 (2006)Google Scholar
  17. 17.
    Parno, B., Perrig, A.: Challenges in Securing Vehicular NetworksGoogle Scholar
  18. 18.
    Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.P.: Eviction of Misbehaving and FaultyNodes in Vehicular Networks. IEEE J. Sel. Areas Commun. 25(8), 1557–1568 (2007)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Department of Computer EngineeringGHRCEMPuneIndia
  2. 2.Department of Computer EngineeringAISSMS IOITPuneIndia

Personalised recommendations