Detection and Mitigation of Misbehaving Vehicles from VANET

Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 248)

Abstract

VANET means vehicular ad hoc network is nothing but the group of independent vehicles nodes which are moving throughout the wireless network freely. Such kind of networks are temporary as the vehicles and their positions are not fixed and hence the all the routing paths which are established in order to make the communication in between the source and destination are on demand and depends on the nodes movement into the network. The architecture is not at all needed for such kind of networks. Role of routing protocols is most important for the VANET which is used to route the data from source to destination, but they are also vulnerable to the many of the security attacks in the VANET. Due to the unprotected nature of the VANET networks routing protocols, such networks also unprotected from the malicious vehicles in the network itself. This paper presents new approach for not only the detection of malicious vehicles attack but also their prevention from the VANET. Proposed algorithm is referred as Detection and Prevention of Malicious Vehicles (D&PMV). The malicious vehicles detected using the monitoring process over the VANET, once they are detected, proposed algorithm is applied for the prevention of the same. The detection of malicious vehicles is based on DMV algorithm presented earlier.

Keywords

Abnormal behavior Vehicular Ad Hoc Networks Honest vehicle Secure communication Malicious vehicle Detection Prevention MANET 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Kadam, M., Limkar, S.: D &PMV: New Approach for Detection and Prevention of Misbehave/Malicious Vehicles from VANET. In: Satapathy, S.C., Udgata, S.K., Biswal, B.N. (eds.) FICTA 2013. AISC, vol. 247, pp. 293–303. Springer, Heidelberg (2014)CrossRefGoogle Scholar
  2. 2.
    Kadam, M., Limkar, S.: Performance Investigation of DMV (Detecting Malicious Vehicle) and D&PMV (Detection and Prevention of Misbehave/Malicious Vehicles): Future Road Map. In: Satapathy, S.C., Udgata, S.K., Biswal, B.N. (eds.) FICTA 2013. AISC, vol. 247, pp. 379–387. Springer, Heidelberg (2014)CrossRefGoogle Scholar
  3. 3.
    Abdulhamid, H., Tepe, K.E., Abdel-Raheem, E.: Performance of DSRC systems using conventional channel estimation at high velocities. Int. J. Electron. Commun., 556–561 (2007)Google Scholar
  4. 4.
    Artimy, M.: Local density estimation and dynamic transmission-range assignment in Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 8(3), 400–412 (2007)CrossRefGoogle Scholar
  5. 5.
    Bettstetter, C.: Smooth is better than sharp: a random mobility model for simulation of wireless networks. In: 4th ACM International Workshop on Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWiM 2001), Rome, Italy (2001)Google Scholar
  6. 6.
    Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks. Ameneh Daeinabi & Akbar Ghaffarpour Rahbar. Springer Science+Business Media, LLC (2011)Google Scholar
  7. 7.
    Raya, M., Hubaux, J.P.: The security of vehicular ad hoc networks. J. Comput. Secur. Spec. Issue Secur Ad Hoc Sensor Netw. 15(1), 39–68 (2007)Google Scholar
  8. 8.
    Wang, N.W., Hauang, Y.M., Chen, W.M.: A novel secure communication scheme in vehicular ad hoc networks. Comput. Commun. 31(12), 2827–2837 (2008)CrossRefGoogle Scholar
  9. 9.
    Fan, P., Haran, J.G., Dillenburg, J., Nelson, P.C.: Cluster-based framework in Vehicular Ad-Hoc Networks. In: Syrotiuk, V.R., Chávez, E. (eds.) ADHOC-NOW 2005. LNCS, vol. 3738, pp. 32–42. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  10. 10.
    Hu, Y.-C., Perrig, A.: Survey of Secure Wireless Ad Hoc Routing. IEEE Security & Privacy 2(3), 28–39 (2004), doi:10.1109/MSP.2004.1CrossRefGoogle Scholar
  11. 11.
    Yan, G., Olariu, S., Weigle, M.C.: Providing VANET security through active position. Comput. Commun. 31(12), 2883–2897 (2008)CrossRefGoogle Scholar
  12. 12.
    The Security of Vehicular Ad Hoc Networks Maxim Raya and JeanPierre Hubaux SASN 2005, November 7, Alexandria, Virginia, USA. Copyright, ACM 95932275/ 05/0011 (2005)Google Scholar
  13. 13.
    Raya, M., Papadimitratos, P., Hubaux, J.P.: Securing Vehicular Communications. IEEE Wireless Communications13 (October 2006)Google Scholar
  14. 14.
    Golle, P., Greene, D., Staddon, J.: Detecting and Correcting Malicious Data in VANETs. In: VANET 2004, Copyright 2004, Philadelphia, Pennsylvania, USA, ACM 1581139225/04/0010 (October 1, 2004)Google Scholar
  15. 15.
    Abdalla, G.M.T.: SM Senouci Current Trends in Vehicular Ad Hoc Networks. In: Proceedings of UBIROADS Workshop (2007)Google Scholar
  16. 16.
    Raya, M., Jungels, D., Papadimitratos, P., Aad, I., Hubaux, J.P.: Certificate Revocation in Vehicular Networks, Laboratory for computer Communications and Applications (LCA) School of Computer and Communication Sciences, EPFL, Switzerland (2006)Google Scholar
  17. 17.
    Nadeem, T., Shankar, P.: A comparative study of data dissemination models for VANETs. IEEE Mob. Ubiquitous Syst. Netw. Serv., 1–10 (2006)Google Scholar
  18. 18.
    Picconi, F., Ravi, N., Gruteser, M., Iftode, L.: Probabilistic validation of aggregated data in Vehicular Ad Hoc Networks. In: International Conference on Mobile Computing and Networking, Los Angeles, CA, USA, pp. 76–85 (2006)Google Scholar
  19. 19.
    Parno, B., Perrig, A.: Challenges in Securing Vehicular NetworksGoogle Scholar
  20. 20.
    Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.P.: Eviction of Misbehaving and Faulty Nodes in Vehicular Networks. IEEE J. Sel. Areas Commun. 25(8), 1557–1568 (2007)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Department of Computer EngineeringGHRCEMPuneIndia
  2. 2.Department of Computer EngineeringAISSMS IOITPuneIndia

Personalised recommendations