Open Access Open Access  Restricted Access Subscription Access

Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Attacks using BF-IPCM


Affiliations
1 Computer Science and Engineering, Anna University, Tamilnadu, India
2 Computer Science and Engineering Vivekanadha College of Engineering for Women, Tiruchengode, Tamilnadu, India
 

Routing in VANETs (pure ad hoc architectures) with dynamic nature of the network becomes a challenging task for finding and maintaining routes. So, detecting the misbehaving vehicles is an important task in for improving the efficiency of the vehicles and to incorporate the reliable and secure routing in the transport system. Due to the self -configure (mobility) characteristic of the VANETS, it is very difficult to the road side and base station units to keep track of the actions happening among the vehicles. Obviously the attackers will have the fraudulent nature that same will persist over time with them that will be effected to the normal vehicles which is travelling in the network from the non trustworthy vehicles. So detection and proper action is needed to improve the efficient routing of the vehicles in the network. Earlier we have many techniques for detecting and preventing the misbehaving vehicles depending upon the threshold values, mobility factors, power ratios etc., now we are proposing a new technique called Bloom-Filter based IP Choke Mechanism for locating the harmful vehicle. In this paper we will discuss about the proposed technique on how to identify the malicious vehicle and how to defend the attacked vehicle by blocking it form the routing process.

Keywords

Bloom-Filter based IP Chock (BF-IPCM), Mobility, Routing, VANETS.
User
Notifications
Font Size

  • Karan Verma , IP-CHOCK (filter)-Based Detection Scheme for Denial of Service (DoS) attacks in VANET, 978-1-4799-0059-6/13/$31.00 ©2014 IEEE
  • Routing in Vehicular Ad Hoc Networks: A Survey, 1556-6072/07/$25.00©2007IEEE IEEE Vehicular Technology Magazine | June 2007
  • J.Nethravathy Identifying Malicious Nodes and Performance Analysis in VANET, International Journal of Applied Engineering Research ISSN 09734562 Volume 11, Number 9 (2016) pp 6716-6719 © Research India Publications.http://www.ripublication.com
  • Ghassan Samara, ”Security Issues and Challenges of Vehicular Ad Hoc Networks (VANET)”, IEEExplore.
  • PriyaSharma, “Enhanced attacked packet detection algorithm used for detecting attack in vanet”. IRF International Conference, Pune, India, ISBN: 978-9385832-03-1.
  • Uzma Khana, “Detection-of-Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks”, Procedia Computer Science 46 (2015) 965 – 972, doi:10.1016/j.procs.2015.01.006, Elsevier, Available online at www.sciencedirect.com
  • Ayonija Pathre “Identification Of Malicious Vehicle In Vanet Environment From Ddos Attack “, Volume 4, No. 6, June 2013 Journal of Global Research in Computer Science
  • Li, F., Wang, Y., “Routing in vehicular ad hoc networks: A survey,” Vehicular Technology Magazine, IEEE, pp.12-22, vol.2, no.2, June 2007.
  • M. Raya, Eviction of misbehaving and faulty node in vehicular networks”, IEEE Journal on Selected Areas and Communications, Volume 25 Issue 8, pp. 15571568, July 2007.
  • S. Marti, T.J. Giuli, K. Lai and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in Proc. of the 6th annual international conference on Mobile computing and networking (MOBICOM ’00), Boston, Massachusetts, USA, August 2000.
  • S. Bhargava and D. P. Agrawal. Security Enhancements in AODV Protocol for Wireless Ad Hoc Networks. In the Proceedings of the 2001 IEEE Vehicular Technology Conference.
  • J. Douceur. The Sybil Attack. In the Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002), March 2002.
  • Al-kahtani, MS. Survey on security attacks in Vehicular Ad hoc Networks (VANETs). In: 6th International Conference on Signal Processing and Communication Systems (ICSPCS); 2012. p. 1-9.
  • Y. Hu, A. Perrig and D. Johnson. Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In INFOCOM 2003.
  • Daeinabi A, Rahbar AG, Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks, Springer, Multimedia Tools and Applications 2013. 66: 325-338.
  • Y. Hu, A. Perrig and D. Johnson. E±cient security Mechanisms for Routing Protocols in the Proceedings of the network and distributed system security symposium (NDSS), 2003.
  • Fonseca E, Festag A. A survey of existing approaches for secure ad hoc routing and their applicability to VANETs. NEC Network Laboratories; 2006.
  • Coussement R, Saber BAB, Biskri I. Decision support protocol for intrusion detection in VANETs. ACM, DIVANet '13; 2013. p. 31-38.
  • Ruj S, Cavenaghi MA, Huang Z, Nayak A, Stojmenovic I. On Data-Centric Misbehavior Detection in VANETs. In: Vehicular Technology Conference (VTC Fall), IEEE; 2011.

Abstract Views: 240

PDF Views: 1




  • Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Attacks using BF-IPCM

Abstract Views: 240  |  PDF Views: 1

Authors

Pavan Kumar Pagadala
Computer Science and Engineering, Anna University, Tamilnadu, India
N. M. Saravana Kumar
Computer Science and Engineering Vivekanadha College of Engineering for Women, Tiruchengode, Tamilnadu, India

Abstract


Routing in VANETs (pure ad hoc architectures) with dynamic nature of the network becomes a challenging task for finding and maintaining routes. So, detecting the misbehaving vehicles is an important task in for improving the efficiency of the vehicles and to incorporate the reliable and secure routing in the transport system. Due to the self -configure (mobility) characteristic of the VANETS, it is very difficult to the road side and base station units to keep track of the actions happening among the vehicles. Obviously the attackers will have the fraudulent nature that same will persist over time with them that will be effected to the normal vehicles which is travelling in the network from the non trustworthy vehicles. So detection and proper action is needed to improve the efficient routing of the vehicles in the network. Earlier we have many techniques for detecting and preventing the misbehaving vehicles depending upon the threshold values, mobility factors, power ratios etc., now we are proposing a new technique called Bloom-Filter based IP Choke Mechanism for locating the harmful vehicle. In this paper we will discuss about the proposed technique on how to identify the malicious vehicle and how to defend the attacked vehicle by blocking it form the routing process.

Keywords


Bloom-Filter based IP Chock (BF-IPCM), Mobility, Routing, VANETS.

References