Open Access
Subscription Access
Open Access
Subscription Access
Detection of Wormhole Attack in VANET
Subscribe/Renew Journal
As security is one of the important issues in Vehicular Adhoc Networks (VANETs), it is required to deal with the threats related to them and one such severe threat is the wormhole attack in which the hacker node grabs the network traffic from one point and directs to another location that may drop the packets. In this paper, a scheme has been proposed which includes the RTT (Round Trip Time), usage level of links and count of neighbors to find the wormhole nodes in VANET. The proposed scheme is assessed and simulated against AODV protocol on NS-2 simulator. The efficiency of the nominated scheme is validated through simulation results.
Keywords
VANET, Wormhole Attack, Security, Detection.
Subscription
Login to verify subscription
User
Font Size
Information
- A. Singh and M. Singh, "A comprehensive review on vehicular ad hoc network," International Journal of Advanced Research in Computer and Communication Engineering, vol. 4, no. 4, pp. 462-468, 2015.
- R.S. Raw, M. Kumar and N. Singh, "Security challenges, issues and their solutions for VANET," International journal of Network Security & Its Applications (IJNSA), vol. 5, no. 5, pp. 95-105, 2013.
- A. Harikishan and P. Srinivasulu , "Intrusion detection system using fuzzy inference system," International Journal of Computer & Organization Trends, vol. 3, no. 8, pp. 345-352, 2013.
- V. K. Upadhya and R. K. Shukla, "WPAODV: Wormhole Detection and Prevention Technique", International Journal of Advanced Networking and Applications, vol. 5, no. 3, p. 1922, 2013.
- R. Karthiga and P. Suresh, "Optimization of Pattern Matching Algorithm for Network Intrusion detection System," International Journal of Advanced Research in Computer Science & Technology (IJARCST), vol. 2, no. 1, pp. 20-24, 2014.
- A. Aggarwal and A. Saxena, "Wormhole Detection and Prevention Scheme using Beacon Node Mechanism with Neighbor Node Discovery", International Journal of Computer Science and Information Technologies(IJCSIT), vol. 5, no. 5, pp. 6620-6625, 2014.
- C. Ting, "Detection system and the realization of the principle of BP neural network based intrusion," in 2015 Seventh International Conference on Measuring Technology and Mechatronics Automation (ICMTMA), Nanchang, 2015.
- S. Eidie, B. Akbari and P. Poshtiban, "WANI: Wormhole Avoidance using Neighbor Information", Information and Knowledge Technology (IKT), 2015 7th Conference on, pp. 1-6, 2015.
- S. K. Arora and H. Monga, "Combined Approach for the Analysis of Black Hole and Worm Hole Attack in MANET", Indian Journal of Science and Technology, vol. 9, no. 20, 2016.
- A. Radhika and D. Haritha, "Detection and Prevention of Blackhole Attack, Wormhole Attack in MANET Using ACO", International Journal of Engineering and Applied Sciences (IJEAS), vol. 3, no. 1, 2016.
- E. Altman and T. Jimenez, "NS Simulator for beginners," in Lecture notes, France, 2003.
Abstract Views: 262
PDF Views: 2