Open Access   Article Go Back

Delay Analysis of Proposed DMN Algorithm in VANET

Vishnu Sharma1 , Ankur Goyal2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-1 , Page no. 287-290, Jan-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i1.287290

Online published on Jan 31, 2019

Copyright © Vishnu Sharma, Ankur Goyal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Vishnu Sharma, Ankur Goyal, “Delay Analysis of Proposed DMN Algorithm in VANET,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.287-290, 2019.

MLA Style Citation: Vishnu Sharma, Ankur Goyal "Delay Analysis of Proposed DMN Algorithm in VANET." International Journal of Computer Sciences and Engineering 7.1 (2019): 287-290.

APA Style Citation: Vishnu Sharma, Ankur Goyal, (2019). Delay Analysis of Proposed DMN Algorithm in VANET. International Journal of Computer Sciences and Engineering, 7(1), 287-290.

BibTex Style Citation:
@article{Sharma_2019,
author = {Vishnu Sharma, Ankur Goyal},
title = {Delay Analysis of Proposed DMN Algorithm in VANET},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {7},
Issue = {1},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {287-290},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3499},
doi = {https://doi.org/10.26438/ijcse/v7i1.287290}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i1.287290}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3499
TI - Delay Analysis of Proposed DMN Algorithm in VANET
T2 - International Journal of Computer Sciences and Engineering
AU - Vishnu Sharma, Ankur Goyal
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 287-290
IS - 1
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
565 286 downloads 203 downloads
  
  
           

Abstract

Wireless networks are the technology changer that has changed the modern communication system. In the field of intelligent transport system, wireless network play an important role in the form of Vehicular Adhoc Network (VANET). VANET is a special type of adhoc wireless network which is characterised with fast moving vehicle node, high vehicle speed, and moving along the road. But the VANETs have the security issues. The different malicious nodes present in the coverage decrease the efficiency of the network. Researchers have performed lot of work to secure the VANET. In this work, a new algorithm is proposed for the detection of malicious nodes in VANET. The proposed algorithm is designed and implemented. The results show that there is improvement in the VANET.

Key-Words / Index Term

VANET, attacks, DMN, ERDV, routing protocol

References

[1] Geetha Jayakumar, Gopinath Ganapathi, “Reference Point Group Mobility and Random Waypoint Models in Performance Evaluation of MANET Routing Protocols”, Journal of Computer Systems, Networks, and Communications, Volume 2008
[2] Mainak Ghosh, Anitha Varghese, Arzad A. Kherani and Arobinda Gupta, “Distributed Misbehavior Detection in VANETs”, WCNC 2009 proceedings, IEEE, 2009.
[3] Wenshuang Liang, Zhuorong Li, Hongyang Zhang, Shenling Wang, and Rongfang Bie, “Vehicular Ad Hoc Networks: Architectures, Research Issues, Methodologies, Challenges, and Trends”, Hindawi Publishing Corporation International Journal of Distributed Sensor Networks, Volume 2015, Article ID 745303.
[4] Sherali Zeadally, Ray Hunt, Yuh-Shyan Chen, Angela Irwin, Aamir Hassan, “Vehicular ad hoc networks (VANETS): status, results, and challenges”, Springer Science Business Media, LLC 2010.
[5] Arun Kumar, “Enhanced Routing in Delay Tolerant Enabled Vehicular Ad Hoc Networks”, International Journal of Scientific and Research Publications, Volume 2, Issue 9, September 2012.
[6] Jani Kurhinen, Jukka Janatuinen, “Delay Tolerant Routing in Sparse Vehicular Ad Hoc Networks”, Acta Electrotechnica et Informatica, Vol. 8, No. 3, 2008, 7–13.
[7] Archana Harit, N C Barwar, “Comparative Analysis of Identification of Malicious Node in VANET using FFRDV and ERDV Routing Algorithm”, 6th International Conference on Recent Innovation in Science, Engineering and Management, IIMT College of Engineering, 20 August 2016.
[8] Hyunwoo Kang, Syed Hassan Ahmed, Dongkyun Kim, and Yun-Su Chung, “Routing Protocols for Vehicular Delay Tolerant Networks: A Survey”, Hindawi Publishing Corporation, International Journal of Distributed Sensor Networks, Volume 2015, Article ID 325027.
[9] Jochen H. Schiller, “Mobile Communications”, Second Edition, Pearson Education Limited, 2003
[10] Chaker Abdelaziz Kerrache, Carlos T. Calafate, Juan-Carlos Cano, Nasreddine Lagraa, Pietro Manzoni, “Trust Management for Vehicular Networks: An Adversary-Oriented Overview”, IEEE Access, Received December 1, 2016, accepted December 20, 2016, date of publication December 26, 2016, date of current version January 27, 2017.
[11] Amit Mane A., “Privacy Aware VANET Security: - Sybil Attack Detection in VANET”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 7, Issue 4, April 2017 ISSN: 2277 128X.
[12] Jayant Vasu, Gaurav Tejpal, Sonal Sharma, “Review on Various outing Attacks in Vehicular Adhoc Networks”, International Journal of Computer Applications (0975 – 8887), Volume 167 – No.1, June 2017.
[13] Uzma Khana, Shikha Agrawala, Sanjay Silakaria, “Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks”, Procedia Computer Science, 46, Page 965 – 972, 2015.
[14] Uzma Khan, Shikha Agrawal and Sanjay Silakari, “A Detailed Survey on Misbehavior Node Detection Techniques in Vehicular Ad Hoc Networks”, Information Systems Design and Intelligent Applications, Advances in Intelligent Systems and Computing 339, Springer India, 2015
[15] Philippe Golle, Dan Greene, Jessica Staddon, “Detecting and Correcting Malicious Data in VANETs”, VANET’04, October 1, 2004, Philadelphia, Pennsylvania, USA. ACM, 2004
[16] Gurpreet Singh, Seema, “Malicious Data Detection in VANET”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 1, Issue 7, September 2012
[17] V. Lakshmi Praba, A. Ranichitra, “Detecting Malicious Vehicle in a VANET scenario by Incoporating Security in AODV Protocol”, ICTACT Journal on Communication Technology, Vol: 03, Issue: 03, Sept. 2012
[18] S. RoselinMary, M. Maheshwari, M. Thamaraiselvan, “Early Detection Of DOS Attacks In VANET Using Attacked Packet Detection Algorithm(APDA)”, International Conference on Information Communication and Embedded Systems, ICICES, 2013
[19] Omar Abdel Wahab, Hadi Otrok, Azzam Mourad, “A cooperative watchdog model based on Dempster – Shafer for detecting misbehaving vehicles”, Elsevier, Computer Communications 41, (2014), 43–54.
[20] Miss S.A. Ghorsad, Dr. V. M. Thakare Dr. R.V Dharaskar, “DoS Attack Detection in Vehicular Ad-Hoc Network Using Malicious Node Detection Algorithm”, International Conference on “Advances in Computing, Communication And Intelligence” ICACC 2014 Special Issue of International Journal of Electronics, Communication & Soft Computing Science and Engineering, 2014.
[21] Ravneet Kaur, Nitika Chowdhary, Jyoteesh Malhotra, “Sybil Attacks Detection in Vehicular Ad Hoc Networks”, International Journal of Advanced Research, Volume 3, Issue 6, 2015, pp.1085-1096.
[22] Harsimrat Kaur,Preeti Bansal, “Efficient Detection & Prevention of Sybil Attack in VANET”, IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 2 Issue 9, September 2015.
[23] Adity, Dalveer Kaur, “Detection and Prevention of Malacious Node using Data Centric Technique”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 5, Issue 2, March - April 2016.
[24] J.Nethravathy, Dr.G. Maragatham, “Malicious Node detection in Vehicle to Vehicle Communication”, International Journal of Engineering Trends and Technology (IJETT), Volume 33 Number 5- March 2016.
[25] Zaid Abdulkader, Azizol Abdullah, Mohd Taufik Abdullah, Zuriati Ahmad Zukarnain, “Malicious Node Identification Routing and Protection Mechanism for VANET against Various Attacks”, Journal of Information Security Research, Volume 8, Number 4, December 2017.
[26] John Tobin, Christina Thorpe, Damien Magoni, Liam Murphy. “An Approach to Mitigate Multiple Malicious Node Black Hole Attacks on VANETs”, 16th European Conference on Cyber Warfare and Security, Dublin, Ireland. Proceedings of the 16th European Conference on Cyber Warfare and Security. , Jun 2017.
[27] Vishal Shrivastava, Ajay Samota, “A Framework for Detecting Malicious Node in VANET”, International Journal on Future Revolution in Computer Science & Communication Engineering, ISSN: 2454-4248, Volume: 4, Issue: 6, June 2018.
[28] Kanwalprit Singh, Harmanpreet kaur, “Evaluation of proposed technique for detection of Sybil attack in VANET”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.5, pp.11-15, October (2018)
[29] R. Kumari, P. Nand, “Performance Analysis for MANETs using certain realistic mobility models: NS-2”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.1, pp.70-77, February (2018).
[30] P. Chouksey, “Introduction to MANET”, IJSRNSC, Volume-4, Issue-2, April 2016