Securing Vehicular Ad-hoc Network by Two Stage Attacked Node Identification Algorithm
Rajesh Sharma1 , Ankur Goyal2
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-5 , Page no. 1004-1008, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.10041008
Online published on May 31, 2019
Copyright © Rajesh Sharma, Ankur Goyal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Rajesh Sharma, Ankur Goyal, “Securing Vehicular Ad-hoc Network by Two Stage Attacked Node Identification Algorithm,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1004-1008, 2019.
MLA Style Citation: Rajesh Sharma, Ankur Goyal "Securing Vehicular Ad-hoc Network by Two Stage Attacked Node Identification Algorithm." International Journal of Computer Sciences and Engineering 7.5 (2019): 1004-1008.
APA Style Citation: Rajesh Sharma, Ankur Goyal, (2019). Securing Vehicular Ad-hoc Network by Two Stage Attacked Node Identification Algorithm. International Journal of Computer Sciences and Engineering, 7(5), 1004-1008.
BibTex Style Citation:
@article{Sharma_2019,
author = {Rajesh Sharma, Ankur Goyal},
title = {Securing Vehicular Ad-hoc Network by Two Stage Attacked Node Identification Algorithm},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {1004-1008},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4353},
doi = {https://doi.org/10.26438/ijcse/v7i5.10041008}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.10041008}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4353
TI - Securing Vehicular Ad-hoc Network by Two Stage Attacked Node Identification Algorithm
T2 - International Journal of Computer Sciences and Engineering
AU - Rajesh Sharma, Ankur Goyal
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 1004-1008
IS - 5
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
383 | 230 downloads | 152 downloads |
Abstract
VANET is a wireless communication system established between multiple vehicles moving on the road. The vehicle nodes are present in network but there are some malicious or attacker nodes whose aim is to harm the network. An attacker vehicle node can raise an alert even if there is no crash on the road or it can falsely divert the traffic in wrong direction for their personal interest. In this paper, the new Two Stage Attacked Node Identification Algorithm (TSANI Algorithm) is proposed. This algorithm identifies the attacker nodes and marks then as unauthentic nodes. The performance of new algorithm is analysed and compared with the existing work.
Key-Words / Index Term
VANET, DTN, MANET, Security, TSANI, Attacks
References
[1] Geetha Jayakumar, Gopinath Ganapathi, “Reference Point Group Mobility and Random Waypoint Models in Performance Evaluation of MANET Routing Protocols”, Journal of Computer Systems, Networks, and Communications, Volume 2008.
[2] A Peppino Fazio, Floriano De Rango, Cesare Sottile, and Amilcare Francesco Santamaria, “Routing Optimization in Vehicular Networks: A New Approach Based on Multi objective Metrics and Minimum Spanning Tree”, International Journal of Distributed Sensor Networks, Volume 2013, Article ID 598675, 2013
[3] Jochen H. Schiller, “Mobile Communications”, Second Edition, Pearson Education Limited, 2003
[4] R. Yogapriya, A. Subramani, “A Survey on Vulnerabilities, Attacks and Issues in MANET, WSN and VANET”, International Journal of Computer Sciences and Engineering,Vol.-6, Issue-11, Nov - 2018.
[5] [2p] Deepak Rewadkar, Dharmpal Doye, “Adaptive-ARW: Adaptive Autoregressive Whale Optimization Algorithm for Traffic-Aware Routing in Urban VANET”, International Journal of Computer Sciences and Engineering, Volume-6, Issue-3, March 2018.
[6] Arif Sari, Onder Onursal, Murat Akkaya, “Review of the Security Issues in Vehicular Ad-hoc Networks (VANET)”, Int. J. Communications, Network and System Sciences, 2015, 8, 552-566, December 2015.
[7] Mainak Ghosh, Anitha Varghese, Arzad A. Kheraniand, Arobinda Gupta, “Distributed Misbehavior Detection in VANETs”, WCNC 2009 proceedings, IEEE 2009.
[8] Arun Kumar, “Enhanced Routing in Delay Tolerant Enabled Vehicular Ad-hoc Networks”, International Journal of Scientific and Research Publications, Volume 2, Issue 9, September 2012.
[9] Vishnu Sharma, Ankur Goyal, “Delay Analysis of Proposed DMN Algorithm in VANET”, International Journal of Computer Sciences and Engineering, Vol.-7, Issue-1, Jan 2019.
[10] Sherali Zeadally, Ray Hunt, Yuh-Shyan Chen, Angela Irwin, Aamir Hassan, “Vehicular ad-hoc networks (VANETS): status, results, and challenges”, Springer Science Business Media, LLC 2010.
[11] RAVNEET KAUR, Nitika Chowdhary, Jyoteesh Malhotra, “Sybil Attacks Detection in Vehicular Ad-hoc Networks”, International Journal of Advanced Research, Volume 3, Issue 6, 1085-1096, 2015.
[12] Uzma Khana, Shikha Agrawal, Sanjay Silakaria, “Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks”, Procedia Computer Science 46, 965 – 972, 2015.
[13] Vimal Bibhu, Kumar Roshan, “Performance Analysis of Black Hole Attack in VANET”, I. J. Computer Network and Information Security, 11, 47-54, 2012.
[14] S. Roselin Mary, M. Maheshwari, M. Thamaraiselvan, “Early Detection Of DOS Attacks In VANET Using Attacked Packet Detection Algorithm (APDA)”, International Conference on Information Communication and Embedded Systems, ICICES 2013.
[15] Mandeep Kaur, Manish Mahajan, “Movement Abnormality Evaluation Model in the Partially Centralized VANETs for Prevention Against Sybil Attack”, I.J. Modern Education and Computer Science, 11, 20-27, 2015.
[16] Sonia, Padmavati, “Performance analysis of Black Hole Attack on Vanet’s Reactive Routing Protocols”, International Journal of Computer Applications (0975 – 8887) Volume 73– No.9, July 2013
[17] Omar Abdel Wahab, Hadi Otrok, Azzam Mourad, “A cooperative watchdog model based on Dempster–Shafer for detecting misbehaving vehicles”, Elsevier, Computer Communications 41, 43–54, 2014.
[18] Gómez Mármol, Félix, and Gregorio Martínez Pérez, "TRIP, a trust and reputation infrastructure-based proposal for vehicular ad-hoc networks", Journal of Network and Computer Applications 35 springer, no. 3, pp- 934-941, 2012.
[19] Harsimrat Kaur, Preeti Bansal, “Efficient Detection & Prevention of Sybil Attack in VANET”, IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 2 Issue 9, September 2015.
[20] Khalid Abdel Hafeez, Lian Zhao, Zaiyi Liao, Bobby Ngok-Wah Ma, “A New Broadcast Protocol For Vehicular Ad-hoc Networks Safety Applications”, IEEE Globecom 2010 proceedings, 2010.
[21] Taskeen Zaidi, Shubhang Giri, Shivam Chaurasia, Pragya Srivastava and Rishabh Kapoor, “Malicious Node Detection through AODV in VANET”, International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC), Vol.9, No.2, April 2018.
[22] Archana Harit, N C Barwar , “ Comparative Analysis of Identification of Malicious Node in VANET using FFRDV and ERDV Routing Algorithm”, International Journal of Advanced Technology in Engineering and Science, Vol. 4, Issue 8, August 2016.
[23] Parul Tyagi, Deepak Dembla, “Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET)”, Egyptian Informatics Journal, 18, 133–139, 2017.