体育赛事投注记录

advertisement

Entity-Centric Combined Trust (ECT) Algorithm to Detect Packet Dropping Attack in Vehicular Ad Hoc Networks (VANETs)

  • Kuldeep Narayan TripathiEmail author
  • Gourav Jain
  • Ashish Mohan Yadav
  • S. C. Sharma
Conference paper
  • 33 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1162)

Abstract

road safety and security are the most challenging topics in recent times. vehicular ad hoc network, an active part of the intelligent transportation system, provides the advanced technology to tackle the various security and safety issues of vehicles. vehicle is an integral part of the vanet that often gets compromised with numerous types of attackers and starts to perform malicious activities. to provide secure and smooth communication among the vehicles, we are required to detect those infected nodes and remove them from the network. in this paper, we proposed a trust-based security algorithm based on cooperation among the vehicles. the proposed algorithm detects the malicious activities, mainly centered on packet dropping, with the help of the trust-based security measurements. our proposed model primarily based on the two things one is cooperation among the vehicles, and the other is monitoring network traffic of moving vehicles. simulation analysis and results demonstrate the incredible growth in the performance of the aodv routing under the proposed algorithm. we present the simulation of the proposed algorithm in network simulator ns-2, and result evaluation by using network parameters like successful data delivery fraction and end-to-end delay. simulation and result analysis show that our algorithm works better to detect malicious entities (vehicles) in the network and enhances the performance of the network of moving vehicles.

Keywords

Data dissemination Trust-based security Vehicle cooperation Trust value Malicious nodes Packet drop attack VANETs 

References

  1. 1.
    Qu, F., Wu, Z., Wang, F.Y., Cho, W.: A security and privacy review of VANETs. IEEE Trans. Intell. Transp. Syst. 16(6), 2985–2996 (2015)
  2. 2.
    Lim, K., Manivannan, D.: An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks. Veh. Commun. 4, 30–37 (2016)
  3. 3.
    Arya, K.V., Tripathi, K.N.: Power aware and secure routing in mobile and ad-hoc networks. In: 2013 IEEE 8th International Conference on Industrial and Information Systems, pp. 477–482. IEEE (2013)
  4. 4.
    Malathi, A., Sreenath, N.: Black hole attack prevention and detection in VANET using modified DSR protocol. Int. J. Comput. Appl. 168(7) (2017)
  5. 5.
    Tobin, J., Thorpe, C., Murphy, L.: An approach to mitigate black hole attacks on vehicular wireless networks. In: 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), pp. 1–7. IEEE (2017)
  6. 6.
    Rupareliya, J., Vithlani, S., Gohel, C.: Securing VANET by preventing attacker node using watchdog and Bayesian network theory. Procedia Comput. Sci. 79, 649–656 (2016)
  7. 7.
    Abumansoor, O., Boukerche, A.: A secure cooperative approach for nonline-of-sight location verification in VANET. IEEE Trans. Veh. Technol. 61(1), 275–285 (2011)
  8. 8.
    Malhi, A.K., Batra, S.: Genetic-based framework for prevention of masquerade and DDoS attacks in vehicular ad-hoc networks. Secur. Commun. Netw. 9(15), 2612–2626 (2016)
  9. 9.
    Shabut, A.M., Dahal, K.P., Bista, S.K., Awan, I.U.: Recommendation based trust model with an effective defence scheme for MANETs. IEEE Trans. Mob. Comput. 14(10), 2101–2115 (2014)
  10. 10.
    Mokhtar, B., Azab, M.: Survey on security issues in vehicular ad hoc networks. Alexandria Eng. J. 54(4), 1115–1126 (2015)
  11. 11.
    Chen, J.M., Li, T.T., Panneerselvam, J.: TMEC: a trust management based on evidence combination on attack-resistant and collaborative internet of vehicles. IEEE Access (2018)
  12. 12.
    Djahel, S., Naït-Abdesselam, F., Zhang, Z., Khokhar, A.: Defending against packet dropping attack in vehicular ad hoc networks. Secur. Commun. Netw. 1(3), 245–258 (2008)
  13. 13.
    Tripathi, K.N., Sharma, S.C.: A trust based model (TBM) to detect rogue nodes in vehicular ad-hoc networks (VANETS). Int. J. Syst. Assur. Eng. Manag. 1–15 (2019)
  14. 14.
    Zhang, S.S., Wang, S.W., Xia, H., Cheng, X.G.: An attack-resistant reputation management system for mobile ad hoc networks. Procedia Comput. Sci. 147, 473–479 (2019)
  15. 15.
    Yang, S., Liu, Z., Li, J., Wang, S., Yang, F.: Anomaly detection for internet of vehicles: a trust management scheme with affinity propagation. Mob. Inf. Syst. (2016)
  16. 16.
    Fotohi, R., Ebazadeh, Y., Geshlag, M.S.: A new approach for improvement security against DoS attacks in vehicular ad-hoc network. Int. J. Adv. Comput. Sci. Appl. 7(7), 10–16 (2016)
  17. 17.
    Dhurandher, S.K., Obaidat, M.S., Jaiswal, A., Tiwari, A., Tyagi, A.: Vehicular security through reputation and plausibility checks. IEEE Syst. J. 8(2), 384–394 (2013)
  18. 18.
    Pandey, K., Raina, S.K., Rao, R.S.: Performance analysis of routing protocols for vehicular adhoc networks using NS2/SUMO. In: 2015 IEEE international advance computing conference (IACC), pp. 844–848. IEEE (2015)

Copyright information

© Springer Nature Singapore Pte Ltd. 2021

Authors and Affiliations

  • Kuldeep Narayan Tripathi
    • 1
    Email author
  • Gourav Jain
    • 1
  • Ashish Mohan Yadav
    • 1
  • S. C. Sharma
    • 1
  1. 1.Electronics and Computer Discipline, DPTIndian Institute of Technology RoorkeeRoorkeeIndia

Personalised recommendations