Detecting and Preventing False Nodes and Messages in Vehicular Ad-Hoc Networking (VANET) (original) (raw)
Related papers
A Detailed Survey on Misbehavior Node Detection Techniques in Vehicular Ad Hoc Networks
Advances in Intelligent Systems and Computing, 2015
Communication in Vehicular ad hoc Network relies on exchange of information among different vehicular nodes in the network. This helps to improve the safety, driving efficiency and comfort on the journey for the travellers. In this network, information received from other vehicles is utilized to make majority of the decisions. However, a node may behave malicious or selfish in order to get advantage over other vehicles. A misbehaving node may transmit false alerts, tamper messages, create congestion in the network, drop, delay and duplicate packets. Thus, detecting misbehavior in VANET is very crucial and indispensible as it might have disastrous consequences. This paper presents a detailed survey on some of the important research works proposed on detecting misbehavior and malicious nodes in VANETs. In addition to the details about the techniques used for misbehavior detection, nature of misbehavior, this paper categorizes the schemes for better understanding and also outlines several research scopes to make VANET more reliable and secure.
Algorithm to Detect Spurious Communications in Vehicular Ad hoc Networks
International Journal of Information and Network Security (IJINS), 2013
Vehicular ad hoc network is a form of mobile ad hoc networks in which end nodes are vehicles communicating to each other without a central control or pre-defined infrastructure. An important security consideration is event based alerts received by VANET nodes. In the presence of attackers, a chance to receive malicious alerts is increased and a response to such messages by the receiver can be dangerous. Therefore, an algorithm is designed to detect such communications in order to protect vehicles in VANET environments. The focus in this paper remains on the evaluation of proposed algorithm in terms of computational requirements. The computational complexity of suggested algorithm is determined to be in O(n 2 ) after computing the processing costs at individual levels of execution. It is also found that the algorithm is an efficient scheme of detecting spurious alert messages in VANETs as compared to some other suggested methods with equivalent or higher computation cost.
Detecting rogue nodes in vehicular ad-hoc networks (DETER)
2016
Vehicular ad hoc Networks (VANETs) are self-organizing networks of vehicles equipped with radios and processors. VANETs are very promising as they can make driving safer by improving road awareness through sharing of information from sensors. Vehicles communicate with each other wirelessly to exchange information and this exchange of information is susceptible to attacks of different kinds. There are some very important issues that need to be resolved before VANETs can be deployed on large scale. Security and privacy issues are undoubtedly the most important factors that need to be resolved. Amongst various problems to be solved in VANETs is the issue of rogue nodes and their impact on the network. This thesis discusses the problems associated with the security and privacy of vehicular networks in the presence of rogue nodes. The rogue nodes can share / inject false data in the network which can cause serious harm. The techniques proposed make VANETs secure and prevent them from the...
MNP: Malicious Node Prevention in Vehicular Ad Hoc Networks
Today, traffic security has become an obligation rather than a necessity. Hence to secure the traffic, provide comfort to the driver and the passengers, ensure safety of the pedestrians, infrastructure as well as the one's sitting inside the cars, Intelligent Transport System (ITS) was created. The base of ITS is formed by a class of networks called as VANET. The VANETs make communication between vehicles and vehicle to infrastructure possible. They vary from other Ad-hoc network because of their rare characteristics. VANETs are the networks which lack centralized control and infrastructure, in which the nodes are highly mobile, topology is extremely dynamic and the links are volatile. Consequently, VANET security is threatened-the network is vulnerable to number of mischief. The easiest of all the attacks on VANETs is that on the availability – the Black-hole attack. This attack is carried out by the malicious nodes which can even be the authentic users of the network, implying that the security procedures involving encryption and authentication will not help. Therefore, to secure the VANETs against this common type of attack, we have proposed an algorithm MNP-Malicious Node Prevention. MNP improves DMV (Detection of Malicious Vehicle algorithm) as well as DMN (Detection of Malicious Nodes algorithm) in a way that MNP simply prevents the malicious nodes from participating in the packet forwarding while as both DMV & DMN first identify the malicious nodes and then remove them. This way, DMV as well as DMN cause the loss of many data packets which may be important. Hence MNP greatly improves the performance of the network when under malicious attack.
Vehicular ad-hoc network (VANET) is a promising approach that provides safety measures and other application to the drivers on the vehicles. The focus of VANETs is to fulfil user's requirements on road side area which increases the safe and comfortable journey for users. It provides good communication like mobile ad-hoc network (MANET) when there is no intruders exist in the network. In VANET, communication depends on road safety such as emergency situation, vehicles tracking, messages monitoring and tracking of vehicles. But many attackers like black hole attack, wormhole attack and Sybil attack are more vulnerable to VANET. In order to provide efficient communication, we provide a malicious node identification routing mechanism which gives the valid route between two vehicles. To avoid several attacks, we introduce a protection mechanism that includes key management for preventing our network. Our proposed system provides efficient communication on VANET that focus on throughput, end-to-end delay, packet delivery ratio, detection rate and misdetection rate.
Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks
Procedia Computer Science, 2015
VANETs enable wireless communication among vehicles and vehicle to infrastructure. Its main objective is to render safety, comfort and convenience on the road. VANET is different from ad-hoc networks due to its unique characteristics. However, because of lack of infrastructure and centralized administration, it becomes vulnerable to misbehaviors. This greatly threatens ing such a useful network must provide adequate security measures for secure communication. The proposed algorithm DMN-Detection of Malicious Nodes in VANETs improves DMV Algorithm in terms of effective selection of verifiers for detection of malicious nodes and hence improves the network performance.
Data Centric Rogue Node Detection in VANETs
Vehicular ad hoc networks (VANETs) are the future of vehicular technology and Traffic Information Systems. In VANETs vehicles communicate by different types of beacon messages to inform each other of their position and speed to give them a sense of traffic around them. Vehicles can also send emergency messages in case of accidents or other hazards. The very fast moving nodes have to act quickly based on these emergency messages. However, a rogue node which sends false emergency messages can wreak havoc in the network that may even result in fatalities. This paper develops and simulates a technique to detect a rogue node that is sending false emergency messages in VANETs by cooperative exchange of data without the need of any infrastructure or revocation list. Also, the proposed mechanism will make VANETs fault tolerant and resilient against injection of false data.
Recognition and Elimination of Malicious Nodes in Vehicular Ad hoc Networks
2013
A Vehicular Ad-Hoc Network, or VANET, is a form of Mobile ad-hoc network, to provide communications among nearby vehicles and between vehicles and nearby fixed equipment (Base Stations) via radio waves. These have similar characteristics as mobile ad hoc networks, often in the form of multi-hop networks. Due to the high mobility of nodes network topology changes occur frequently. All nodes share the same channel leading to congestion in very dense networks. One important property that characterizes VANETs is that they are self-organizing, self-creating, and self administering and decentralized systems. This paper proposes detection and elimination of misbehaving nodes in VANETs using mobile agents. Mobile agents are employed for each node, for the collection of information of neighbours and to find the route from source to the destination. To find the malicious nodes among the intermediate nodes, mobility and power ratio of the intermediate nodes are continuously monitored with the ...
Recognition and Elimination of Malicious Nodes in Vehicular Ad hoc Networks (VANET’s)
2013
A Vehicular Ad-Hoc Network, or VANET, is a form of Mobile ad-hoc network, to provide communications among nearby vehicles and between vehicles and nearby fixed equipment (Base Stations) via radio waves. These have similar characteristics as mobile ad hoc networks, often in the form of multi-hop networks. Due to the high mobility of nodes network topology changes occur frequently. All nodes share the same channel leading to congestion in very dense networks. One important property that characterizes VANETs is that they are self-organizing, self-creating, and self administering and decentralized systems. This paper proposes detection and elimination of misbehaving nodes in VANETs using mobile agents. Mobile agents are employed for each node, for the collection of information of neighbours and to find the route from source to the destination. To find the malicious nodes among the intermediate nodes, mobility and power ratio of the intermediate nodes are continuously monitored with the ...
Imposter Detection Based On Location In Vehicular Ad-Hoc Network
2018
Vehicular Ad hoc Network is basically the solution of several problems associated while vehicles are plying on the road. In this paper, we have focused on the detection of imposter node while it has stolen the ID's of the authenticated vehicle in the network. The purpose is to harm the network through imposter messages. Here, we have proposed a protocol namely Imposter Detection based on Location (IDBL), which will store the location coordinate of the each vehicle as the key of the authenticity of the message so that imposter node can be detected. The imposter nodes send messages from a stolen ID and show that it is from an authentic node ID. So, to detect this anomaly, the first location is checked and observed different from original vehicle location. This node is known as imposter node. We have implemented the algorithm through JAVA and tested various types of node distribution and observed the detection probability of imposter node.