TITLE

Data Redundancy with Location-Based Detection Scheme for Detecting Attacks in VANET

AUTHOR(S)
Juliet, A. Noble Mary; Valarmathi, M. L.; Pavithra, R. Joan
PUB. DATE
July 2014
SOURCE
Australian Journal of Basic & Applied Sciences;Jul2014, Vol. 8 Issue 10, p343
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Background: Vehicle communications play a significant role in providing safety transportation by means of safety message exchange. Vehicular ad hoc networks aim at enriching road safety by providing vehicle-to-vehicle communications and safety related applications. Objective: To detect the insider attackers with the valid key, and identify the attacker who insert or chage malicious information into VANET. Results: The novel approach to protect vehicular communication is based on entity-centric trust, which is accomplished by PKI. But this method fails to detect the attackers with valid key. Current proposal for solving this problem is based on the data redundancy approach which is one of the promising approaches for data consistency checking. It detects inconsistencies in the received messages by comparing redundant messages received from multiple paths. In case of attackers having large share on the incoming edges, dynamic thresholds are used to detect the attacks. This approach is suffered by colluding attackers and removal of attacker nodes. Conclusion: In this paper we extend the data redundancy approach by enabling location-based misbehaviour detection (LBMD) scheme. In this scheme each vehicle on the path can independently decide whether the information received is correct or false. The decision is based on stability of recent messages and new alert with reported and estimated vehicle locations. This method reduces the communication and computation costs involved in detecting attacks.
ACCESSION #
97368499

 

Related Articles

  • THE CASE FOR DYNAMIC KEY DISTRIBUTION FOR PKI-BASED VANETS. Salem, Ahmed H.; Abdel-Hamid, Ayman; El-Nasr, Mohamad Abou // International Journal of Computer Networks & Communications;Jan2014, Vol. 6 Issue 1, p61 

    Vehicular Ad hoc Networks (VANETs) are becoming a reality where secure communication is a prerequisite. Public key infrastructure (PKI) can be used to secure VANETs where an onboard tamper proof device (TPD) stores a number of encryption keys which are renewed upon visiting a certificate...

  • Accelerate Communication Authenticate Protocol for Vehicular Adhoc Networks. Jeevidha, S.; Revathi, J.; Rajeswari, A.; Kanimozhi, M.; Gugapriya, P. // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 2, p2042 

    Vehicular ad hoc networks (VANETs) adopt the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs) for their safety. In any PKI system, confirm of a get message is performed by verifying if the certificate of the sender is included in the ongoing CRL, and validating the...

  • Performance Evaluation of Node Eviction Schemes in Inter-Vehicle Communication. AZOGU, IKECHUKWU; HONG LIU // International Journal of Performability Engineering;May2013, Vol. 9 Issue 3, p345 

    This paper assesses the performance of node eviction schemes in vehicular networking. To secure inter-vehicle communication, a misbehaved node's certificate must be revoked to stop it from injecting messages in the network. The evaluation metrics trade off speed, time taken to remove the node,...

  • Infrastructure based Authentication in VANETs. Chaurasia, Brijesh Kumar; Verma, Shekhar // International Journal of Multimedia & Ubiquitous Engineering;2011, Vol. 6 Issue 2, p41 

    In a vehicular ad-hoc networks (VANETs), the veracity of a message requires authentication of the source vehicle. In this work, a technique for mutual authentication of a vehicle and road side unit (RSU) that preserves the privacy of the vehicle is proposed. The technique relies on the traffic...

  • A Novel Delay- and Reliability- Aware Inter-Vehicle Routing Protocol. Ghafoor, Kayhan Zrar; Bakar, Kamalrulnizam Abu; AL-Hashimi, Haidar N.; Lee, Kevin C. // Network Protocols & Algorithms;Jun2010, Vol. 2 Issue 2, p66 

    Intelligent transportation systems could improve transportation safety, driving assistance and traffic management system. Vehicular Ad hoc Network (VANET) is an emerging field of technology, embedding wireless communication networks into vehicles to achieve intelligent transportation systems....

  • Secure Vehicle-to-roadside Communication Protocol Using Certificate-based Cryptosystem. Hu Xiong; Zhiguang Qin; Fagen Li // IETE Technical Review (Medknow Publications & Media Pvt. Ltd.);May-Jun2010, Vol. 27 Issue 3, p214 

    As various applications of vehicular ad hoc networks (VANETs) have been proposed, security has become one of the big research challenges and is receiving increasing attention. In this paper, we propose a secure and an efficient vehicle-to-roadside communication protocol by using the recently...

  • VANETs AND ITS RELATED ISSUES: AN EXTENSIVE SURVEY. KATUKA, JATAU ISAAC; ABD. LATIFF, MUHAMMAD SHAFIE // Journal of Theoretical & Applied Information Technology;8/20/2014, Vol. 66 Issue 1, p547 

    Vehicular Ad hoc Networks (VANETs) is a type of ad hoc network whereby its nodes are represented by vehicles. It originated from the desire to ensure drivers comfort and safety in road transportation so as to reduce the risk of accidents on the roads. VANETs have some unique features that make...

  • Performance Analysis for Priority-Based Broadcast in Vehicular Networks. Rinara Woo; Jung-Hoon Song; Dong Seog Han // International Journal of Distributed Sensor Networks;2013, p1 

    Transportation safety is one of the most important applications of vehicular ad hoc networks which is based on IEEE 802.11p. When a vehicle is in an emergency situation, a safety-related message is transmitted to the neighb oring vehicles and infrastructures. Vehicles and infrastructures...

  • Fully homomorphic encryption based on the ring learning with rounding problem. Fucai Luo; Fuqun Wang; Kunpeng Wang; Kefei Chen // IET Information Security;2019, Vol. 13 Issue 6, p639 

    Almost all existing well-known fully homomorphic encryption (FHE) schemes, which are based on either the learning with errors (LWE) or the ring LWE problem, require expensive Gaussian noise sampling. In this study, the authors propose an FHE scheme based on the ring learning with rounding (RLWR)...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics