A trust based model (TBM) to detect rogue nodes in vehicular ad-hoc networks (VANETS)
Tóm tắt
Due to the exponential growth in the automobile industry, we need intelligence transportation system. Vehicular ad-hoc network (VANET), a part of the intelligence transportation system is the network created by vehicles. Security is the main issue in vehicular ad-hoc network. Many intruders try to use the vulnerability presents in the vehicular network. In VANET communication between two nodes, may involves multiple intermediate nodes to forward the data due to low transmission range. The intermediate nodes must be trustworthy enough to be a part of the communication process. Rogue or malicious nodes can accept the data and drop the data in between source to destination. In this paper, we proposed a trust based model to detect rogue nodes in a vehicular network. The proposed model first estimates the trust value of the nodes and based on that identifies the rogue nodes in the network. We select only trustworthy nodes to relay the data in the routing process. The simulation and performance evaluation of the proposed model performed with the help of network simulator (NS-2). We evaluate the performance of the network based on the four performance matrices i.e. successful packet delivery fraction, throughput, routing load and end to end delay. The simulation result shows that the proposed model enhances network performance significantly.
Tài liệu tham khảo
Arya KV, Tripathi KN (2013) Power aware and secure routing in mobile and ad-hoc networks. In: 2013 IEEE 8th international conference on industrial and information systems, pp 477–482
Bedi P, Jindal V (2014) Use of big data technology in vehicular ad-hoc networks. In: International conference on advances in computing, communications and informatics (ICACCI), pp 1677–1683
citation_journal_title=EURASIP J Wirel Commun Netw; citation_title=Investigation of routing reliability of vehicular ad hoc networks; citation_author=MH Eiza, Q Ni, T Owens, G Min; citation_volume=1; citation_issue=1; citation_publication_date=2013; citation_pages=179; citation_doi=10.1186/1687-1499-2013-179; citation_id=CR3
Issariyakul T, Hossain E (2009) Introduction to network simulator 2 (NS2). In: Introduction to network simulator NS2. Springer, Boston, pp 1–18
Kerrache CA, Calafate CT, Lagraa N, Cano JC, Manzoni P (2016a) Hierarchical adaptive trust establishment solution for vehicular networks. In: 2016 IEEE 27th annual international symposium on personal, indoor, and mobile radio communications (PIMRC), pp 1–6
citation_journal_title=Veh Commun; citation_title=TFDD: a trust-based framework for reliable data delivery and DoS defense in VANETs; citation_author=CA Kerrache, N Lagraa, CT Calafate, A Lakas; citation_volume=1; citation_issue=9; citation_publication_date=2016; citation_pages=254-267; citation_id=CR6
citation_journal_title=Procedia Comput Sci; citation_title=Detection of malicious nodes (DMN) in vehicular ad-hoc networks; citation_author=U Khan, S Agrawal, S Silakari; citation_volume=1; citation_issue=46; citation_publication_date=2015; citation_pages=965-972; citation_doi=10.1016/j.procs.2015.01.006; citation_id=CR7
citation_journal_title=Future Gener Comput Syst; citation_title=A detection and prevention system against collaborative attacks in mobile ad hoc networks; citation_author=FA Khan, M Imran, H Abbas, MH Durad; citation_volume=1; citation_issue=68; citation_publication_date=2017; citation_pages=416-427; citation_doi=10.1016/j.future.2016.07.010; citation_id=CR8
Krajzewicz D, Hertkorn G, Rössel C, Wagner P (2002) SUMO (simulation of urban mobility)—an open-source traffic simulation. In: Proceedings of the 4th middle east symposium on simulation and modelling (MESM20002), pp 183–187
citation_journal_title=Comput Electr Eng; citation_title=Collaborative trust aware intelligent intrusion detection in VANETs; citation_author=N Kumar, N Chilamkurti; citation_volume=40; citation_issue=6; citation_publication_date=2014; citation_pages=1981-1996; citation_doi=10.1016/j.compeleceng.2014.01.009; citation_id=CR10
Kumar PV, Maheshwari M (2014) Prevention of Sybil attack and priority batch verification in VANETs. In: International conference on information communication and embedded systems (ICICES 2014), pp 1–5
citation_journal_title=Commun Netw; citation_title=Applications of VANETs: present & future; citation_author=V Kumar, S Mishra, N Chand; citation_volume=5; citation_issue=01; citation_publication_date=2013; citation_pages=12; citation_doi=10.4236/cn.2013.51B004; citation_id=CR12
citation_journal_title=IEEE Trans Intell Transp Syst; citation_title=ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks; citation_author=W Li, H Song; citation_volume=17; citation_issue=4; citation_publication_date=2016; citation_pages=960-969; citation_doi=10.1109/TITS.2015.2494017; citation_id=CR13
citation_journal_title=Veh Commun; citation_title=An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks; citation_author=K Lim, D Manivannan; citation_volume=1; citation_issue=4; citation_publication_date=2016; citation_pages=30-37; citation_id=CR14
citation_journal_title=Procedia Comput Sci; citation_title=Trust-based scheme for alert spreading in VANET; citation_author=A Ltifi, A Zouinkhi, MS Bouhlel; citation_volume=1; citation_issue=73; citation_publication_date=2015; citation_pages=282-289; citation_doi=10.1016/j.procs.2015.12.031; citation_id=CR15
citation_journal_title=IEEE Trans Intell Transp Syst; citation_title=A survey on recent advances in vehicular network security, trust, and privacy; citation_author=Z Lu, G Qu, Z Liu; citation_volume=23; citation_issue=99; citation_publication_date=2018; citation_pages=1-7; citation_id=CR16
citation_journal_title=Perform Eval; citation_title=DJAVAN: detecting jamming attacks in vehicle ad hoc networks; citation_author=L Mokdad, J Ben-Othman, AT Nguyen; citation_volume=1; citation_issue=87; citation_publication_date=2015; citation_pages=47-59; citation_doi=10.1016/j.peva.2015.01.003; citation_id=CR17
citation_journal_title=Veh Commun; citation_title=Adaptive trust and privacy management framework for vehicular networks; citation_author=TN Pham, CK Yeo; citation_volume=13; citation_publication_date=2018; citation_pages=1-2; citation_id=CR18
Pooja B, Pai MM, Pai RM, Ajam N, Mouzna J. (2014) Mitigation of insider and outsider DoS attack against signature based authentication in VANETs. In: 2014 Asia-Pacific conference on computer aided system engineering (APCASE), pp 152–157
citation_journal_title=Comput Electr Eng; citation_title=A reliable routing protocol for vehicular ad hoc networks; citation_author=AI Saleh, SA Gamel, KM Abo-Al-Ez; citation_volume=1; citation_issue=64; citation_publication_date=2017; citation_pages=473-495; citation_doi=10.1016/j.compeleceng.2016.11.011; citation_id=CR20
citation_journal_title=IEEE Internet Things J; citation_title=An efficient and lightweight intrusion detection mechanism for service-oriented vehicular networks; citation_author=H Sedjelmaci, SM Senouci, MA Abu-Rgheff; citation_volume=1; citation_issue=6; citation_publication_date=2014; citation_pages=570-577; citation_doi=10.1109/JIOT.2014.2366120; citation_id=CR21
citation_journal_title=Cluster Computing; citation_title=Cloud and IoT-based emerging services systems; citation_author=S Sharma, V Chang, US Tim, J Wong, S Gadia; citation_volume=22; citation_issue=1; citation_publication_date=2019; citation_pages=71-91; citation_doi=10.1007/s10586-018-2821-8; citation_id=CR22
Singh A, Sharma P (2015) A novel mechanism for detecting DOS attack in VANET using enhanced attacked packet detection algorithm (EAPDA). In: 2015 2nd international conference on recent advances in engineering & computational sciences (RAECS), pp 1–5
citation_journal_title=Egypt Inform J; citation_title=Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET); citation_author=P Tyagi, D Dembla; citation_volume=18; citation_issue=2; citation_publication_date=2016; citation_pages=133-139; citation_doi=10.1016/j.eij.2016.11.003; citation_id=CR24
citation_journal_title=Comput Netw; citation_title=Holistic approach for coupling privacy with safety in VANETs; citation_author=A Wahid, H Yasmeen, MA Shah, M Alam, SC Shah; citation_volume=148; citation_publication_date=2019; citation_pages=214-230; citation_doi=10.1016/j.comnet.2018.08.017; citation_id=CR25
citation_journal_title=Ad Hoc Netw; citation_title=Using trust model to ensure reliable data acquisition in VANETs; citation_author=X Yao, X Zhang, H Ning, P Li; citation_volume=1; citation_issue=55; citation_publication_date=2017; citation_pages=107-118; citation_doi=10.1016/j.adhoc.2016.10.011; citation_id=CR26
citation_journal_title=IEEE Trans Veh Technol; citation_title=Host-based intrusion detection for vanets: a statistical approach to rogue node detection; citation_author=K Zaidi, MB Milojevic, V Rakocevic, A Nallanathan, M Rajarajan; citation_volume=65; citation_issue=8; citation_publication_date=2016; citation_pages=6703-6714; citation_doi=10.1109/TVT.2015.2480244; citation_id=CR27