Differential Evaluation Based Secure Ad-Hoc Protocol for Vanets
Author : Tamanna Gandotra and Gurpadam SinghVolume 8 No.1 January-March 2019 pp 38-43
Abstract
VANET is a special category of MANETs which is composed of moving vehicles, acting as nodes. Vehicular Ad-hoc Networks is aimed at increasing inter-vehicular communication, so that information collected in a vehicle can be shared with other vehicle users, with the aim of improving driving experience. Many studies have indicated that appropriate attack algorithms are essential to provide secure operation of a network. It has been observed that the use of optimum or sub-optimum values are ignored while detecting the wormhole attacks in VANETs. The use of differential evolution is ignored in existing literature which can find optimum values for attack detection based VANETs. It has been observed that the proposed technique outperforms existing techniques in terms of packet collision and throughput.
Keywords
VANET, AODV Protocol, Attacks, Differential Evolution
References
[1] G. Eason, B. Noble, and I. N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions”, Phil. Trans. Roy. Soc. London, Vol. A247, pp. 529–551, April 1955. (references)
[2] Al-Kahtani, and Mohammed Saeed, “Survey on security attacks in Vehicular Ad hoc Networks (VANETs)”, In Signal Processing and Communication Systems (ICSPCS), 2012 6th International Conference on, IEEE , pp. 1-9, 2012.
[3] Bibhu, Vimal, Roshan Kumar, Balwant Singh Kumar, and Dhirendra Kumar Singh, “Performance analysis of black hole attack in VANET”, International Journal Of Computer Network and Information Security, Vol. 4, No. 11, pp. 47, 2012.
[4] C. Lai, K. Zhang, N. Cheng, H. Li and X. Shen, “SIRC: A Secure Incentive Scheme for Reliable Cooperative Downloading in Highway VANETs”, IEEE Transactions on Intelligent Transportation Systems, Vol. 18, No. 6, pp. 1559-1574, 2017.
[5] A. Chinnasamy, S. Prakash, and P. Selvakumari, “Enhance trust based routing techniques against sinkhole attack in AODV based VANET”, International Journal of Computer Applications, Vol. 65, No. 15, 2013.
[6] Doaa Al-Terri, HadiOtrok, Hassan Barada, Mahmoud Al-Qutayri, and Yousof Al Hammadi, “Cooperative based tit-for-tat strategies to retaliate against greedy behavior in VANETs” Computer Communications, Vol. 104, No. 17, pp.108-118, 15 May 2017
[7] Guowei Wu, Jie Wang, Yong chuan Wang, and Lin Yao, “Pollution Attack Resistance Dissemination in VANETs Based on Network Coding” Procedia Computer Science, Vol. 83, pp. 131-138,2016.
[8] Hamssa Hasrouny, Abed Ellatif Samhat, Carole Bassil, and Anis Laouiti, “VANET security challenges and solutions” A survey, Vehicular Communications, Vol. 7, pp.7-20, 2017.
[9] Jay Rupareliya, Sunil Vithlani, and Chirag Gohel, “Securing VANET by Preventing Attacker Node Using Watchdog and Bayesian Network Theory, Procedia” Computer Science, Vol. 79, pp. 649-656,2016.
[10] Harbir, Sanjay Batish, and Arvind Kakaria, “An approach to detect the wormhole attack in vehicular adhoc networks”, International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN),Vol.1, pp. 86-89, 2012.
[11] K. Zaidi, M. B. Milojevic, V. Rakocevic, A. Nallanathan and M. Rajarajan, “Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection”, In IEEE Transactions on Vehicular Technology, Vol. 65, No. 8, pp. 6703-6714, 2016.
[12] QamasGul Khan Safi, SenlinLuo, Chao Wei, Limin Pan, and Qianrou Chen, “PIaaS: Cloud-oriented secure and privacy-conscious parking information as a service using VANETs”, Computer Networks, Vol. 124, pp. 33-45,2017.
[13] Rene Oliveira, Carlos Montez, Azzedine Boukerche, and Michelle S.Wangham, “Reliable data dissemination protocol for VANET traffic safety applications”, Ad Hoc Networks, Vol. 63, pp. 30-44, 2017.
[14] Sebastian Bittl, “Privacy conserving low volume information retrieval from backbone services in VANETs”, Vehicular Communications, Vol. 9, pp. 1-7, 2017.
[15] S. Dietzel, J. Petit, G. Heijenk and F. Kargl, “Graph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols”, IEEE Transactions on Vehicular Technology, Vol. 62, No. 4, pp. 1505-1518, 2013.
[16] Tyagi, Parul, and Deepak Dembla, “Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET)”, Egyptian Informatics Vol.18, pp.133-139, 2013.