Detection of malicious node and development of routing strategy in VANET

Routing in vehicular ad-hoc network is current area of research due to fast mobility of vehicles. A new route in very less time has to be developed to communicate with the base station. If any node behaving like malicious and creates attack on network, than whole communication will be squeeze. This paper presents a routing strategy to prevent from attack and identify the malicious node. The strategy has been implemented on QualNet 5.0 and compared with other routing protocols in the presence of malicious nodes.

[1]  Mohammed Erritali,et al.  A review and classification of various VANET Intrusion Detection Systems , 2013, 2013 National Security Days (JNS3).

[2]  K. G. Preetha,et al.  Enhanced beaconless routing mechanism in VANET , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[3]  Shrikant S. Tangade,et al.  A survey on attacks, security and trust management solutions in VANETs , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[4]  Azzedine Boukerche,et al.  Algorithms and Protocols for Wireless and Mobile Ad Hoc Networks: Boukerche/Mobile , 2008 .

[5]  Abbas Jamalipour,et al.  Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[6]  Mohammed Erritali,et al.  Performance evaluation of ad hoc routing protocols in VANETs , 2013 .

[7]  Low Tang Jung,et al.  Bee inspired QoS routing in VANET , 2014, 2014 4th World Congress on Information and Communication Technologies (WICT 2014).

[8]  P. Varalakshmi,et al.  Reliable graph based routing in VANET environment , 2014, 2014 International Conference on Recent Trends in Information Technology.

[9]  Fatos Xhafa,et al.  VANET Simulators: A Survey on Mobility and Routing Protocols , 2011, 2011 International Conference on Broadband and Wireless Computing, Communication and Applications.

[10]  Andrea Goldsmith,et al.  Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).

[11]  Al-Sakib Khan Pathan Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .

[12]  P. S. Nithya Darisini,et al.  A survey of routing protocols for VANET in urban scenarios , 2013, 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering.

[13]  Azzedine Boukerche,et al.  Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks , 2008 .

[14]  Christian Callegari,et al.  Advances in Computing, Communications and Informatics (ICACCI) , 2015 .

[15]  Hannes Hartenstein,et al.  VANET: Vehicular Applications and Inter-Networking Technologies , 2010, VANET.

[16]  Sangheethaa Sukumaran,et al.  Intersection based Traffic Aware Routing in VANET , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[17]  Kalkundri Ravi,et al.  AODV routing in VANET for message authentication using ECDSA , 2014, 2014 International Conference on Communication and Signal Processing.

[18]  Akhtar Husain,et al.  Comparative analysis of location and zone based routing in VANET with IEEE802.11p in city scenario , 2015, 2015 International Conference on Advances in Computer Engineering and Applications.