DETECTING MALICIOUS VEHICLE IN A VANET SCENARIO BY INCORPORATING SECURITY IN AODV PROTOCOL

Vehicular Ad hoc Networks (VANET) has emerged as a recognized advancement in wireless technologies. Each node in the network may be either a vehicle or Road Side Unit (RSU) which has to be equipped with the necessary communication facility. Every vehicle in VANET must be authenticated to establish a reliable and secure network communication. The AODV routing protocol which is normally applied in a VANET scenario does not detect malicious vehicles, if it exist. In this paper, a security mechanism has been incorporated in the AODV protocol to strengthen it as Robust AODV (RAODV) to detect a malicious vehicle. Sample architecture with centralized control unit, RSUs and some vehicles is illustrated to demonstrate the added security feature. AODV routing protocol has been applied in a simulated environment using NS-2 package. Performance metrics such as Packet Delivery Ratio, End to End delay, Routing Overhead and Number of dropped packets, for various vehicle speed were analyzed with the RAODV protocol.

[1]  Pin-Han Ho,et al.  RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks , 2008, 2008 IEEE International Conference on Communications.

[2]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[3]  Srdjan Capkun,et al.  The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.

[4]  Yu Wang,et al.  Routing in vehicular ad hoc networks: A survey , 2007, IEEE Vehicular Technology Magazine.

[5]  Nader Moayeri,et al.  Design Secure and Application-oriented Vanet , 2008 .

[6]  Raja Sengupta,et al.  Medium Access Control Protocol Design for Vehicle–Vehicle Safety Messages , 2007, IEEE Transactions on Vehicular Technology.

[7]  Pin-Han Ho,et al.  AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.

[8]  S. Jaap,et al.  Evaluation of Routing Protocols for Vehicular Ad Hoc Networks in City Traffic Scenarios , 2005 .

[9]  Egon Schulz,et al.  Medium access and radio resource management for ad hoc networks based on UTRA TDD , 2001, MobiHoc '01.

[10]  A. Festag,et al.  A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS Version 1 . 1 June 2 , 2006 , 2006 .

[11]  Markus Radimirsch,et al.  Medium access and radio resource management for ad hoc networks based on UTRA TDD , 2001, MobiHoc '01.

[12]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[13]  Michalis Faloutsos,et al.  Routing in Vehicular Networks : Feasibility , Security and Modeling Issues , 2006 .

[14]  Pin-Han Ho,et al.  ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.