Defensive mechanism for VANET security in game theoretic approach using heuristic based ant colony optimization

The communications in VANET consists of roadside units (RSUs) linked to each other or even to the Internet. In the recent vehicular approach, VANETs security properties have received more attention in research community. We improve the game theoretic approaches for the application cases having scenarios with few known opponents and others with opponent uncertainty. In this work, we plan to introduce a defensive mechanism for the VANET security with heuristic based ant colony optimization. The heuristic based ant model, worked with known opponents and unknown opponents based on the density of pheromone deposited in the road network path with new road path exploration with traversal of ants. Then the Nash equilibrium is applied with the game theoretic framework to identify the stability state of the players involved in it. Optimal exploitation of traffic organizes and security framework is investigated both in the static (e.g., preset roadside units) and active cases (e.g., mobile law enforcement units). An experimental evaluation is carried out to evaluate the performance of the proposed defensive mechanism in game theoretic approach using heuristic based ant colony optimization [DMGTA] for VANET security.

[1]  Paolo Bellavista,et al.  Dissemination and Harvesting of Urban Data Using Vehicular Sensing Platforms , 2009, IEEE Transactions on Vehicular Technology.

[2]  Tansu Alpcan,et al.  Security games for vehicular networks , 2008, Allerton 2008.

[3]  Tansu Alpcan,et al.  Centrality Analysis in Vehicular Networks , 2008 .

[4]  Peter Kulchyski and , 2015 .

[5]  Ghassan Samara,et al.  Security issues and challenges of Vehicular Ad Hoc Networks (VANET) , 2010, 4th International Conference on New Trends in Information Science and Service Science.

[6]  Reza Mortazavi,et al.  Distributed Sybil Attack Detection in VANET , 2011 .

[7]  Ana I. González-Tablas,et al.  Overview of security issues in Vehicular Ad-hoc Networks , 2011 .

[8]  Tansu Alpcan,et al.  Security games for vehicular networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[9]  Bertrand Ducourthial,et al.  Sybil Nodes Detection Based on Received Signal Strength Variations within VANET , 2009, Int. J. Netw. Secur..

[10]  Mario Gerla,et al.  Vehicular networks: Applications, protocols, and testbeds , 2011 .

[11]  Mohammad Abdollahi Azgomi,et al.  A Game Theoretic Approach for Quantitative Evaluation of Security by Considering Hackers with Diverse Behaviors , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[12]  Vijay Laxmi,et al.  A novel defense mechanism against sybil attacks in VANET , 2010, SIN.

[13]  Nicolas Christin,et al.  Predicted and Observed User Behavior in the Weakest-link Security Game , 2008, UPSEC.

[14]  Asif Ali Wagan,et al.  VANET Security Framework for Trusted Grouping Using TPM Hardware , 2010, 2010 Second International Conference on Communication Software and Networks.

[15]  Peng Ning,et al.  P2DAP — Sybil Attacks Detection in Vehicular Ad Hoc Networks , 2011, IEEE Journal on Selected Areas in Communications.