Movement Abnormality Evaluation Model in the Partially Centralized VANETs for Prevention Against Sybil Attack

The VANETs carry many security concerns. One of the popular and dangerous attacks can be launched in the form of Sybil or Prankster attack, where an attacker inserts a fake position within in the cluster. The inserted fake node information can be utilized by the hackers in the case of selfish driver, traffic jams, selective collisions and other similar hazardous situations. To avoid such things the VANETs must be protected against such attacks. In this paper, a novel solution has been proposed to overcome the Sybil and prankster attacks on the VANETs. The new solution is capable of detecting the fake information injections by verifying the VANET node behaviour in the cluster. The behaviour of the node includes the direction, speed, pattern, etc. In case a node is found malicious, the whole cluster is reported against that node, and node is ordered to stop by the central control system. The proposed model has been developed using the random waypoint model. The random way point model is much closer to the real time VANETs. The random waypoint model has been compared against the reference point group model. The experimental results have shown the effectiveness of the proposed model.

[1]  Vimal Bibhu,et al.  Performance Analysis of Black Hole Attack in Vanet , 2012 .

[2]  S. RoselinMary,et al.  Early detection of DOS attacks in VANET using Attacked Packet Detection Algorithm (APDA) , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).

[3]  M. Milton Joe,et al.  Establishing Inter Vehicle Wireless Communication in Vanet and Preventing It from Hackers , 2013 .

[4]  Shikha Agrawal,et al.  A Detailed Survey on Misbehavior Node Detection Techniques in Vehicular Ad Hoc Networks , 2015 .

[5]  Omar Abdel Wahab,et al.  A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles , 2014, Comput. Commun..

[6]  Manjusha Pandey,et al.  Distributed Denial of Service Attacks: A Review , 2014 .

[7]  Georgios Kambourakis,et al.  Attacks and Countermeasures on 802.16: Analysis and Assessment , 2013, IEEE Communications Surveys & Tutorials.

[8]  Akbar Ghaffar Pour Rahbar,et al.  Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks , 2011, Multimedia Tools and Applications.

[9]  Arobinda Gupta,et al.  Detecting misbehaviors in VANET with integrated root-cause analysis , 2010, Ad Hoc Networks.

[10]  Ihn-Han Bae,et al.  A Misbehavior-Based Reputation Management System for VANETs , 2012 .

[11]  Gianluca Dini,et al.  SAD-SJ: A self-adaptive decentralized solution against Selective Jamming attack in Wireless Sensor Networks , 2013, 2013 IEEE 18th Conference on Emerging Technologies & Factory Automation (ETFA).

[12]  Arobinda Gupta,et al.  Distributed Misbehavior Detection in VANETs , 2009, 2009 IEEE Wireless Communications and Networking Conference.

[13]  Ditipriya Sinha,et al.  CBSRP: Cluster based secure routing protocol , 2014, 2014 First International Conference on Networks & Soft Computing (ICNSC2014).

[14]  Arobinda Gupta,et al.  Application of Secondary Information for Misbehavior Detection in VANETs , 2010, Networking.