Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks☆

Abstract VANETs enable wireless communication among vehicles and vehicle to infrastructure. Its main objective is to render safety, comfort and convenience on the road. VANET is different from ad-hoc networks due to its unique characteristics. However, because of lack of infrastructure and centralized administration, it becomes vulnerable to misbehaviors. This greatly threatens different aspects of VANET's security. VANET being such a useful network must provide adequate security measures for secure communication. The proposed algorithm DMN-Detection of Malicious Nodes in VANETs improves DMV Algorithm in terms of effective selection of verifiers for detection of malicious nodes and hence improves the network performance.

[1]  Arobinda Gupta,et al.  Distributed Misbehavior Detection in VANETs , 2009, 2009 IEEE Wireless Communications and Networking Conference.

[2]  Sangjin Kim,et al.  AntiSybil: Standing against Sybil Attacks in Privacy-Preserved VANET , 2012, 2012 International Conference on Connected Vehicles and Expo (ICCVE).

[3]  Vijay Laxmi,et al.  Machine Learning Approach for Multiple Misbehavior Detection in VANET , 2011, ACC.

[4]  Mohammed Saeed Al-kahtani,et al.  Survey on security attacks in Vehicular Ad hoc Networks (VANETs) , 2012, 2012 6th International Conference on Signal Processing and Communication Systems.

[5]  Gongjun Yan,et al.  Securing Vehicular Ad-hoc Networks Against Malicious Drivers: A Probabilistic Approach , 2011, 2011 International Conference on Complex, Intelligent, and Software Intensive Systems.

[6]  Ivan Stojmenovic,et al.  Data-centric Misbehavior Detection in VANETs , 2011, ArXiv.

[7]  Dijiang Huang,et al.  Cheater Detection in Vehicular Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[8]  Suresh Limkar,et al.  Performance Investigation of DMV (Detecting Malicious Vehicle) and D&PMV (Detection and Prevention of Misbehave/Malicious Vehicles): Future Road Map , 2013, FICTA.

[9]  Jun Bi,et al.  Research on Vehicular Ad Hoc Networks , 2009, 2009 Chinese Control and Decision Conference.

[10]  R. P. Barnwal,et al.  Heartbeat Message Based Misbehavior Detection Scheme for Vehicular Ad-hoc Networks , 2012, 2012 International Conference on Connected Vehicles and Expo (ICCVE).

[11]  Vijay Laxmi,et al.  Misbehavior Detection Based on Ensemble Learning in VANET , 2011, ADCONS.

[12]  Akbar Ghaffar Pour Rahbar,et al.  Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks , 2011, Multimedia Tools and Applications.

[13]  Arobinda Gupta,et al.  Detecting misbehaviors in VANET with integrated root-cause analysis , 2010, Ad Hoc Networks.

[14]  Sherali Zeadally,et al.  Security attacks and solutions for vehicular ad hoc networks , 2010, IET Commun..

[15]  Omar Abdel Wahab,et al.  A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles , 2014, Comput. Commun..

[16]  A. Festag,et al.  A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS Version 1 . 1 June 2 , 2006 , 2006 .

[17]  Ihn-Han Bae,et al.  A Misbehavior-Based Reputation Management System for VANETs , 2012 .

[18]  Soumaya Cherkaoui,et al.  Detecting faulty and malicious vehicles using rule-based communications data mining , 2011, 2011 IEEE 36th Conference on Local Computer Networks.

[19]  Boucif Amar Bensaber,et al.  Decision support protocol for intrusion detection in VANETs , 2013, DIVANet '13.

[20]  Debasish Jena,et al.  Security in vehicular adhoc networks: a survey , 2011, ICCCS '11.

[21]  Arobinda Gupta,et al.  Application of Secondary Information for Misbehavior Detection in VANETs , 2010, Networking.

[22]  Kpatcha M. Bayarou,et al.  Central misbehavior evaluation for VANETs based on mobility data plausibility , 2012, VANET@MOBICOM.

[23]  G. Singh,et al.  Fox-Hole Model for Data-centric Misbehaviour Detection in VANETs , 2012, 2012 Third International Conference on Computer and Communication Technology.