CFP last date
20 May 2024
Reseach Article

Avoiding Prankster Attack in Case of Selfish Driver using Location Aware VANET Nodes

by Tanisha Saini, Maninderpal Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 106 - Number 18
Year of Publication: 2014
Authors: Tanisha Saini, Maninderpal Singh
10.5120/18706-9642

Tanisha Saini, Maninderpal Singh . Avoiding Prankster Attack in Case of Selfish Driver using Location Aware VANET Nodes. International Journal of Computer Applications. 106, 18 ( November 2014), 25-30. DOI=10.5120/18706-9642

@article{ 10.5120/18706-9642,
author = { Tanisha Saini, Maninderpal Singh },
title = { Avoiding Prankster Attack in Case of Selfish Driver using Location Aware VANET Nodes },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 106 },
number = { 18 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 25-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume106/number18/18706-9642/ },
doi = { 10.5120/18706-9642 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:39:45.760792+05:30
%A Tanisha Saini
%A Maninderpal Singh
%T Avoiding Prankster Attack in Case of Selfish Driver using Location Aware VANET Nodes
%J International Journal of Computer Applications
%@ 0975-8887
%V 106
%N 18
%P 25-30
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Vehicular Ad hoc Networks (VANETs) play a significant contribution in the field of Intelligent Transport Systems (ITS) which allow random vehicles to transmit security messages. Every node in VANETs works on the concept of single hop or multi-hop communication which means the nodes can move in a random manner within the network. The various vehicles which are moving in a random manner are considered as the moving nodes which are deployed in a haphazard behaviour in VANETs. Apart from these advantages, VANETs are much prone to security attacks which diminish the efficiency of network. The proper implementation of VANETs depends mainly on the security provided. Numerous techniques have been proposed in the last decade to provide security in VANETs. Hence, in this paper the main focus is being provided on the major attack in VANTEs which is called prankster attack. The nodes are deployed in the region having the information regarding the location with the help of Global Positioning System (GPS) where they get placed or located. The simulator used is NS-2. The simulated results reveal that the proposed methodology works in a similar way to minimize the prankster attack in case of selfish driver by the implementation of location aware nodes in VANETs.

References
  1. M. S. Al-Kahtani, "Survey on Security Attacksin Vehicular Ad hoc Networks (VANETs)," IEEE, 2012.
  2. S. Biswas, R. Tatchikou, and F. Dion, "Vehicle-to-Vehicle Wireless Protocols for Enhancing Highway Traffic Safety," IEEE Communications Magazine, vol. 44, no. 1, pp. 74-82, 2006.
  3. M Raya, P Papadimitratos, JP Hubaux, "Securing Vehicular Communications", IEEE Wireless Communications, vol 13, 2006.
  4. GMT Abdalla, SM Senouci "Current Trends in Vehicular Ad Hoc Networks," in proceedings of UBIROADS workshop, 2007.
  5. M Raya, J Pierre Hubaux," The security of VANETs," in proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks, 2005.
  6. Car-to-Car Communications, www. car-2-car. org
  7. S. Zeadally, R. Hunt, Y. Chen, A. Irwin, and A. Hassan, "Vehicular ad hoc networks (VANETs): status, results, and challenges," Telecommunication Systems, pp. 1–25, 2010.
  8. V. Paruchuri, "Inter-vehicular communications: Security and reliability issues," in International Conference on ICT Convergence (ICTC), , 2011, pp. 737-741.
  9. P. Papadimitratos, V. Gligor, and J. -P. Hubaux. Securing Vehicular Communications - Assumptions, Requirements, and Principles, In Proceedings of the Workshop on Embedded Security in Cars (ESCAR) 2006, November 2006.
  10. N. Sastry, U. Shankar and D. Wagner. "Secure Verification of Location Claims". In ACM Workshop on Wireless Security. WiSe 2003.
  11. T,W, Chim, S. M. Yiu, "SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs," Ad Hoc Networks, vol. 9, no. 2, pp. 189-203, March 2011.
  12. F. A. Ghaleb, M. A. Razzaque, I. F. Isnin "Security and Privacy Enhancement in VANETs using Mobility Pattern," IEEE, 2013.
  13. G. Samara, A. H. Wafaa Al-Salihy, R. Sures "Security Issues and Challenges of Vehicular Ad Hoc Networks (VANET)," IEEE, 2010.
  14. P. Seuwou, D. Patel, D. Protheroe, G. Ubakanma "Effective Security as an ill-defined Problem in Vehicular Ad hoc Networks (VANETs)".
  15. J. A. Dias, J. N. Isento, V. N. G. J. Soares, F. Farahmand, and J. J. P. C. Rodrigues "Testbed-based Performance Evaluation of Routing Protocols for Vehicular Delay-Tolerant Networks," IEEE, 2011.
  16. Chia-Chen Hung, H. Chan, and Eric Hsiao-Kuang Wu "Mobility Pattern Aware Routing for Heterogeneous Vehicular Networks," IEEE WCNC 2008.
  17. M. A. Javed and J. Y. Khan "A Geocasting Technique in an IEEE 802. 11p based Vehicular Ad hoc Network for Road Traffic Management," 2010.
  18. Y. Qian , K. Lu , and N. Moayeri "performance evaluation of a secure mac protocol for vehicular networks," IEEE, 2008.
  19. Ravinder singh "Design of trust model based on ideas of localization in opportunistic networks," IJSER , June 2013
Index Terms

Computer Science
Information Sciences

Keywords

Vehicular Ad hoc Networks (VANETs) Intelligent Transport Systems (ITS) Global Positioning System (GPS) Selfish Driver Prankster Attack.