CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

A Robust Security Algorithm for VANETs

by Harpreet Kaur, Amit Grover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 142 - Number 1
Year of Publication: 2016
Authors: Harpreet Kaur, Amit Grover
10.5120/ijca2016909668

Harpreet Kaur, Amit Grover . A Robust Security Algorithm for VANETs. International Journal of Computer Applications. 142, 1 ( May 2016), 40-45. DOI=10.5120/ijca2016909668

@article{ 10.5120/ijca2016909668,
author = { Harpreet Kaur, Amit Grover },
title = { A Robust Security Algorithm for VANETs },
journal = { International Journal of Computer Applications },
issue_date = { May 2016 },
volume = { 142 },
number = { 1 },
month = { May },
year = { 2016 },
issn = { 0975-8887 },
pages = { 40-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume142/number1/24864-2016909668/ },
doi = { 10.5120/ijca2016909668 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:43:48.855261+05:30
%A Harpreet Kaur
%A Amit Grover
%T A Robust Security Algorithm for VANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 142
%N 1
%P 40-45
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The VANETs carry several security considerations. One in every of the popular and dangerous attacks is launched within the variety of Sybil, connectivity holes or cut-up attack, wherever associated in Nursing assaulter inserts a faux position inside within the cluster. The inserted faux node data is used by the hackers within the case of inconsiderate driver, traffic jams, selective collisions and different similar dangerous things. To avoid such things the VANETs should be protected against such attacks. During this paper, a completely unique answer has been projected to beat the Sybil and cut-up attacks on the VANETs. The new answer is capable of police work the faux data injections by confirmatory the VANET node behavior within the cluster. The behavior of the node includes the direction, speed and pattern. The projected model has been developed mistreatment the random waypoint model. The random waypoint model has been compared against the point of reference cluster model. The experimental results have shown the effectiveness of the projected model and also shows that RWPM is better than RPGM.

References
  1. S. RoselinMary, M. Maheshwari, “Early Detection of DOS Attacks in VANET Using Attacked Packet Detection Algorithm (APDA)”, vol. 1, issue 1, pp-237-240 IEEE (2013).
  2. Daeinabi, A., Rahbar, A.G.: Detection of malicious vehicles (DMV) through monitoring in vehicular ad-hoc networks. Multimedia Tools Appl. vol 66(2), pp- 325–338 (2013).
  3. Khan, Uzma, Shikha Agrawal, and Sanjay Silakari. "A Detailed Survey on Misbehavior Node Detection Techniques in Vehicular Ad Hoc Networks."Information Systems Design and Intelligent Applications. vol 1, pp-11-19 Springer India (2015).
  4. Constantinos Kolias, Georgios Kambourakis, Stefanos Gritzalis, “Attacks and Countermeasures on 802.16: Analysis and Assessment”, CST, vol.15, issue 1, pp. 487-514, IEEE (2013).
  5. Vulimiri, A., Gupta, A., Roy, P., Muthaiah, S.N., Kherani, A.A.: Application of secondary information for misbehavior detection in VANETs. IFIP. LNCS, vol. 6091, pp. 385–396.Springer,Berlin (2010).
  6. Ghosh,M.,Varghese,A.,Kherani,A.A.,Gupta,A.: Distributed misbehavior detection in VANETs.In:Wireless Communications and Networking Conference,WCNC IEEE, pp. 1–6 (2009).
  7. Kim, C.H., Bae, and I.H.: A misbehavior based reputation management system for VANETS.LNEE vol. 181, pp- 441–450 (2012).
  8. Ghosh, M., Varghese, A., Gupta, A., Kherani, A.A., Muthaiah, S.N.: Detecting misbehaviors in VANET with integrated root-cause analysis. Ad Hoc Network.vol. 8,issue 7, pp-778–790 Elsevier (2010).
  9. Ms. Poonam Barua, Mr. Sanjeev Indora, “Overview of Security Threats in WSN”, vol. 2, issue 7, pp. 422- 426, IJCSMC( 2013).
  10. Marco Tiloca, Domenico De Guglielmo, Gianluca Dini and Giuseppe Anastasi, “SAD-SJ: a Self-Adaptive Decentralized solution against Selective Jamming attack in Wireless Sensor Networks”, ETFA, vol. 1, pp. 1-8, IEEE ( 2013).
  11. Bibhu, V., Roshan, K., Singh, K. B., & Singh, D. K. (2012). Performance Analysis of black hole attack in VANET. International Journal of Computer Network and Information Security(IJCNIS),4(11),pp-47-54 (2012).
  12. Joe, M. M., Shaji, R. S., & Kumar, K. A. (2013). Establishing Inter Vehicle Wireless Communication in Vanet and Preventing It from Hackers. International Journal of Computer Network and Information Security (IJCNIS), 5(8), pp- 55-61 (2013).
  13. Sonali Swetapadma Sahu, Manjusha Pandey, “Distributed Denial of Service Attacks: A Review”, vol. 1, pp. 65-71, IJMECS (2014).
Index Terms

Computer Science
Information Sciences

Keywords

VANET security VANET secure mobility connectivity hole avoidance wormhole detection.