CFP last date
20 May 2024
Reseach Article

Detecting Malicious Vehicles and Regulating Traffic in VANET using RAODV Protocol

by V. Lakshmi Praba, A. Ranichitra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 84 - Number 1
Year of Publication: 2013
Authors: V. Lakshmi Praba, A. Ranichitra
10.5120/14544-2626

V. Lakshmi Praba, A. Ranichitra . Detecting Malicious Vehicles and Regulating Traffic in VANET using RAODV Protocol. International Journal of Computer Applications. 84, 1 ( December 2013), 36-41. DOI=10.5120/14544-2626

@article{ 10.5120/14544-2626,
author = { V. Lakshmi Praba, A. Ranichitra },
title = { Detecting Malicious Vehicles and Regulating Traffic in VANET using RAODV Protocol },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 84 },
number = { 1 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 36-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume84/number1/14544-2626/ },
doi = { 10.5120/14544-2626 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:59:51.289964+05:30
%A V. Lakshmi Praba
%A A. Ranichitra
%T Detecting Malicious Vehicles and Regulating Traffic in VANET using RAODV Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 84
%N 1
%P 36-41
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Recent developments in wireless communication technologies led to the evolution of Vehicular Ad-hoc Network (VANET). The main goal of VANET is to provide communication between vehicles without compromising security. Controlling the traffic and identifying misbehaving (malicious) vehicles plays an important role in road safety. A vehicle can be defined as malicious if it doesn't send acknowledgement to a trusted authority or if the speed of the vehicle suddenly changes or if its registration renewal time expires. Such malicious vehicles have to be isolated and should not be allowed to participate in the network further. In this paper, traffic control is achieved by maintaining the distance between the vehicles and the defined malicious vehicles are isolated and further communication is stopped with the malicious vehicle. The existing Ad-hoc On Demand Distance Vector (AODV) protocol has been suitably modified to achieve the above mentioned road safety measures and has been made as Robust AODV protocol (RAODV). RAODV was analyzed using the performance metrics Packet delivery ratio, Dropped packets, average End_to_End delay and Routing Overhead to show that it achieves the goals presented above.

References
  1. H. K Choi, I. H Kim, J. C Yoo, "Secure and Efficient Protocol for Vehicular Ad-hoc Network with Privacy Preservation", EURASIP Journal on Wireless Communications and Networking", 2011.
  2. Jose Maria de Fuentes, Ana Isabel Gonzaez-Tablas, Arturo Ribagorda, "Overview of Secuirty issues in Vehicular Ad-hoc Networks" 2010.
  3. Yipin Sun, Rongxing Lu,Xiaodong Lin, Xuemin Shen, Jinshu Su," An Efficient Pseudonymous Authentication Scheme with strong Privacy Preservation for Vehicular Communications" IEEE Transactions on Vehicular Technology,2010.
  4. T. Taleb, E. Sakhaee, A. Jamalipour, K. Hashimoto, N. Kato, and Y. Nemoto, "A stable routing protocol to support its services in vanet networks" IEEE Transactions on Vehicular Technology, vol. 56, no. 6, pp. 3337–3347, November 2007.
  5. Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer," A secure routing protocol for Ad-hoc networks"Proceedings, 10th IEEE International Conference on Network Protocols,Nov 2002,pp 78 – 87.
  6. Qing Li, Meiyuan Zhao,Jesse Walker, Yih-Chun Hu, Adrian Perrig, Wada Trappe, " SEAR: A Secure Efficient Ad-hoc On Demand Routing Protocol for Wireless Networks" ASIACCS'08.
  7. Leiyuan Li , Chunxiao Chigan "Token Routing: A Power Efficient Method for Securing AODV Routing Protocol", Proceedings of the 2006 IEEE International Conference on Networking, sensing and Control, pp 29 -34.
  8. Zheng Ming Shen , J. P Thomas, "Security and QoS Self-Optimization in Mobile Ad-Hoc Networks" IEEE Transactions on Mobile Computing, vol 7, Issue 9, Sep 2008, pp 1138 – 1151.
  9. Imran Raza, S. A. Hussain,"Identification of malicious nodes in an AODV pure Ad-hoc network through guard nodes" Elsevier Computer Communications vol 31, Issue 9, June 2008, pp 1796–1802.
  10. Monis Akhlaq, M Noman Jafri, Muzammil A Khan, and Baber Aslam, "Addressing Security Concerns of Data Exchange in AODV Protocol", Proceedings of World Academy of Science, Engineering and Technology, vol 16, Nov 2006, pp 29-33. ISSN 1307-6884.
  11. Shidi Xu, yi Mu and Willy Susilo,"Authenticated AODV Routing Protocol Using One-Time Signature and Transitive signature Schemes", Journal of Networks, Vol 1 No. 1, May 2006, pp 47 – 53.
  12. Sonali Bhargava and Dharma P. Agrawal," Secuirty Enhancements in AODV Protocol for Wireless Ad-hoc Networks", 54th IEEE Vehicular Technology Conference 2001,vol 4, pp 2143 – 2147
  13. R. Kravets, S. Yi, and P. Naldurg," A Security-Aware Routing Protocol for Wireless Ad-hoc Networks", In ACM Symposium of Mobile Ad-hoc Networking and Computing 2001.
  14. Yogendra Kuamr Jain and Pankaj Sharma," Trust Based Ad-hoc On-demand Distance Vector for MANET",National Conference on Secuirty Issues in Network Technologies (NCSI 2012) .
  15. Manel Guerrero Zapata, "Secure Ad-hoc On-Demand Distance Vector(SAODV) Routing", draft-guerro-manet-saodv-06. txt, September 5,2006.
  16. C. Perkins, E. Belding-Royer, S. Das, "Ad-hoc On-Demand Distance Vector(AODV) routing", RFC 3561,July 2003.
  17. Mubashir Husain Rehmani, Aline Carneiro Viana, Sidney Doria, Reda Senouci, " A Tutorial on the implementation of Ad-hoc on Demand Distance Vector(AODV) Protocol in Network Simulator (NS-2), jun 2009.
  18. Alekha Kumar Mishra, Bibhu Dutta Sahoo, "A Modified Adaptive-SAODV Prototype for Performance Enhancement in MANET",IJ-CA-ETS, vol 1, issue 2, Sep '09, pp 443-447.
  19. Manel Guerrero Zapata, N. Asokan, "Securing Ad-hoc Routing Protocols" ACM 2002.
  20. NS2 Network Simulator http://www. isi,edu/nsnam/ns
Index Terms

Computer Science
Information Sciences

Keywords

VANET AODV RAODV CA RSU Malicious