CFP last date
20 May 2024
Reseach Article

Implementation of Temporal Attacks in Vehicular Ad Hoc Networks

Published on December 2011 by Nitesh Kr. Prajapati, Jyoti Grover, M.S.Gaur
International Conference on Electronics, Information and Communication Engineering
Foundation of Computer Science USA
ICEICE - Number 5
December 2011
Authors: Nitesh Kr. Prajapati, Jyoti Grover, M.S.Gaur
c2fee0c1-f41e-4b91-a0b4-719363614f29

Nitesh Kr. Prajapati, Jyoti Grover, M.S.Gaur . Implementation of Temporal Attacks in Vehicular Ad Hoc Networks. International Conference on Electronics, Information and Communication Engineering. ICEICE, 5 (December 2011), 18-21.

@article{
author = { Nitesh Kr. Prajapati, Jyoti Grover, M.S.Gaur },
title = { Implementation of Temporal Attacks in Vehicular Ad Hoc Networks },
journal = { International Conference on Electronics, Information and Communication Engineering },
issue_date = { December 2011 },
volume = { ICEICE },
number = { 5 },
month = { December },
year = { 2011 },
issn = 0975-8887,
pages = { 18-21 },
numpages = 4,
url = { /specialissues/iceice/number5/4304-iceice037/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 International Conference on Electronics, Information and Communication Engineering
%A Nitesh Kr. Prajapati
%A Jyoti Grover
%A M.S.Gaur
%T Implementation of Temporal Attacks in Vehicular Ad Hoc Networks
%J International Conference on Electronics, Information and Communication Engineering
%@ 0975-8887
%V ICEICE
%N 5
%P 18-21
%D 2011
%I International Journal of Computer Applications
Abstract

Vehicular Ad Hoc Network (VANET) is vulnerable to temporal attacks in which a malicious node either impedes or delays the forwarding of critical safety messages received from neighboring nodes. It can also perform replay attack by sending the information of events occurred earlier. VANET applications are based on periodic exchange of safety packets. It is very important that all the safety packets are sent on time so that proper action should be taken. It is the responsibility of each node in VANET to forward the received safety packet to its neighboring nodes. Attacker node exploits VANET vulnerabilities and performs these attacks. We discuss these attacks in brief and analyze their impact on VANET performance through NCTUns-6.0 simulations. We also propose counter measures for these attacks.

References
  1. D. Jiang and L. Delgrossi. IEEE 802.11p: Towards an International Standard for Wireless Access in Vehicular En- vironments. In Vehicular Technology Conference, 2008. VTC Spring 2008. IEEE, pages 2036–2040, 2008.
  2. Amer Aijaz, Bernd Bochow, Florian Dtzer, Andreas Festag, Matthias Gerlach, Rainer Kroh, and Tim Leinmller. Attacks on Inter Vehicle Communication Systems - an Analysis. In In Proc. WIT, pages 189–194, 2006.
  3. Nai-Wei Lo and Hsiao-Chien Tsai. Illusion Attack on VANET Applications - A Message Plausibility Problem. In Globecom Workshops, 2007 IEEE, pages 1–8, 2007.
  4. M. Raya and J.P. Hubaux. Securing Vehicular Ad Hoc Networks. Journal of Computer Security, 15(1):39–68, 2007.
  5. Mainak Ghosh, Anitha Varghese, Arobinda Gupta, Arzad A.Kherani, and Skanda N. Muthaiah. Detecting Misbehaviors in VANET with Integrated Root-cause Analysis. Ad Hoc Netw. 8:778–790, September 2010.
  6. Philippe Golle, Dan Greene, and Jessica Staddon. Detecting and Correcting Malicious Data in VANETs. In VANET ’04: Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, pages 29–37, New York, NY, USA, 2004. ACM.
  7. Gongjun Yan, Stephan Olariu, and Michele C. Weigle. Pro- viding VANET Security Through Active Position Detection. Comput. Commun., 31(12):2883–2897, 2008.
  8. Maxim Raya, Panagiotis Papadimitratos, Virgil D. Gligor, and Jean-pierre Hubaux. On data centric trust establishment in ephemeral ad hoc networks. In IEEE INFOCOM, 2008.
  9. R. K Schmidt, T. Leinmuller, E. Schoch, A. Held, and G. Schafer. Vehicle Behavior Analysis to Enhance Security in VANETs. In Vehicle to Vehicle Communication, V2VCOM, 2008.
  10. Nctuns 6.0, Network Simulator and Emulator. http://NSL. csie.nctu.edu.tw/nctuns.html.
  11. Maxim Raya, Panagiotis Papadimitratos, Virgil D. Gligor, and Jean-pierre Hubaux. On data centric trust establishment in ephemeral ad hoc networks. In IEEE INFOCOM, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

VANET Packet Replay Packet Delay Packet Suppression attack simulation