Security mechanism for Collision Avoidance and Attack Prevention Formants

International Journal of Computer Trends and Technology (IJCTT)          
© 2015 by IJCTT Journal
Volume-23 Number-2
Year of Publication : 2015
Authors : Harpreet Kaur, Mrs.SupreetKaur


Harpreet Kaur, Mrs.SupreetKaur "Security mechanism for Collision Avoidance and Attack Prevention Formants". International Journal of Computer Trends and Technology (IJCTT) V23(2):73-75, May 2015. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
The VANETs are the vehicular ad-hoc networks, which facilitates the communication between the vehicles within the same cluster and with vehicles in the other clusters. The VANETs are being used to provide various types of information based upon the traffic jams, accident prevention, location of other nodes in the cluster, etc. to the vehicular nodes. The new era will be comprised of the automatically driven vehicular nodes in the VANET clusters, where the computer operated vehicles will automatically drive themselves, manages the traffic or will perform several other operations together. The hackers, the selfish drivers, terrorist or other individual or groups may attacks the VANETs for their own reasons. A selfish hacker may clear its way by sending false information or disabling other nodes by several forms of denial of service attacks. In this paper, the issue of the unavailability of the nodes is being addressed using the new security scheme for the VANETs with automatically driven vehicles. The proposed scheme will comprise of false information detection, malicious node marking, traffic pattern analysis, packet flood detection modules. The proposed scheme will mark the hackers or malicious nodes on the basis of false information detection on the very first step. Afterwards it will analyze the traffic coming from the nodes, and will apply the pattern and flood detection modules over the traffic being received from the various components of the VANET cluster. The attacking patterns or floods will be detected and their sources will be mitigated through the security mechanism. The performance of the proposed scheme will be evaluated using several parameters like throughput, end to end delay, packet delivery ratio, data drop rate, etc.

[1]S.RoselinMary, M. Maheshwari, Thamaraisselvan, “Early Detection of DoS Attack in VANET Using Attacked Packet Detection Algorithm (APDA),” vol. 1, IEEE, 2013.
[2] MarcoTiloca, Domenico De Guglielmo, Gianluca Dini and Giuseppe Anastasi, “SAD-SJ: a Self-Adaptive Decentralized solution against Selective Jamming attack in Wireless Sensor Networks,” vol. 18, pp. 1-8, IEEE 18th conference on Emerging Technologies and Factory Automation, 2013.
[3] Md. MonzurMorshed, Md. Rafiqul Islam, “CBSRP: Cluster Based Secure Routing Protocol,”IACC, vol. 3, pp. 571-576, IEEE, 2013.
[4] Seuwou, Patrice, Dilip Patel, Dave Protheroe, and George Ubakanma. "Effective security as an ill-defined problem in vehicular ad hoc networks (VANETs)," Road Transport Information and Control (RTIC 2012), IET and ITS Conference, pp. 1-6, 2012.
[5] Dias, João A., João N. Isento, Vasco NGJ Soares, FaridFarahmand, and Joel JPC Rodrigues. “Testbed-based performance evaluation of routing protocols for vehicular delaytolerant networks,” pp.51-55, IEEE, 2011.
[6] Sumra, Irshad Ahmed, HalabiHasbullah, J. A. Manan, MohsanIftikhar, Iftikhar Ahmad, and Mohammed Y. Aalsalem. "Trust levels in peer-to-peer (P2P) vehicular network," ITS Telecommunications (ITST), 2011 11th International Conference, pp. 708-714. IEEE, 2011.
[7] Mohammed Saeed Al-Kahtani “Survey on Security attacks in Vehicular ad hoc networks”, vol. 1,issue 1,IEEE, 2013. [8] AyonijaPathre, ChetanAgawal, Anurag Jain “Identification of malicious vehicle in VANET Environment from DDOS attack,” vol. 4,Journal of Global Research in computer Science,2013.
[9] Aditya Sinha, prof. Santosh K Mishra “Preventing VANET from DOS & DDOS Attack,” vol.4, International journal of engineering trends and Technology,2013.
[10] VinhHoa LA, Ana CAVALLI “ Security Attacks and solutions in Vehicular AdHoc Network : A Survey,” vol. 4, International Journal in AdHoc Networking System, 2014.

VANETs, security, DDoS, false information, malicious nodes.