Call for Paper
CAE solicits original research papers for the April 2023 Edition. Last date of manuscript submission is March 31, 2023.
EDMVP: Efficient Detection for Malicious Vehicles using AODV Protocol
Mandeep Kaur Saggi and Anshu Joshi. Article: EDMVP: Efficient Detection for Malicious Vehicles using AODV Protocol. Communications on Applied Electronics 2(3):1-5, June 2015. Published by Foundation of Computer Science, New York, USA. BibTeX
@article{key:article, author = {Mandeep Kaur Saggi and Anshu Joshi}, title = {Article: EDMVP: Efficient Detection for Malicious Vehicles using AODV Protocol}, journal = {Communications on Applied Electronics}, year = {2015}, volume = {2}, number = {3}, pages = {1-5}, month = {June}, note = {Published by Foundation of Computer Science, New York, USA} }
Abstract
The VANETs are a subset of Mobile Ad-hoc NET works (MANETs) in which communication nodes are mainly vehicles. Every vehicle in VANET must be authenticated to establish a reliable and secure network communication. In this paper, a security approach has been proposed in AODV protocol to detect a malicious vehicle. A vehicle can be defined as malicious if it doesn't send acknowledgement to a trusted authority or if it's not registered with the centralized authority. Such malicious vehicles have to be isolated and should not be allowed to participate in the network & further communication is blocked with the malicious vehicles. Sample architecture with centralized control unit, RSUs and some vehicles is illustrated to demonstrate the added security feature. The Proposed protocol was analyzed using the performance metrics Packet Delivery Ratio, Dropped Packets and End to End Delay.
Reference
- Jeong-Ah Jang "A Fixed Sensor-Based Intersection Collision Warning System in Vulnerable Line-of-Sight and/or Traffic-Violation-Prone Environment", IEEE Trans. Intelligent Transportation Systems, vol. no. 13, pp 1880-1890, Dec 2012.
- http://www. intechopen. com/ books/ computational-intelligence-and-modern- heuristics/ security-and-privacy- of- intelligent- vanets
- Iqbal, S. , Chowdhury, S. R. , Hyder, C. S. , Vasilakos, A. V. , & Wang, C. X. , "Vehicular communication: protocol design, testbed implementation and performance analysis", In Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, pp. 410-415, June 2009.
- Ahmad, A. , Doughan, M. , Gauthier, V. , Mougharbel, I. , & Marot, M. ," Hybrid multi-channel multi-hop MAC in VANETs", In Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia" ,pp. 353-357, November 2010.
- LIU B. , ZHONG Y. , ZHANG S. : 'Probabilistic isolation of malicious vehicles in pseudonym changing VANETs'. Seventh Int. Conf. on Computer and Information Technology (CIT 2007), 2007, pp. 967–972
- Qing Li, Meiyuan Zhao,Jesse Walker, Yih-Chun Hu, Adrian Perrig, Wada Trappe, " SEAR: A Secure Efficient Ad-hoc On Demand Routing Protocol for Wireless Networks" ASIACCS'08.
- Monis Akhlaq, M Noman Jafri, Muzammil A Khan, and Baber Aslam, "Addressing Security Concerns of Data Exchange in AODV Protocol", Proceedings of World Academy of Science, Engineering and Technology, vol 16, Nov 2006, pp 29-33. ISSN 1307-6884.
- Zheng Ming Shen , J. P Thomas, "Security and QoS SelfOptimization in Mobile Ad-Hoc Networks" IEEE Transactions on Mobile Computing, vol 7, Issue 9, Sep 2008, pp 1138 – 1151.
Keywords
MANET, VANET, Malicious node, V2V communication, Attacks.