CFP last date
01 May 2024
Call for Paper
June Edition
CAE solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 01 May 2024

Submit your paper
Know more
Reseach Article

EDMVP: Efficient Detection for Malicious Vehicles using AODV Protocol

by Mandeep Kaur Saggi, Anshu Joshi
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 2 - Number 3
Year of Publication: 2015
Authors: Mandeep Kaur Saggi, Anshu Joshi
10.5120/cae-1688

Mandeep Kaur Saggi, Anshu Joshi . EDMVP: Efficient Detection for Malicious Vehicles using AODV Protocol. Communications on Applied Electronics. 2, 3 ( June 2015), 1-5. DOI=10.5120/cae-1688

@article{ 10.5120/cae-1688,
author = { Mandeep Kaur Saggi, Anshu Joshi },
title = { EDMVP: Efficient Detection for Malicious Vehicles using AODV Protocol },
journal = { Communications on Applied Electronics },
issue_date = { June 2015 },
volume = { 2 },
number = { 3 },
month = { June },
year = { 2015 },
issn = { 2394-4714 },
pages = { 1-5 },
numpages = {9},
url = { https://www.caeaccess.org/archives/volume2/number3/375-1688/ },
doi = { 10.5120/cae-1688 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-09-04T19:40:02.813203+05:30
%A Mandeep Kaur Saggi
%A Anshu Joshi
%T EDMVP: Efficient Detection for Malicious Vehicles using AODV Protocol
%J Communications on Applied Electronics
%@ 2394-4714
%V 2
%N 3
%P 1-5
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The VANETs are a subset of Mobile Ad-hoc NET works (MANETs) in which communication nodes are mainly vehicles. Every vehicle in VANET must be authenticated to establish a reliable and secure network communication. In this paper, a security approach has been proposed in AODV protocol to detect a malicious vehicle. A vehicle can be defined as malicious if it doesn't send acknowledgement to a trusted authority or if it's not registered with the centralized authority. Such malicious vehicles have to be isolated and should not be allowed to participate in the network & further communication is blocked with the malicious vehicles. Sample architecture with centralized control unit, RSUs and some vehicles is illustrated to demonstrate the added security feature. The Proposed protocol was analyzed using the performance metrics Packet Delivery Ratio, Dropped Packets and End to End Delay.

References
  1. Jeong-Ah Jang "A Fixed Sensor-Based Intersection Collision Warning System in Vulnerable Line-of-Sight and/or Traffic-Violation-Prone Environment", IEEE Trans. Intelligent Transportation Systems, vol. no. 13, pp 1880-1890, Dec 2012.
  2. http://www. intechopen. com/ books/ computational-intelligence-and-modern- heuristics/ security-and-privacy- of- intelligent- vanets
  3. Iqbal, S. , Chowdhury, S. R. , Hyder, C. S. , Vasilakos, A. V. , & Wang, C. X. , "Vehicular communication: protocol design, testbed implementation and performance analysis", In Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, pp. 410-415, June 2009.
  4. Ahmad, A. , Doughan, M. , Gauthier, V. , Mougharbel, I. , & Marot, M. ," Hybrid multi-channel multi-hop MAC in VANETs", In Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia" ,pp. 353-357, November 2010.
  5. LIU B. , ZHONG Y. , ZHANG S. : 'Probabilistic isolation of malicious vehicles in pseudonym changing VANETs'. Seventh Int. Conf. on Computer and Information Technology (CIT 2007), 2007, pp. 967–972
  6. Qing Li, Meiyuan Zhao,Jesse Walker, Yih-Chun Hu, Adrian Perrig, Wada Trappe, " SEAR: A Secure Efficient Ad-hoc On Demand Routing Protocol for Wireless Networks" ASIACCS'08.
  7. Monis Akhlaq, M Noman Jafri, Muzammil A Khan, and Baber Aslam, "Addressing Security Concerns of Data Exchange in AODV Protocol", Proceedings of World Academy of Science, Engineering and Technology, vol 16, Nov 2006, pp 29-33. ISSN 1307-6884.
  8. Zheng Ming Shen , J. P Thomas, "Security and QoS SelfOptimization in Mobile Ad-Hoc Networks" IEEE Transactions on Mobile Computing, vol 7, Issue 9, Sep 2008, pp 1138 – 1151.
Index Terms

Computer Science
Information Sciences

Keywords

MANET VANET Malicious node V2V communication Attacks.