Imposter Detection Based on Location in Vehicular Ad-Hoc Network
Authors: Sanjoy Das, Akash Arya, Rishi Pal Singh
Abstract:
Vehicular Ad hoc Network is basically the solution of several problems associated while vehicles are plying on the road. In this paper, we have focused on the detection of imposter node while it has stolen the ID's of the authenticated vehicle in the network. The purpose is to harm the network through imposter messages. Here, we have proposed a protocol namely Imposter Detection based on Location (IDBL), which will store the location coordinate of the each vehicle as the key of the authenticity of the message so that imposter node can be detected. The imposter nodes send messages from a stolen ID and show that it is from an authentic node ID. So, to detect this anomaly, the first location is checked and observed different from original vehicle location. This node is known as imposter node. We have implemented the algorithm through JAVA and tested various types of node distribution and observed the detection probability of imposter node.
Keywords: Authentication, detection, IDBL protocol, imposter node, node detection.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1315769
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 807References:
[1] S. Sesay, Z Yang and Jianhua He, "A survey on Mobile Ad Hoc Network", Information Technology Journal 3 (2), pp. 168-175, 2004.
[2] Moustafa, H., Zhang, Y.: Vehicular networks: Techniques, Standards, and Applications. CRC Press, (2009).
[3] Yaseer Toor et al., “Vehicle Ad Hoc Networks: Applications and Related Technical issues”, IEEE Communications surveys & Tutorials, vol 10, No 3, pp. 74-88, 3rd quarter 2008.
[4] Y.- C. Hu and K. Laberteaux, “Strong Security on a Budget,” Wksp. Embedded Security for Cars, Nov. 2006;http://www.crhc.uiuc.edu/~yihchun/
[5] D. Sutariya, “Data Dissemination Techniques in Vehicular Ad Hoc Network,” International Journal of Computer Applications, Volume 8– No.10, PP.35-39, October 2010.
[6] V. H. La and A. Cavalli, “Security Attacks and Solutions in Vehicular Ad Hoc Networks: A Survey,” International Journal on Ad Hoc Networking Systems (IJANS) Vol. 4, No. 2, April 2014.
[7] A. Pathre, C. Agrawal, and A. Jain, “Identification of Malicious Vehicle in Vanet Environment from Ddos Attack,” J. Glob. Res. Comput. Sci., vol. 4, no. 6, pp. 1– 5, 2013.
[8] U. Khan, S. Agrawal, and S. Silakari, “Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks,” Procedia Comput. Sci, ICICT, Elsevier. vol. 46, 2014, pp. 965–972, 2015
[9] J. Newsome, E. Shi, D. Song and A. Perrig. The Sybil Attack in Sensor Networks: Analysis and Defenses. In Proc. of the Third International Symposium on Information Processing in Sensor Networks (IPSN 2004).
[10] Hussain R, Son J, Oh H. Anti Sybil: Standing against Sybil attacks in privacy preserved VANETs. In: International Conference on Connected Vehicles and Expo, IEEE; 2012. p. 108-113.
[11] C. Selva Lakshmi et al “Secured Multi Message authentication protocol for Vehicular Communication,” International Journal of Advanced Research in computer and communication Engineering. vol-2, Issue 12, December 2013
[12] C. Zhang et al., “An efficient message authentication scheme for vehicular communication,” IEEE Trans. Vehicular Technology, vol. 57, no. 6, pp-3357-3368, Nov. 2008.
[13] Dilendrashukla, Akash Vaibhav, Sanjoy das, Prashant Johri, “Security and attack analysis in VANET- A survey,” to be published in the preceding of IEEE International conference on computing communication and automation (ICCCA 2016). 29-30 April 2016.
[14] R. K. Schmidt et al., “Exploration of Adaptive Beaconing for Efficient Intervehicle Safety Communication,” In IEEE Network, vol. 24, Issues.1, pp. 14-19, Feb. 2010.
[15] Chen, Y., Jian, W.,& Jiang, W.(2009) “An improved AOMDV routing protocol for V2V communication,” In IEEE intelligent vehicles symposium (IV”09, June 2009, pp. 1115-1120), 2009
[16] Tong Zhou et al., “P2DAP – Sybil Attacks Detection in Vehicular Ad Hoc Networks,” IEEE Journal on selected areas in communications, Vol. 29, Issues. 3, pp. 582-594, March 2011.
[17] Manik Lal Das et al., “A novel remote user authentication scheme using bilinear pairings,” In the proceeding of Elsevier computer and society, Vol. 25, Issues.3, pp. 184-189, 2006
[18] Ajay Rawati, Santosh Sharma and Rama Susil, “VANET: Security Attacks On Its Possible Solutions,” Journal of Information and Operations Management, Vol. 3, Issue.1, pp.301-304, 2012
[19] Tyagi, Pand Dembla, D., “Investigating the security threats in Vehicular ad hoc Networks (VANETs): Towards security engineering for safer on-road transportation,” International Conference on Advances in Computing, Communications and Informatics, pp. 2084 – 2090, Sept. 2014.
[20] Akash Vaibhav, Dilendra Shukla, Sanjoy Das, Subrata Sahana, Prashant Johri, "Security Challenges, Authentication, Application and Trust Models for Vehicular Ad Hoc Network- A Survey", International Journal of Wireless and Microwave Technologies (IJWMT), Vol.7, No.3, pp.36-48, 2017.DOI: 10.5815/ijwmt.2017.03.04