Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 31097
Malicious Vehicle Detection Using Monitoring Algorithm in Vehicular Adhoc Networks

Authors: S. Padmapriya


Vehicular Adhoc Networks (VANETs), a subset of Mobile Adhoc Networks (MANETs), refers to a set of smart vehicles used for road safety. This vehicle provides communication services among one another or with the Road Side Unit (RSU). Security is one of the most critical issues related to VANET as the information transmitted is distributed in an open access environment. As each vehicle is not a source of all messages, most of the communication depends on the information received from other vehicles. To protect VANET from malicious action, each vehicle must be able to evaluate, decide and react locally on the information received from other vehicles. Therefore, message verification is more challenging in VANET because of the security and privacy concerns of the participating vehicles. To overcome security threats, we propose Monitoring Algorithm that detects malicious nodes based on the pre-selected threshold value. The threshold value is compared with the distrust value which is inherently tagged with each vehicle. The proposed Monitoring Algorithm not only detects malicious vehicles, but also isolates the malicious vehicles from the network. The proposed technique is simulated using Network Simulator2 (NS2) tool. The simulation result illustrated that the proposed Monitoring Algorithm outperforms the existing algorithms in terms of malicious node detection, network delay, packet delivery ratio and throughput, thereby uplifting the overall performance of the network.

Keywords: Security, VANET, malicious vehicle detection, threshold value, distrust value

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 257


[1] M. Raya, J. Pierre, Hubaux, “Securing vehicular ad hoc Networks” Journal of Computer Security,vol.15, pp: 39-68,jan 2007.
[2] Saurabh Kumar Gaur, S.K. Tyagi and Pushpender Singh, VANET System for Vehicular Security Applications, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-6, January 2013.
[3] Kamran Zaidi, Milos Milojevic, Veselin Rakocevic and Muttukrishnan Rajarajan, Data Centric Rouge Node Detection in VANETs, International Conference on Trust Security and Privacy, IEEE 2014.
[4] Xiaoyan Zhu, Shunrong Jiang, Liangmin Wang, and Hui Li, ―Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks, IEEE Transactions on Vehicular Technology, vol. 63, no. 2, February 2014.
[5] M. Bharat, Dr. K. Santhi Sree and T .Mahesh Kumar, Authentication Solution for Security Attacks in VANETs, International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 8, August 2014.
[6] Mahsa Ghaznavi and Azizollah Jamshidi, A Reliable Spectrum Sensing Method in the Presence of Malicious Sensors in Distributed Cognitive Radio Network, IEEE Sensors Journal, Vol. 15, No. 3, 2014.
[7] Jia-Lun Tsai, An Improved Cross-Layer Privacy-Preserving Authentication in WAVE-Enabled VANETs, IEEE Communications Letters, Vol. 18, No. 11, November 2014.
[8] Ajay Rawat, Santosh Sharma, Rama Sushil, “VANET: Security Attack and its Possible Solutions”, Journal of Information and Operations Management ISSN: 0976–7754 & E-ISSN: 0976–7762, Volume 3, Issue 1, pp-301-304, 2013.
[9] Vishal Kumar, Shailendra Mishra, Narottam Chand, “Applications of VANETs Present & Future”, Communications and Network, 2013, 12-15.
[10] Sourav Kumar Bhoi, Pabitra Mohan Khilar, SIR: a secure and intelligent routing protocol for vehicular ad hoc network, IET Network., vol. 4, no. 3, pp. 185–194, 2014.
[11] Asif Ali Wagan, Bilal Munir Mughal & Halabi Hasbullah, VANET Security Framework for Trusted Grouping using TPM Hardware, IEEE Conference on Communication Software and Networks,2010.
[12] Omar Abdel Wahab, Hadi Otrok, Azzam Mourad, A cooperative watchdog model based on Dempster–Shafer for detecting misbehaving vehicles, Elsevier,2013.
[13] Romain Coussement, Boucif Amar Bensaber and Ismail Biskri, Decision Support Protocol for Intrusion Detection in VANETs, ACM 978-1-4503-2359-8/13/11,Barcelona, Spain, November 2013.
[14] Norbert Bi Bmeyer, Joël Njeukam, Jonathan Petit and Kpatcha M. Bayarou, Central Misbehavior Evaluation for VANETs based on Mobility Data Plausibility, Low Wood Bay, Lake District, UK, June 2012.
[15] Gongjun Yan, Danda B. Rawat, Bhed Bahadur Bista and Earl F. Shaner, General Active Position Detectors Protect VANET Security, IEEE International Conference on Broadband and Wireless Computing, Communication and Applications, 978-0-7695-4532-5/11,2011.
[16] Danda B. Rawat, Bhed B. Bista, Gongjun Yan, and Michele C. Weigle, Securing Vehicular Adhoc Networks against Malicious Drivers: A Probabilistic Approach, International Conference, IEEE, 2011.
[17] Sanjay K. Dhurandher and Mohammad S. Obaidat, Vehicular Security through Reputation and Plausibility Checks (VSRP), IEEE Systems Journal, vol. 8, no. 2, June 2014.
[18] Jeong-Ah Jang "A Fixed Sensor-Based Intersection Collision Warning System in Vulnerable Line-of-Sight and/or Traffic-Violation-Prone Environment", IEEE Transactions on Intelligent Transportation Systems, pp 1-11, 2011.