Malicious Route Detection in Vehicular Ad-hoc Network using Geographic Routing with Masked Data

Page: [319 - 325] Pages: 7

  • * (Excluding Mailing and Handling)

Abstract

Background: Vehicular Ad-hoc Network is the subset of Mobile Ad-hoc Network, Intelligent Transport System and Internet of Things. The acting nodes in VANET are the vehicles on the road at any moment.

Objective: The anonymity character of these vehicles is opening the opportunity for malicious attacks. Malicious routes increase the data retransmission and hence, the performance of routing will be degraded. The main objective this work is to identify the malicious routes, avoid the data transmission using these routes and increase the packet delivery ratio.

Methods: In the proposed system called Geographic Routing Protocol with Masked data, two binary- codes called mask and share have been generated to identify the malicious route. The original data is encoded using these binary-codes and routed to the destination using the geographic routing protocol. It is reconstructed at the destination node and based on the encoding technique the malicious routes and malicious nodes are identified. Simulations were conducted with varying speed and varying network size in 20 km2 geographical area.

Results: The average packet delivery ratio with varying speed is 0.817 and with varying networksize is 0.733.

Conclusion: The proposed geographical routing protocol with masked data technique outperforms than traditional geographic protocol and Detection of Malicious Node protocol, by 0.102 and 0.264 respectively with different speeds and by 0.065 and 0.1616 respectively with different network size.

Keywords: Vehicular Ad-hoc Network (VANET), malicious node, malicious route, geographical routing protocol, masking, malicious node detection.

Graphical Abstract

[1]
K. Jamshidi, and M. Karimzadeh, "Providing security in Vehicular ad hoc networks (VANETs) through historical data collection", Int. J. Comput. Sci. Eng., vol. 3, no. 4, pp. 1393-1398, April 2011.
[2]
P. Saravanan, and T. Arunkumar, "Fuzzy enabled geographic routing protocol for vehicular ad hoc networks", Int. Rev. Comput. Software (IRECOS), vol. 9, no. 6, pp. 1101-1107, 2014.
[3]
B. Mokhtar, and M. Azab, "Survey on security issues in vehicular ad hoc networks", Alexandria Eng. J., vol. 54, no. 4, pp. 1115-1126, 2015.
[4]
F. Wang, Y. Xu, H. Zhang, Y. Zhang, and L. Zhu, "2FLIP: A two-factor lightweight privacy-preserving authentication scheme for VANET", IEEE Trans. Vehicular Technol., vol. 65, no. 2, pp. 896-911, February 2015.
[5]
S. Dietzel, R. van der Heijden, J. Petit, and F. Kargl, "Context-adaptive detection of insider attacks in vanet information dissemination schemes", IEEE Vehicular Networking Conference (VNC), 2015 pp. 287-294 December 2015
[6]
K. Liu, K. Ma, and A. Abraham, "Introducing secure data transmission scheme in a heterogeneous environment", Information and Communication Technologies (WICT) Third World Congress on IEEE. 2013, pp. 13-18, December 2013.
[7]
B. Wang, H. Qian, X. Sun, J. Shen, and X. Xie, "A secure data transmission scheme based on information hiding in wireless sensor networks", International Journal of Security and Its Applications, vol. 9, no. 1, pp. 125-138, January 2015.
[8]
Y.J. Abueh, and H. Liu, "Message authentication in driverless cars"In Technologies for Homeland Security (HST), 2016 IEEE Symposium on, pp. 1-6. May 2016.
[9]
U. Khan, S. Agrawal, and S. Silakari, "Detection of malicious nodes (dmn) in vehicular Ad-Hoc networks", Procedia Comput. Sci., vol. 46, no. 9, pp. 965-972, January 2015.
[10]
S. Ahmed, and K. Tepe, "Recommendation trust for improved malicious node detection in ad hoc networks"In 86th Vehicular Technology Conference (VTC-FALL). IEEE, Toronto, ON, Canada, September 2017.
[11]
X. Zhang, R. Li, W. Zhao, and R. Wu, Detection of malicious nodes in NDN VANET for interest packet popple broadcast diffusion attack"In Anti-counterfeiting, Security, and Identification (ASID), 2017 11th IEEE International Conference IEEE, pp. 114-118. Xiamen, China, October 2017.
[12]
S. Sharma, and S. Gambhir, "CRCMD&R: Cluster and reputation based cooperative malicious node detection & removal scheme in MANETs"In Intelligent Systems and Control (ISCO), 2017 11th International Conference on IEEE, pp. 336-340. Coimbatore, India, January 2017.
[13]
D. Kukreja, and B.V.R. Reddy, "Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack", J. Amb. Intel. Hum. Comp., vol. 9, no. 4, pp. 941-956, August 2018.
[14]
T. Bouali, S.M. Senouci, and H. Sedjelmaci, "A distributed detection and prevention scheme from malicious nodes in vehicular networks", Int. J. Commun. Sys., vol. 29, no. 10, pp. 1683-1704, July 2016.
[15]
R. Jahan, and P. Suman, "Detection of malicious node and development of routing strategy in VANET"In Signal Processing and Integrated Networks (SPIN), 2016 3rd International Conference IEEE, pp. 472-476. Noida, India, February 2016.