International Journal of Engineering Trends and Technology (IJETT) – Volume X Issue Y- Month 2015 ISSN: 2231-5381 http://www.ijettjournal.org Page 1 Malicious Node detection in Vehicle to Vehicle Communication J.Nethravathy #1 , Dr.G. Maragatham *2 # ¹M.Tech Information Technology Student, # ²Asst.Professor SRM University, Kattankulathur, Kancheepuram District, India, Chennai 603 203 1 [email protected]2 [email protected]Abstract In vehicular communications, specifically Vehicular Ad Hoc Networks (VANETs), is playing a vital role in the future safety and ease of our roads. VANETs will enhance driver safety and reduce traffic deaths and injuries by implementing collision avoidance and warning systems. In vehicular networks, broadcast communications are critically important, as many safety-related applications rely on single-hop beacon messages broadcast to neighbour vehicles. However, it becomes a challenging problem to design a broadcast authentication scheme for secure vehicle-to-vehicle communications. Especially when a large number of beacons arrive in a short time, vehicles are vulnerable to computation-based Denial of Service (DoS) attacks that excessive signature verification exhausts their computational resources. In the proposed system prediction based authentication (PBA)[1] is used in the sender side to detect DoS (Denial-of-Service)attacks before the signature verification. And, the Enhanced attacked packet detection algorithm [9] is used at the receiver side to detect malicious node. To further reduce the verification delay for some emergency applications, PBA is designed to exploit the sender vehicle’s ability to predict future beacons in advance. In addition, to prevent memory-based DoS attacks, PBA only stores shortened re-keyed Message Authentication Codes (MACs) of signatures without decreasing security. The simulation result demonstrates that PBA fast verifies almost 99% messages with low storage cost not only in high- density traffic environments and also the secured stateless protocol gives a better performance in comparison to energy consumption and throughput of network. Keywords – Denial-of-service (DoS),Message authentication codes(MACs), Prediction based authentication(PBA),Enhanced Attacked packet detection(EAPD). I. INTRODUCTION Vehicular ad hoc networks (VANETs) have recently attracted extensive attentions as a promising approach to enhance road safety, as well as to improve driving experience. By using a Dedicated Short-Range Communications (DSRC) technique, vehicles equipped with wireless On-Board Units (OBUs) can communicate with other vehicles and fixed infrastructure, e.g., Road-Side Units (RSUs), located at critical points of the road. Therefore, Vehicle-to-Vehicle (V2V) and Vehicle-to- Infrastructure (V2I) communications are regarded as two basic types of communications in VANETs. Once VANETs become available, numerous safe, commercial and convenient services can be deployed through a variety of vehicular applications. These applications mostly rely on vehicles’ OBUs to broadcast outgoing beacon messages and to validate incoming ones. The broadcast beacons often contain information about position, current time, speed, direction, driving status, etc. For example, by frequently broadcasting and receiving beacons, drivers are better aware of obstacles and collision scenarios. They may act early to avoid any possible damage, or to assign a new route in case of a traffic accident in the existing route. II. SYSTEM DESIGN A. Existing System: In the existing system a one-time signature scheme named Fast Auth [1] is used to provide lightweight, timely and nonrepudiation authentication for vehicle-to-vehicle communications. In Fast Auth [1],the author have used chained Huffman hash trees to generate a common public key and minimize the signature size for beacons sent during one prediction interval. Hence, Fast Auth first exploits the predictability of future beacons to achieve the instant authentication in VANETs. Short comings: If the receiver misses a beacon, it cannot work in the rest of the current prediction interval. It cannot accurately collect the entire beacon message Also, it cannot increase the packet delivery ratio.
5
Embed
Malicious Node detection in Vehicle to Vehicle Communicationdetection algorithm [9] is used at the receiver side to detect malicious node. To further reduce the verification delay
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
International Journal of Engineering Trends and Technology (IJETT) – Volume X Issue Y- Month 2015