Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Attacks using BF-IPCM
نویسنده
چکیده
Pavan Kumar Pagadala, Research Scholar Computer Science and Engineering Anna University, Tamilnadu,India [email protected] Dr. N.M Saravana Kumar, Professor & HOD Computer Science and Engineering Vivekanadha College of Engineering for Women, Tiruchengode, Tamilnadu, India [email protected] -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------Routing in VANETs (pure ad hoc architectures) with dynamic nature of the network becomes a challenging task for finding and maintaining routes. So, detecting the misbehaving vehicles is an important task in for improving the efficiency of the vehicles and to incorporate the reliable and secure routing in the transport system. Due to the self -configure (mobility) characteristic of the VANETS, it is very difficult to the road side and base station units to keep track of the actions happening among the vehicles. Obviously the attackers will have the fraudulent nature that same will persist over time with them that will be effected to the normal vehicles which is travelling in the network from the non trustworthy vehicles. So detection and proper action is needed to improve the efficient routing of the vehicles in the network. Earlier we have many techniques for detecting and preventing the misbehaving vehicles depending upon the threshold values, mobility factors, power ratios etc., now we are proposing a new technique called Bloom-Filter based IP Choke Mechanism for locating the harmful vehicle. In this paper we will discuss about the proposed technique on how to identify the malicious vehicle and how to defend the attacked vehicle by blocking it form the routing process.
منابع مشابه
Routing Improvement for Vehicular Ad Hoc Networks (VANETs) Using Nature Inspired Algorithms
are a subset of MANETs in which vehicles are considered as network clients. These networks have been created to communicate between vehicles and traffic control on the roads. have similar features to MANETs and their main special property is the high-speed node mobility which makes a quick change of the network. The rapid change of network topology is a major challenge in routing. One of the we...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملDefending Against DDoS Attacks in Bloom Filter based Multicasting
Bloom filter (BF) based forwarding is an effective approach to implement scalable multicasting in distributed systems. The forwarding BF carried by each packet can encode either multicast tree or destination IP addresses, which are termed as tree oriented approach (TOA) and destination oriented approach (DOA), respectively. Recent studies have indicated that TOA based protocols have serious vul...
متن کاملA Survey On Unicast Routing Protocols For VANET
Vehicular Ad Hoc Network (VANET) is a subgroup of mobile ad hoc network (MANET). It is an emerging new technology to exchange information between vehicles to vehicles. VANETs are considered as one of the most noticeable technologies for improving the efficiency and safety of transportation systems. VANET mainly used to exchange traffic information between the vehicles and prevent accident. In V...
متن کاملEvaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2018