A secure anonymous on-demand routing protocol to defend wormhole attack in Vehicular Adhoc Network

نویسنده

  • Gurjot Singh
چکیده

Vehicular Ad-Hoc Network is a sub class of MANETs (Mobile Ad-Hoc Networks). It`s a technology that provide secure driving environment by wireless communication between the vehicles. The technique of self-driving vehicle is more significant in today`s world. VANET converts each participating vehicle into wireless sensor nodes that allow vehicles to communicate among themselves. It creates a network of wide range. Due to non-centralized infrastructure, self-driving and Ad-Hoc nature of VANETs it`s vulnerable to various critical attacks that breach the security. One of the critical attacks is wormhole attack which mainly occur least two or more malicious nodes. It enables an attacker to capture packets at one location and tunnels them to another location forming a wormhole link in-between the legitimate nodes of the network. In this paper, secure routing protocol ANODR is implemented to prevent the wormhole attack in VANETs. The ANODR prevents strong adversaries from tracing a data packet flow back to its originator and for location privacy problem; ANODR ensures that adversaries/attackers cannot discover the real identities of authenticated transmitters. The performance of ANODR is evaluated on the basis of metrics like throughput, end-to-end delay, total packet received and jitters.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing AODV against wormhole attacks in emergency MANET multimedia communications

The nature of Mobile Ad hoc NETworks (MANETs) makes them suitable to be utilized in the context of an extreme emergency for all rescue teams. We use the term emergency MANETs (eMANETs) in order to describe Next Generation Networks (NGNs) which are deployed in emergency cases such as forest fires and terrorist attacks. Secure routing in MANETs is critical. Due to the absence of a central authori...

متن کامل

بهبود پروتکل AODV جهت مقابله با حملات کرم‌چاله در شبکه‌های اقتضایی

Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node.  In Wormhole attacks, one malicious node tunnels packets from its location to the ...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Securing Physical and network layer using SNAuth-SPMAODV with DSSS for Mobile adhoc networks in Military Scenario

A mobile ad hoc network is an infrastructure less network, fast emerging today for deployment in variety of applications. During deployment, security emerges as a central requirement due to many attacks that affects the performance of the ad hoc networks. Particularly Denial of Service attack is one such severe attack against network and physical layer which is a challenging one to defend again...

متن کامل

Mobile Adhoc Network

1 Enhancing security features & performance of AODV protocol under attack for MANET In this paper, a novel security mechanism is presented to enhance security & performance of AODV (Adhoc On-demand Distance Vector) routing protocol under the attack for MANET (Mobile Ad-hoc Networks). The AODV routing protocol was initially developed without considering security in mind. So it is not able to def...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015