Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks

被引:77
|
作者
Khan, Uzma [1 ]
Agrawal, Shikha [1 ]
Silakari, Sanjay [1 ]
机构
[1] Univ Inst Technol, RGPV, Bhopal 462036, MP, India
关键词
Malicious; Misbehaviour; Detection; Security; Performance; Vehicular Ad-Hoc Networks (VANETs); MISBEHAVIOR DETECTION;
D O I
10.1016/j.procs.2015.01.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
VANETs enable wireless communication among vehicles and vehicle to infrastructure. Its main objective is to render safety, comfort and convenience on the road. VANET is different from ad-hoc networks due to its unique characteristics. However, because of lack of infrastructure and centralized administration, it becomes vulnerable to misbehaviors. This greatly threatens different aspects of VANET's security. VANET being such a useful network must provide adequate security measures for secure communication. The proposed algorithm DMN-Detection of Malicious Nodes in VANETs improves DMV Algorithm in terms of effective selection of verifiers for detection of malicious nodes and hence improves the network performance. (C) 2015 The Authors. Published by Elsevier B.V.
引用
收藏
页码:965 / 972
页数:8
相关论文
共 50 条
  • [1] Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks
    Daeinabi, Ameneh
    Rahbar, Akbar Ghaffarpour
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 66 (02) : 325 - 338
  • [2] Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks
    Ameneh Daeinabi
    Akbar Ghaffarpour Rahbar
    [J]. Multimedia Tools and Applications, 2013, 66 : 325 - 338
  • [3] The impact of malicious nodes on the performance of wireless Ad-hoc networks
    Hallani, Houssein
    Shahrestani, Seyed A.
    [J]. MANAGING INFORMATION IN THE DIGITAL ECONOMY: ISSUES & SOLUTIONS, 2006, : 596 - +
  • [4] A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
    Ahmed, Adnan
    Abu Bakar, Kamalrulnizam
    Channa, Muhammad Ibrahim
    Haseeb, Khalid
    Khan, Abdul Waheed
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2015, 9 (02) : 280 - 296
  • [5] A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
    Adnan Ahmed
    Kamalrulnizam Abu Bakar
    Muhammad Ibrahim Channa
    Khalid Haseeb
    Abdul Waheed Khan
    [J]. Frontiers of Computer Science, 2015, 9 : 280 - 296
  • [6] A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
    Adnan AHMED
    Kamalrulnizam ABU BAKAR
    Muhammad Ibrahim CHANNA
    Khalid HASEEB
    Abdul Waheed KHAN
    [J]. Frontiers of Computer Science, 2015, 9 (02) : 280 - 296
  • [7] On a Blockchain-Based Security Scheme for Defense against Malicious Nodes in Vehicular Ad-Hoc Networks
    Liu, Guandong
    Fan, Na
    Wu, Chase Q.
    Zou, Xiaomin
    [J]. SENSORS, 2022, 22 (14)
  • [8] Malicious node detection in ad-hoc wireless networks
    Griswold, RL
    Medidi, S
    [J]. DIGITAL WIRELESS COMMUNITCATIONS V, 2003, 5100 : 40 - 50
  • [9] A Novel Approach for Malicious Nodes Detection in Ad-hoc Networks Based on Cellular Learning Automata
    Aghababa, Amir Bagheri
    Fathinavid, Amirhosein
    Salari, Abdolreza
    Zavareh, Seyedeh Elaheh Flaghayegh
    [J]. PROCEEDINGS OF THE 2012 WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2012, : 82 - 88
  • [10] Fault detection for vehicular ad-hoc wireless networks
    Worrall, Stewart
    Agamennoni, Gabriel
    Ward, James
    Nebot, Eduardo
    [J]. 2013 IEEE INTELLIGENT VEHICLES SYMPOSIUM (IV), 2013, : 298 - 303