Prevention of DoS attacks in VANET
Privacy and Security have become an indispensable matter of attention in the Vehicular Ad-Hoc Network, which is vulnerable to many security threats these days. One of them is the Denial of Service (DoS) attacks, where a malicious node forges a large number of fake identities, i.e.; Internet Protocol...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Published: |
2013
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-84886598645&doi=10.1007%2fs11277-013-1161-5&partnerID=40&md5=1af319e521ece09436b4dca8739739fc http://eprints.utp.edu.my/32652/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utp.eprints.32652 |
---|---|
record_format |
eprints |
spelling |
my.utp.eprints.326522022-03-29T14:08:33Z Prevention of DoS attacks in VANET Verma, K. Hasbullah, H. Kumar, A. Privacy and Security have become an indispensable matter of attention in the Vehicular Ad-Hoc Network, which is vulnerable to many security threats these days. One of them is the Denial of Service (DoS) attacks, where a malicious node forges a large number of fake identities, i.e.; Internet Protocol (IP) addresses in order to disrupt the proper functioning of fair data transfer between two fast-moving vehicles. In this paper, a distributed and robust approach is presented to defend against DoS attacks. In this proposed scheme, the fake identities of malicious vehicles are analyzed with the help of consistent existing IP address information. Beacon packets are exchanged periodically by all the vehicles to announce their presence and to become aware of the next node. Each node periodically keeps a record of its database by exchanging the information in its environment. If some nodes observe that they have similar IP addresses in the database, these similar IP addresses are identified as DoS attacks. However, it can be expected that security attacks are likely to increase in the coming future due to more and more wireless applications being developed onto the well-known exposed nature of the wireless medium. In this respect, the network availability is exposed to many types of attacks. A DoS attack on the network availability is being elaborated in this paper. A model of a product interaction for DoS prevention has been developed called "IP-CHOCK" that will lead to the prevention of DoS attacks. The proposed approach will be able to locate malicious nodes without the requirement of any secret information exchange and special hardware support. Simulation results demonstrate that the detection rate increases when optimal numbers of nodes are forged by the attackers. © 2013 Springer Science+Business Media New York. 2013 Article NonPeerReviewed https://www.scopus.com/inward/record.uri?eid=2-s2.0-84886598645&doi=10.1007%2fs11277-013-1161-5&partnerID=40&md5=1af319e521ece09436b4dca8739739fc Verma, K. and Hasbullah, H. and Kumar, A. (2013) Prevention of DoS attacks in VANET. Wireless Personal Communications, 73 (1). pp. 95-126. http://eprints.utp.edu.my/32652/ |
institution |
Universiti Teknologi Petronas |
building |
UTP Resource Centre |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Petronas |
content_source |
UTP Institutional Repository |
url_provider |
http://eprints.utp.edu.my/ |
description |
Privacy and Security have become an indispensable matter of attention in the Vehicular Ad-Hoc Network, which is vulnerable to many security threats these days. One of them is the Denial of Service (DoS) attacks, where a malicious node forges a large number of fake identities, i.e.; Internet Protocol (IP) addresses in order to disrupt the proper functioning of fair data transfer between two fast-moving vehicles. In this paper, a distributed and robust approach is presented to defend against DoS attacks. In this proposed scheme, the fake identities of malicious vehicles are analyzed with the help of consistent existing IP address information. Beacon packets are exchanged periodically by all the vehicles to announce their presence and to become aware of the next node. Each node periodically keeps a record of its database by exchanging the information in its environment. If some nodes observe that they have similar IP addresses in the database, these similar IP addresses are identified as DoS attacks. However, it can be expected that security attacks are likely to increase in the coming future due to more and more wireless applications being developed onto the well-known exposed nature of the wireless medium. In this respect, the network availability is exposed to many types of attacks. A DoS attack on the network availability is being elaborated in this paper. A model of a product interaction for DoS prevention has been developed called "IP-CHOCK" that will lead to the prevention of DoS attacks. The proposed approach will be able to locate malicious nodes without the requirement of any secret information exchange and special hardware support. Simulation results demonstrate that the detection rate increases when optimal numbers of nodes are forged by the attackers. © 2013 Springer Science+Business Media New York. |
format |
Article |
author |
Verma, K. Hasbullah, H. Kumar, A. |
spellingShingle |
Verma, K. Hasbullah, H. Kumar, A. Prevention of DoS attacks in VANET |
author_facet |
Verma, K. Hasbullah, H. Kumar, A. |
author_sort |
Verma, K. |
title |
Prevention of DoS attacks in VANET |
title_short |
Prevention of DoS attacks in VANET |
title_full |
Prevention of DoS attacks in VANET |
title_fullStr |
Prevention of DoS attacks in VANET |
title_full_unstemmed |
Prevention of DoS attacks in VANET |
title_sort |
prevention of dos attacks in vanet |
publishDate |
2013 |
url |
https://www.scopus.com/inward/record.uri?eid=2-s2.0-84886598645&doi=10.1007%2fs11277-013-1161-5&partnerID=40&md5=1af319e521ece09436b4dca8739739fc http://eprints.utp.edu.my/32652/ |
_version_ |
1738657416852013056 |
score |
13.214268 |