IJCNIS Vol. 11, No. 4, 8 Apr. 2019
Cover page and Table of Contents: PDF (size: 535KB)
Full Text (PDF, 535KB), PP.26-34
Views: 0 Downloads: 0
DDOS, Threshold, Monitor mode, VANETs
A network in which the vehicular nodes are free to join or leave the network is known as vehicular ad hoc network (VANET). Either vehicle to vehicle or vehicle to infrastructure types of communication is performed in this decentralized type of network. The identification and elimination of Distributed-Denial of Service (DDoS) attacks from VANETs is the major objective of this research. The nodes that can flood victim nodes with large numbers of rough packets are chosen by the malicious nodes in this kind of attack. Identifying such malicious nodes from the network is an important research objective to be achieved. The technique which is proposed in this research is based on the two step verification. In the two steps verification technique, when the network performance is reduced to threshold value then the traffic is monitored that which node is sending data on such high rate. NS2 simulator is used to implement the proposed technique. With respect to various performance parameters, the proposed technique is analyzed. A comparative evaluation of results achieved from proposed and existing techniques is also done to conclude the level of improvement achieved.
Palak Shandil, Rakesh Kumar, "A Novel Scheme for Isolation of Distributed Denial of Service Attack in VANETs", International Journal of Computer Network and Information Security(IJCNIS), Vol.11, No.4, pp.26-34, 2019. DOI:10.5815/ijcnis.2019.04.04
[1]Navneet Kaur, Er. Sandeep Kad, “Data Dissemination In VANETS- A Review”, International Journal of Engineering and Technical Research (IJETR), volume 6, Issue 4, pp. 33-42, 2016.
[2]Leandro Aparecido, “Data dissemination in vehicular networks: Challenges, solutions, and future perspectives”, IEEE International Conference on New Technologies, Mobility and Security (NTMS), volume 7, issue 11, pp-220-243, 2015.
[3]Rakesh Kumar and Mayank Dave, “A Review of Various VANET Data Dissemination Protocols”, International Journal of u- and e- Service, Science and Technology ,volume 5, issue 3, pp. 38-44, 2012.
[4]Surya Nepal, Julian Jang, John Zic, “Anitya: An Ephemeral Data Management Service and Secure Data Access Protocols for Dynamic Collaborations”, IEEE computer society, volume 7, issue 23, pp-219-226, 2007.
[5]Hoang D. T. Nguyen, Le-Nam Tran, and Een-Kee Hong, “On Transmission Efficiency for Wireless Broadcast Using Network Coding and Fountain Codes”, IEEE communications letters, volume 15, issue 5, pp-130-145, 2011.
[6]Xia Shen, Xiang Cheng, Liuqing Yang, Rongqing Zhang, and Bingli Jiao,” Data Dissemination in VANETs: A Scheduling Approach”, IEEE Transactions On Intelligent Transportation Systems, volume 15, issue 5, pp-110-132, 2014.
[7]Mohamed Salah Bouassida, Gilles Guette, Mohamed Shawky, and Bertrand Ducourthial, “Sybil Nodes Detection Based on Received Signal Strength Variations within VANET,” International Journal of Network Security, volume 9, no. 1, pp-22- 33, 2009.
[8]Mina Rahbari and Mohammad Ali Jabreil Jamali, “Efficient Detection of Sybil Attack Based on Cryptography in VANET,” International Journal of Network Security & Its Applications, volume 3, No.6, pp-23-29, 2011.
[9]S. Roselin Mary, M. Thamaraiselvan and M. Maheshwari, “Early Detection of DDOS attacks in VANET by Attacked Packet Detection Algorithm (APDA),” International Conference on Information Communication and Embedded Systems, volume 9, issue 8, pp. 230-241,2013.
[10]Subir Biswas, Jelena Misic, Vojislav Misic, “DDOS Attack on WAVE-enabled VANET through Synchronization”, IEEE Global Communications Conference, volume 10, issue 8, pp. 131-154, 2012.
[11]Archana S. Pimpalkar, Prof. A. R. Bhagat Patil “DDOS Attack Defense against Source IP Address Spoofing Attacks” International Journal of Science and Research, volume 4, issue 3, pp. 36-46, 2015.
[12]Wesam Bhaya, Mehdi Ebady Manaa, “DDoS Attack Detection Approach using an Efficient Cluster Analysis in Large Data Scale”, Annual Conference on New Trends in Information & Communications Technology Application, volume 16, issue 3, pp- 236-241, 2017.
[13]Surendra Nagar, Shyam Singh Rajput, Avadesh Kumar Gupta, Munesh Chandra Trivedi, “Secure Routing Against DDoS Attack in Wireless Sensor Network”, 3rd IEEE International Conference on Computational Intelligence and Communication Technology, volume 3, issue 9, pp- 114-128, 2017.
[14]Munazza Shabbir, Muazzam A. Khan, Umair Shafiq Khan, Nazar A. Saqib, “ Detection and Prevention of Distributed Denial of Service Attacks in VANETs”, IEEE Computational Science and Computational Intelligence , volume 8, issue 14, pp- 123-129, 2016.
[15]Nivraj J.Patel, Rutvij H.Jhaveri, “Trust based approaches for secure routing in VANET: A Survey”, ELSEVIER, volume 19, issue 71, pp- 194-203, 2015.
[16]Kirti A. Yadav and P. Vijayakumar, “VANET and its Security Aspects: A Review”, Indian Journal of Science and Technology, volume 9, Issue 18, pp- 104-118, 2016.
[17]Mohamed Nidhal Mejri and Jalel Ben-Othman, “GDVAN: A New Greedy Behavior Attack Detection Algorithm for VANETs”, Journal of IEEE Transaction on Mobile Computing, volume 4, issue 7, pp- 53-62, 2016.