Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Immune model based approach for network intrusion detection
Proceedings of the 3rd international conference on Security of information and networks
A novel multi-hop clustering scheme for vehicular ad-hoc networks
Proceedings of the 9th ACM international symposium on Mobility management and wireless access
SECURING VEHICULAR COMMUNICATIONS
IEEE Wireless Communications
Hi-index | 0.00 |
Vehicular Ad hoc Networks (VANETs) are so difficult to secure due to the wireless technology and its several known security holes. To protect against attacks, methods and techniques have been developed. The Intrusion Detection System (IDS) can detect malicious actions made to the system. In vehicular ad hoc networks, IDSs are in charge of analyzing incoming and outgoing packets to identify malicious signatures. However, without a decision making mechanism, they are useless. This paper designs a decision making protocol for security information in VANETs. Our study is based on two IDS approaches. In the first one, the IDS are installed on vehicles, while in the second one they are installed on the Road Side Units (RSU). In both approaches, vehicles are grouped according to their speed. Corroboration of an attack is based on a probabilistic model of ratio computation between vehicles or RSUs having answered to the signature of the attack. Our aim is to design a decision support mechanism. The dynamic topology of VANET allows a strong prevention by broadcasting the information. So when an attack occurs, the protocol allows the corroboration of the latter and alert neighboring clusters.