An integrated mobility and traffic model for vehicular wireless networks
Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks
Securing vehicular ad hoc networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Capacity, Collision and Interference of VANET with IEEE 802.11 MAC
ICINIS '08 Proceedings of the 2008 First International Conference on Intelligent Networks and Intelligent Systems
RBM: A Role Based Mobility Model for VANET
CMC '09 Proceedings of the 2009 WRI International Conference on Communications and Mobile Computing - Volume 02
Improving Route Stability and Overhead on AODV Routing Protocol and Make it Usable for VANET
ICDCSW '09 Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems Workshops
Security in service-oriented vehicular networks
IEEE Wireless Communications
Detection of radio interference attacks in VANET
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Secure traffic data propagation in Vehicular Ad Hoc Networks
International Journal of Ad Hoc and Ubiquitous Computing
Cognitive security protocol for sensor based VANET using Swarm intelligence
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
End-to-End Transfer Rate Adjustment Mechanism for VANET
DEPEND '10 Proceedings of the 2010 Third International Conference on Dependability
A novel defense mechanism against sybil attacks in VANET
Proceedings of the 3rd international conference on Security of information and networks
Complementing public key infrastructure to secure vehicular ad hoc networks
IEEE Wireless Communications
A Publish/Subscribe Communication Infrastructure for VANET Applications
WAINA '11 Proceedings of the 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications
Journal of Network and Computer Applications
A sybil attack detection approach using neighboring vehicles in VANET
Proceedings of the 4th international conference on Security of information and networks
ROAMER: Roadside Units as message routers in VANETs
Ad Hoc Networks
An IP passing protocol for vehicular ad hoc networks with network fragmentation
Computers & Mathematics with Applications
A survey of inter-vehicle communication protocols and their applications
IEEE Communications Surveys & Tutorials
Inter-vehicle communication systems: a survey
IEEE Communications Surveys & Tutorials
Secure vehicular communication systems: implementation, performance, and research challenges
IEEE Communications Magazine
AMOEBA: Robust Location Privacy Scheme for VANET
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Privacy and Security have become an indispensable matter of attention in the Vehicular Ad-Hoc Network, which is vulnerable to many security threats these days. One of them is the Denial of Service (DoS) attacks, where a malicious node forges a large number of fake identities, i.e., Internet Protocol (IP) addresses in order to disrupt the proper functioning of fair data transfer between two fast-moving vehicles. In this paper, a distributed and robust approach is presented to defend against DoS attacks. In this proposed scheme, the fake identities of malicious vehicles are analyzed with the help of consistent existing IP address information. Beacon packets are exchanged periodically by all the vehicles to announce their presence and to become aware of the next node. Each node periodically keeps a record of its database by exchanging the information in its environment. If some nodes observe that they have similar IP addresses in the database, these similar IP addresses are identified as DoS attacks. However, it can be expected that security attacks are likely to increase in the coming future due to more and more wireless applications being developed onto the well-known exposed nature of the wireless medium. In this respect, the network availability is exposed to many types of attacks. A DoS attack on the network availability is being elaborated in this paper. A model of a product interaction for DoS prevention has been developed called "IP-CHOCK" that will lead to the prevention of DoS attacks. The proposed approach will be able to locate malicious nodes without the requirement of any secret information exchange and special hardware support. Simulation results demonstrate that the detection rate increases when optimal numbers of nodes are forged by the attackers.