Neighbor Trust Algorithm (NTA) to Protect VANET from Denial of Service Attack (DoS)

@article{Raghuwanshi2016NeighborTA,
  title={Neighbor Trust Algorithm (NTA) to Protect VANET from Denial of Service Attack (DoS)},
  author={Varsha Raghuwanshi and Umesh Kumar Lilhore},
  journal={International Journal of Computer Applications},
  year={2016},
  volume={140},
  pages={8-12}
}
In Vehicular Ad-hoc Networks (VANET), communication can be done with mutual understanding of vehicles. This communication is an important application of Intelligent Transportation Systems. In VANET, safety of user is a main concern, for achieving this vehicles are exchanging safety messages at regular interval to increase the passenger safety on road. But similar to other technology VANET is also suffering from some noticeable issues. From these issues one of the most important issues is… Expand
Detection of Multiple Malicious Nodes Using Entropy for Mitigating the Effect of Denial of Service Attack in VANETs
TLDR
This paper presents the algorithm for the detection of jamming attack of Denial of Service (DoS) security attacks in VANETs, and the values of these parameters in comparison with the existing algorithms prove the effectiveness of this algorithm. Expand

References

SHOWING 1-10 OF 26 REFERENCES
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Vehicular Ad-hoc Network (VANET) is taking more attention in automotive industry due to the safety concern of human lives on roads. Security is one of the safety aspects in VANET. To be secure,Expand
Reference broadcast synchronization-based prevention to DoS attacks in VANET
TLDR
A novel model for prevention of DoS attacks in VANET is proposed and named as RBS protocol, based on the master chock filter concept for filtration of packets during busy traffic and other attacks. Expand
Overview of security issues in Vehicular Ad-hoc Networks
TLDR
This chapter aims to describe and analyze the most representative VANET security developments, which have been presented so far. Expand
Secure Position-Based Routing for VANETs
TLDR
This paper provides a scheme that secures geographic position-based routing, which has been widely accepted as the appropriate one for VC, and focuses on the scheme currently chosen and evaluated in the Car2Car Communication Consortium (C2C-CC). Expand
Vehicular ad hoc networks (VANETS): status, results, and challenges
TLDR
Some of the VANET research challenges that still need to be addressed to enable the ubiquitous deployment and widespead adoption of scalable, reliable, robust, and secure VANet architectures, protocols, technologies, and services are outlined. Expand
Real-Time Detection of Denial-of-Service Attacks in IEEE 802.11p Vehicular Networks
TLDR
A method for real-time detection of Denial-of-Service (DoS) attacks in IEEE 802.11p vehicular ad-hoc networks (VANETs) is proposed based on the "jamming" of periodic position messages exchanged by vehicles in a platoon. Expand
A tutorial survey on vehicular ad hoc networks
TLDR
An overview of the field of vehicular ad hoc networks is given, providing motivations, challenges, and a snapshot of proposed solutions. Expand
Flexible, extensible, and efficient VANET authentication
TLDR
This work proposes a new hybrid authentication mechanism, VANET authentication using signatures and TESLA++ (VAST), that combines the advantages of ECDSA signatures and tesLA++, and introduces a new certificate verification strategy that prevents denial of service attacks while requiring zero additional sender overhead. Expand
DDoS attack on WAVE-enabled VANET through synchronization
TLDR
This paper analyzes the prospect of a synchronization-based DDoS attacks on vehicular communications and proposes mitigation techniques to avoid such an attack. Expand
Providing VANET security through active position detection
TLDR
A novel approach to enhancing position security in VANET by using the on-board radar to detect neighboring vehicles and to confirm their announced coordinates and compute cosine similarity among data collected by radar and neighbors' reports to filter the forged data from the truthful data. Expand
...
1
2
3
...