monua practical approach on detecting malicious node in urban vehicular network

Upload: tusharrsangole

Post on 02-Jun-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/11/2019 MonuA PRACTICAL APPROACH ON DETECTING MALICIOUS NODE IN URBAN VEHICULAR NETWORK

    1/11

    IEJRD Journal of Science & Technology

    E-I SSN: 2349-0721

    Volume :1 Issue 1

    www.iejrd.in Page 1

    A PRACTICAL APPROACH ON DETECTING MALICIOUS NODE IN URBAN

    VEHICULAR NETWORK

    Mr.Mohan Jaynarayan Pande1,Prof.Anil Rao

    2

    1M-Tech Student , 2Asst. Professor IET,Alwar ,Rajastan

    [email protected], [email protected]

    ----------------------------------------------------------------------------------------

    Abstract

    I n V2V Area, where soli tude of automobile, largely the positi on of automobile is extremely not crackled,

    nameless ver if icati on of vehicles is impossible to discuss or distinction. f ir st, two authori zed identity messages

    signed by the equivalent RSU inside the equal given period of time that concerni ng with each other for provisional

    purpose are recognizable in order that they can be used for discovery; Second ,Road-Side Uni t signatures on

    messages are signer are dif ferent so that the RSU l ocation identity inf ormation is hidden f rom the resulted off icial

    message. I n thi s proj ect , we mentioned a simple Sybil attack occur in the network using the traj ectori es of vehicl es

    for identifi cation of the node whil e at rest maintai ning the node location pri vacy in the network . When a node in

    the vehicular network associates a Road-Side Uni t (RSU), it dynami cally demands an authori zation i denti ty

    message fr om the RSU as the proof identi ty of the vehicle in the Cur rent RSU region. A mal icious node (attacker in

    network) who tri es to forging mul tipl e same false identi ties of the node available in the network can easily launch

    an attack called Sybil attack, gaining a suspiciously large inf luence. More predominantl y, we construct a

    location-h idden identi ty approved message inventi on method for two objectives: Wi th the some restriction, off ici al

    messages fr om the node used for long-term i denti fi cation ar e decli ned so that at the exacting road side uni t i ts

    authori zation is used as proof of vehicl e. Wi th this order on the identity scheme, vehicles keep its location pr ivacy as

    the identi f icati on by taki ng al l the series of Sequence of authori zed message.

    Al so vehicle i.e. nodes in the vehi cular network generate a location-h idden trajectory for preserving

    location-pr ivacy identi fi cation. Ut il izing social association amongst trajectories according to the resemblance

    def in iti on of two trajectori es, detecting attacker node can recognize and therefore discharge community of Sybil

    trajectory. Rigorous sanctuar y analysis and widespread trace-dr iven simulations exhibi t the worth of detection

    attacker.

    Key Terms: DSRC, ITS, RSU, V2X.

    Introduction

    An application domain where those visions can become reality in the nearfuture is wireless communication in

    vehicular traffic networks in order to improve traffic safety and to increase traffic efficiency, vehicle-to-X

    communication (V2X) networks. The notations car-to-X communication (C2X) and vehicular ad- hoc networks

    (VANETs) are synonymously used. The X emphasizes that either solely vehicles communicate (vehicle-to-vehicle

    communication (V2V)), or so do vehicles and infrastructure points (vehicle-to-infrastructure communication(V2I)). For

    both types of communication similar technologies may be used, andnetworks combining both are expected. In this thesis

    mailto:[email protected]:[email protected]:[email protected]:[email protected]
  • 8/11/2019 MonuA PRACTICAL APPROACH ON DETECTING MALICIOUS NODE IN URBAN VEHICULAR NETWORK

    2/11

    IEJRD Journal of Science & Technology

    E-I SSN: 2349-0721

    Volume :1 Issue 1

    www.iejrd.in Page 2

    we concentrate on directV2V communication. It is envisioned that by exchanging information directly between vehicles

    every vehicle should be able to detect vehicles in the surrounding

    and may calculate the current traffic situation from

    collected information. Such co-operative cars warn their drivers if necessary, e.g. in case of imminent dangers like

    possible collisions with other vehicles or appearing obstacles on the road, e.g.road works. The communication therefore

    has to fulfill highest quality require-ments as precise information has to be transmitted with high reliability and short

    delay under adverse and highly dynamic environmental conditions.

    A key building block of V2V communication is the periodic transmission ofstatus information by every individual

    vehicle. These messages that are oftencalled beacon messages contain information like current position, speed, accel-

    eration and direction of driving. The messages serve as the information basis forthe mutual awareness of the vehicles. For

    vehicles in the close surrounding of a respective transmitter, the reception of beacon messages is of particular importance

    in order to obtain accurate awareness of the close surrounding. Beacon messages

    have specific and unusual

    communication properties that have to be considered.

    First, beacon messages are transmitted by every equipped vehicle.

    Second, beacon messages that contain up-to-date information are transmitted in a periodic manner, i.e. several times per

    second. Third, the messages are transmitted in a broad- cast manner and do not have one specific recipient. In

    consequence, an effective

    scheme to acknowledge a successful message reception is not easily applicable. Thus, specific

    methods are necessary to investigate this type of communication that we call local broadcasts communication.

    With respect to the mentioned properties it has to be identified how timely

    and reliable periodic beacon messages

    can be distributed in the local surround-ing of each vehicle. A fundamental and precise knowledge of the systems in use,

    their behavior and their performance is necessary to evaluate V2V communication and to design systems that work

    reliable under everyday conditions. Thus, the goal of this thesis is a comprehensive and precise performance evaluation of

    periodic local broadcast communication in V2V communication networks. Of particular interest is the scalability of huge

    and dense networks. It turns outthat the hidden terminal problem is particularly relevant as it causes interferences

    during

    the reception of messages. We discuss the analysis of consequences of mu- tual interference on the performance of V2V

    networks and consequently on theirpotential. Thus, such networks are analyzed with a focus on the possibilities and

    limitations that the communication mechanisms and the physical characteristics

    provide for the special type of data

    traffic that is exchanged.

    Several projects worldwide have investigated the improvement of transportationsystems with respect to the positive effect

    on traffic safety and traffic efficiency. In recent years, the specific role of V2X communication came into focus and

    broadened the research domain to the interaction of vehicles and infrastructure. Be- fore, these domains were often

    treated separately: while from infrastructure sideadaptable traffic telematics applications were introduced (e.g. variable

    message

    signs for speed and number of parking lots, or adaptive traffic lights for traffic

    flow optimization), on thevehicle side, electronic systems were introduced to improve passenger safety, the controllability of the vehicle in critical

    situations, ornavigation systems. The possibility to interact via wireless communication between infrastructure and

    vehicles, as well as directly between vehicles, allows to develop completely new application scenarios where cooperation

    of the differententities may be achieved. We now first present projects where such possible applications were discussed,

    before deriving the communication challenges and then looking at the technical systems that should provide the

    necessary communication requirements.

  • 8/11/2019 MonuA PRACTICAL APPROACH ON DETECTING MALICIOUS NODE IN URBAN VEHICULAR NETWORK

    3/11

    IEJRD Journal of Science & Technology

    E-I SSN: 2349-0721

    Volume :1 Issue 1

    www.iejrd.in Page 3

    The first IVC studies have emerged at the beginning of the 1980s in Japan (for

    example: Association of Electronic

    Technology for Automobile Traffic and Driving)

    with the increase of people or merchandise traveling, thus

    stimulating the

    exploration of new solutions such as automatic driving, intelligent road planning,

    etc. Several

    government institutions throughout the world have led an exploratory

    phase from different worldwide projects,

    involving a large number of research units.

    These projects have led to the definition of several possible prototypes and

    solutions, based on different approaches. In this way, traffic management systems

    were installed in large Japanese

    cities and on most urban and intercity highways.The Japanese have made large investments in the development of

    driver

    information systems. In the case of a highway, the system electronically monitors

    the speed and volume of

    traffic and gives drivers instant warnings on accidents and

    delays. Warnings and other information for drivers are

    displayed on different

    variable message signs. In the Japanese AHS (Automated Highway System) project,

    the goal

    was to design an automated highway system for autonomous driving:

    control of the vehicle is assumed by a computer

    on board. In the USA, there is the

    Intelligent Transportation Society of America (ITS America), which is a group of

    manufacturers, government agencies, universities and other enterprises. This group

    focuses on research, promotion

    and development and deployment coordination of

    ITS applications throughout the USA. As in Japan, the American

    government also

    implemented the NAHSC (National Automated Highway System Consortium) in

    1995. In Europe,

    the PROMETHEUS (PROgraM European Traffic with Highest

    Efficiency and Unprecedented Safety) project began

    in 1986 and included over 13

    vehicle manufacturers and several universities from 19 European countries. In this

    context, several approaches and solutions concerning ITSs have been developed,

    implemented and demonstrated.

    Literature Review

    This chapter covers previous work related to this thesis. The first three sections are mostly related to Security and

    Challenges in vehicular network, Sybil Attack and Communication between Vehicles to RSU, while the last section

    covers different trends in the vehicular network. We begin by describing attempts in the literature to avoid the attacks

    in the vehicular network. Afterwards, we give an overview of prior work aimed to the secure network for message

    passing between vehicle and RSU.

    A. Security and Challenges in vehicular network

    The hard work to produce safer, more satisfied and

    ordered driving circumstances have ongoing; Vehicular

    Networks will be the leader player in this work, aiming to

    smooth the progress of road refuge, experienced driving, and

    infotainment.

    The world today is source of revenue a fight, and the bump into pampas

    untruth on the roads, the feasible

    number of deaths is

    regarding 1.2 million people annual worldwide [1], and

    injures pertaining to forty epoch of this

    number, missing

    forgetting that traffic overfilling that makes a huge

    mistreatment of time and energy [2]. Vehicular Ad

    hoc Networks (VANET) is constituent of Mobile

    Ad Hoc Networks (MANET), this way that each and every one

    node

    can move freely bordered by the network exposure and

    stays connected, every one node can exchange a few words with

    other

    nodes in single journey or multi journey, and any node may perhaps be

    Vehicle, Road Side Unit (RSU).

  • 8/11/2019 MonuA PRACTICAL APPROACH ON DETECTING MALICIOUS NODE IN URBAN VEHICULAR NETWORK

    4/11

    IEJRD Journal of Science & Technology

    E-I SSN: 2349-0721

    Volume :1 Issue 1

    www.iejrd.in Page 4

    In the time 1998, the panel of engineers from Delphi

    Delco Electronics System and IBM Corporation

    projected a

    network vehicle perception aimed at providing

    a extensive range of applications [3]. By means of the advancements

    in

    wireless communications technology, the perception of

    network car has concerned the attention every one over the

    planet. In the topical existence, numerous fresh projects have been

    launched, targeting on realizing the nightmare of

    networking car and victorious accomplishment of vehicular networks. The venture Network on Wheels

    (NOW)[4] is a German research venture in 2004, the

    venture adopts an IEEE 802.11 standard for wireless

    access, the chief

    objectives of this venture are to explain

    technical issues correlated to communication protocols and

    data security for

    car-to-car communications. The

    Car2Car Communication association [5] is initiated by

    six European car

    manufacturers. Its objective is to build a

    European industrial ordinary for car-to-car

    communications expand crosswise

    each and all one brand.

    B.The Sybil Attack

    In this paper, we review the collision of the Sybil attack [20], an assault againstidentity in which an entity entity

    impersonate as multiple instantaneousidentities. The Sybil attack is a elementary difficulty in many systems and ithas

    so far away resisted a collectively applicable solution. Many disseminated applications and daily services presuppose

    each contributing entity pedals accurately one identity. As soon as this supposition is unverifiable orunmet, the service

    is topic to attack and the consequences of the appliance are doubtful if not erroneous. A existing example of this would

    be an online selectionsystem where single person can vote by means of numerous online identities. Markedly, this

    difficulty is presently only resolve if a middle influence, such as the superintendentof credential ability, cans agreement

    that every person has a solitary individuality represented by one key; in apply, this is extremely complicated to

    guarantee on a great

    scale and would necessitate pricey physical attention.

    C.Trusted devices

    In a security related to conviction certification authorities, creature in an appliance can be associated in someprotected fashion to a definite hardware device. Equivalent to any central influence handing out cryptographic

    credential, there are no extraordinary technique of avert an aggressor from attaining several devices other than manual

    interference. The cost of obtaining numerous devices may be elevated.

    The main IVC network applications can be classified into three categories: 1) road safety applications, 2) driver

    assistance applications, and 3) comfort applications. In what follows, we explain these categories in more detail and

    then give examples of applications:

    Road safety applications: Road safety has become a priority in most developed countries. This priority is motivated

    by the increasing number of accidents on roads due to the increasing number of vehicles. In order to improve safety in

    travel and cope with road accidents, IVCs offer the possibility of preventing collisions and road work, of preventing

    obstacles (fixed or mobile) and of distributing weather information;

    Applications to driver assistance systems and cooperative vehicles: to facilitate autonomous driving and bring

    support to the driver in specific situations: help in vehicle passing, prevention of straight or curved lane exits, etc. We

    can also mention the case of trucking companies using IVC for productivity to decrease gasoline consumption;

  • 8/11/2019 MonuA PRACTICAL APPROACH ON DETECTING MALICIOUS NODE IN URBAN VEHICULAR NETWORK

    5/11

    IEJRD Journal of Science & Technology

    E-I SSN: 2349-0721

    Volume :1 Issue 1

    www.iejrd.in Page 5

    comfort applicationsfor the driver and passengers: user information and communication services in particular, such

    as mobile access to the Internet, electronic messaging, inter-vehicle chat, network games, etc.

    Problem Definition

    The online Sybil attack problem is hard due to three following factors:

    First, approved messages produce for diverse vehicles are asynchronous. The motivation of using trajectory to

    characterize vehicles is depend on the reality that a vehicle cannot there itself at diverse locations at the equal time. The

    asynchronies of message construct the conclusion straightforwardly depend on this truth impractical.Second, approved

    messages are provisionally linkable, which means there is no unchanging mapping among an RSU signature and the

    genuine RSU who signed that signature. Therefore, no detachment information is presented among two RSUs with this

    in any two signatures. Thiscreate the trouble still harder while one cannot exploit the time disparity among two

    approved messages and the detachment between the couple of equivalent RSUs to gather whether two messages fit into

    two dissimilar vehicles.

    Last, malicious vehicles can mistreatment the independence of trajectories production and the neighbor affiliation

    among RSUs to produce elaborately intended trajectories. For instance, an aggressor can officially generate numerous

    trajectories which emerge different from each other still under a very easy RSU topology. For this purpose we proposed

    the system, hackers cannot proceed as source, because one centralized server is maintaining to confirm validation of

    source. This federal server is Sybil guard. It blocks unofficial users or hackers. Sybil guard is maintaining source node

    information and header information of message. It checks the users by means of those details whether they are attackers

    or normal user. Hackers information has not been transferred to destination. Destination has not been receiving any

    attacker information.

    For the vehicle location privacy ,the message not unveil the location of the vehicle in the network so it favorable for the

    owner of vehicle that only messages are transmits not the location of vehicle. Before initiating this project, substantial

    amount of time has been spent to study algorithms related to detection of the malicious node in vehicular network and

    coming to a conclusion that there exists an ample scope to simplify/improve/modify/enhance/redevelop/redesign these

    methods.

    The purposes of this work are:

    I.

    To design new system that forwarded the authorized messages between the vehicular communications.

    II.

    To design a novel Decentralized scheme in the vehicular network that prevents the location privacy of vehicle.

    III.

    To protect the database of the RSU from the suspected node in order to implement the Sybil attack.

    With the help of this system, normal vehicle must communicate with another vehicle independently and totally believe

    on the accepted incoming messages that its truly forwarded from the normal vehicle .The Preprocessing and Sybil

    identification Algorithm are very useful in this system for implementing the concept and also find the malicious node in

    the network.

    System Design

  • 8/11/2019 MonuA PRACTICAL APPROACH ON DETECTING MALICIOUS NODE IN URBAN VEHICULAR NETWORK

    6/11

    IEJRD Journal of Science & Technology

    E-I SSN: 2349-0721

    Volume :1 Issue 1

    www.iejrd.in Page 6

    In existing system, hackers easily can act as source node and sends message to destination. Destination receives

    wrong message from hackers. Destination believes that its correct message from source. Destination receives the wrong

    information from hackers.

    A.

    Overview

    In universal, detecting malicious node in vehicular network incorporate three elegant procedures namely,infrastructure building, location-hidden trajectory creation, and Sybil attack discovery. More exclusively, we accept an

    incremental method to organize RSUs. In the end, an imperfect number of accessible RSUs can realize the maximum

    service treatment in stipulations of provide traffic quantity as well as superior equality in terms of geographical

    allocation. After the exploitation of RSUs, a vehicle can necessitate authoritative messages from every RSU it passes by

    as an evidence of its survival there. We agree an instance tilting linkable sphere signature proposal [14] for RSUs to

    concern authoritative messages for vehicles. Such sanctioned messages are position hidden which refers to that RSU

    signature is signer ambiguous and the authorized messages are temporarily linkable. additionally, a set of uninterrupted

    sanctioned messages issued for a vehicle are securely chained mutually to form a position hidden trajectory of the

    automobile, which will be exploit for classifying this vehicle in future discussion. Throughout an exchange which is

    initializing by an automobile or an RSU, called a discussion holder, a contribute automobile should supply its trail for

    authentication.

    B.Infrastructure Construction

    1. RSU Deployment

    In detecting malicious node in vehicular network, vehicles necessitates authoritative messages concern from RSUs

    to appearance trajectories, which must be statically, establish as the transportation. When allowing for the exploitation

    of RSUs, two sensible questions are indispensable, i.e., where to mount RSUs in the city and how numerous of them are

    enough? An easy explanation is to organize RSUs at every junction. This can affect well trajectories with an adequate

    number of sanctioned messages which will assist the gratitude of a vehicle. Nevertheless, organize such a massive

    number of RSUs in solitary time is exorbitant due to the lofty cost. In disparity, we receive an incremental exploitation

    policy in detecting malicious node in vehicular network, allowing for the transaction among decreasing the number of

    RSUs and exploiting the exposure of traffic. Exclusively, in the untimely rising phase with a restricted number of RSUs,

    an connection is chosen if it convince two necessities: first, it is biologically at slightest certain distance far left from all

    other RSU prepared intersections; second, it has the greatest traffic volume amongst all relax intersection without

    RSUs.

    2. System Initialization

    After finishing RSU exploitation, in order to utility suitably, the scheme first needs to be initialize. Theinitialization procedure includes following steps:

    Setting up TA: the TA initial decide a set of community parameter obligatory for the ring signature proposal which is

    used for RSUs to sign communication and set up a pair of public/private key pair as well. The public key fulfill with the

    incremental exploitation of RSUs, adaptation control is in use by the TA in organizations the PKL. More exclusively,

    when novel RSUs register in the system, the TA updates the PKL and amplifies its version number. Then, the latest

    PKL can be transmitting to all RSUs in the organization via the RSU vertebrae network.

  • 8/11/2019 MonuA PRACTICAL APPROACH ON DETECTING MALICIOUS NODE IN URBAN VEHICULAR NETWORK

    7/11

    IEJRD Journal of Science & Technology

    E-I SSN: 2349-0721

    Volume :1 Issue 1

    www.iejrd.in Page 7

    3.

    Generating Location-Hidden Trajectory

    Location-Hidden approved Message Generation: In order to be position concealed, approved messages concern for

    vehicles from an RSU must possess two properties, i.e., signer indistinct and provisionally linkable. The signer

    indistinct property means the RSU must not use a devoted identity to sign messages. The provisionally linkable

    property necessitate two approved messages are identifiable if and only if they are produce by the same RSU inside the

    same known phase of time. Otherwise, a extensive term likability of approved messages used for discovery ultimately

    has the identical effect as with a devoted uniqueness for vehicles. In this scheme, we reveal one probable achievement

    of a location-hidden approved message production scheme using linkable ring signature [11]. The Linkable ring

    signature is signer indistinct and signatures are linkable (i.e., two signatures can be connected if and only if they are

    concern by the same signer) as well. Predominantly, we decide the linkable ring signature scheme commence by Dodis

    et al. [12] and Tsang and Wei [13] for two cause: first, it has been demonstrate to be protected; second, it has stable

    signature size. To convene the obligation of provisionally linkable property, we enlarge the scheme to maintain the

    occasion oriented linkability assets [20] which assure that any two signatures are connected if and only if they are

    signed on the base of same event by the same RSU.

    Security Analysis

    A malevolent vehicle can effortlessly attain messages between two other converse entities by snooping on the wireless

    channels. In This proposal, all messages are delivering via wireless communiqu. If a malevolent vehicle can achieve

    something in using sanctioned messages issue for other vehicles, it can pretense as multiple identities, initiation a Sybil

    attack. The proposal design is protected in terms of defending:

    System Implementation

    A.

    Module Description

    1.Topology Construction

    This module is used for constructing the topology with the help of existing node. This node is also providing at the

    time of the topology creation. This module mainly contains the field first number of Node available in the network.

    After the node number provide, the next is to gives the name of each individual node name for the entire node. As soon

    as the name of the node is registered then the connection between the two consecutive node are constructed with the

    help of source and its next node also the all the other node. Once the connection between the all the node are established

    then the topology creation module is over and the next module working started. In this module the simple the

    connection between nodes are created.

    2.Node Login

    Node entry module describes node authentication. To activate node who are all involved in topology, node should

    be login into that topology. It does not allow unauthorized node entry. Many nodes can enter into that mentioned

    topology. Each node can send the messages to their destination after login. In this module ,node is login and login into

  • 8/11/2019 MonuA PRACTICAL APPROACH ON DETECTING MALICIOUS NODE IN URBAN VEHICULAR NETWORK

    8/11

    IEJRD Journal of Science & Technology

    E-I SSN: 2349-0721

    Volume :1 Issue 1

    www.iejrd.in Page 8

    the node login form in this only the name of node is input and it show the node login form .if the name of node is

    incorrect then it displayed then warning message that conatain the message node not available.

    3.

    Message Transmission

    Each node (source node) can send the data to some other node (destination) which one connected with that source

    node. While sending message, the source node should mention the header information. Source node can send the datato destination. Destination will receive that message. In this module ,only the message transmission are done with the

    node are available ,if the no direct path are exit between the two node the it used the simple routing concept in which the

    message are transmitted from source node to directly connected node ,from this node to another node and from this

    node to destination node, also the path from source to destination node are show in the Sybil guard.

    4.Sybil guard

    Sybil guard is maintained in this project to detect the attacker. Sybil guard is called as centralized server. Sybil guard

    does not allow hackers to send the wrong data. It compares node information and header information. If matches,

    normal user sending the message to destination. Otherwise Sybil guard will not allow the hackers to send message. It

    blocks that data and it provides the attacker information to attacker. Sybil guard gets node information from its

    registration. While data transmission, Sybil guard will get their header information. This centralized server maintains to

    find out the attacker details. The Algorithm that perform the classification of the honest node and suspect node are

    discuss following.

    Fig.1 Preprocessing Algorithm

    This is the first algorithm in the detecting the malicious node in vehicular urban network called as Preprocessing

    algorithms in which the topology that is constructed is take as input and the honest node is h. After this performing the

    random walk with length L= log n originating from the honest node h. also as the random walk is calculated then assign

    the minimal length to L and it compare with the Length max during this also the random walk with length l and

    originating from node I means the first node, get the ni as the number of node with frequency smaller than t. then its

    gives the output mean values and the standard deviation that are useful in the next algorithm sybilidentification.

    Algorithm 2 is to detect whether a given node is a Sybil node or not. As is said in above, if a node has a very low

    number, it may be a Sybil node.

    http://1.bp.blogspot.com/-1uCtFLs-qJg/T3fyPF39oZI/AAAAAAAAAE0/7OuQQ_lwc3M/s1600/sybildefender.1.png
  • 8/11/2019 MonuA PRACTICAL APPROACH ON DETECTING MALICIOUS NODE IN URBAN VEHICULAR NETWORK

    9/11

    IEJRD Journal of Science & Technology

    E-I SSN: 2349-0721

    Volume :1 Issue 1

    www.iejrd.in Page 9

    Fig.2 Sybil identification algorithm

    Partial random walk is a petite diverse from ordinary random walk: one time a node is 'walked', it cannot be walked

    once again. Consequently a partial random walk can be finished when a node contain no neighbors to walk into devoid

    of reaching a given length. It is called a 'dead walk'. Given a Sybil node s, we can judgment a length when the

    deadWalkRatio is slighter than a given threshold. All the nodes inside a length less than the estimated length aresuspected to be Sybil nodes.

    Conclusion And Future Work

    Location privacy of vehicle is preserved by realizing a location hidden signature scheme .This scheme

    demonstrate by both analysis and extensive trace driven simulation that can largely restrict Sybil attack and can

    enormously reduce the impact of Sybil attack in urban Vehicular network. It was noted that many security applications

    are specific instances of the protecting network related problem. However, due to the impracticality of the best different

    security application, considerable efforts were made to design specific solutions to these applications. We mentioned

    above that Detecting the malicious node in urban vehicular network can be used to provide the security during the node

    to node communication in the vehicular network .As the vehicle to vehicle communication are the most enhancement

    area in the last some years.

    Another application of Detecting the malicious node in vehicular network is the location hidden Authorized

    message generation scheme in which the location privacy are very concern with network .Also the in order to hide the

    location privacy of any vehicle ,vehicle only access the messages from nearest RSU or other vehicle during the

    communication

    Detecting the malicious node in urban vehicular network can also used for protecting the honest node of the network

    means Sybil attacks, which node attacks are done by the any malicious node in the vehicular network. With the help ofedge of the malicious node to the network, it generates the or forged the false identity of honest node (vehicle), with the

    false identity it performed Sybil attacks by forwarding the false message to the network node.

    The vehicular network mostly related with the vehicle to vehicle communication in order to minimize the harmful event

    occurs on road. It performs the well and equipped scheme for communication between the vehicles with the used of

    Sybil guard that continually monitor and provide the authorized message for communication via RSU. In future, we are

    interested to extend the proposed Detection of malicious node in urban vehicular network for many nodes in order to

    http://4.bp.blogspot.com/-S_6o0OP9PK8/T3fyPmjQUII/AAAAAAAAAE8/XCkH3TqD1oo/s1600/sybildefender.2.png
  • 8/11/2019 MonuA PRACTICAL APPROACH ON DETECTING MALICIOUS NODE IN URBAN VEHICULAR NETWORK

    10/11

    IEJRD Journal of Science & Technology

    E-I SSN: 2349-0721

    Volume :1 Issue 1

    www.iejrd.in Page 10

    implement the broadcast with the vehicle .In this scheme it is one to one communication so it may be extend for one to

    many vehicle communication. Also the RSU must be trustworthy always otherwise it is also work area to become it

    faithful.

    References

    [1]. Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, An Efficient Pseudonymous Authentication Scheme with Strong Privacy

    Preservation for Vehicular Communications, IEEE Trans. Vehicular Technology, vol. 59, no. 7, pp. 3589-3603,

    Sept. 2010.

    [2].

    R. Lu, X. Lin, H. Zhu, and X. Shen, An Intelligent Secure and Privacy-Preserving Parking Scheme through

    Vehicular Communications,IEEE Trans. Vehicular Technology, vol. 59, no. 6,pp. 2772-2785, July 2010.

    [3]. J. Eriksson, H. Balakrishnan, and S. Madden, Cabernet: Vehicular Content Delivery Using WiFi, Proc.

    MOBICOM 08, pp. 199-210,Sept. 2008.

    [4].

    M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D.S.Wallach, Secure Routing for Structured Peer-to-Peer

    Overlay Networks, Proc. Symp. Operating Systems Design and Implementation (OSDI 02), pp. 299-314, Dec. 2002.

    [5]. B. Dutertre, S. Cheung, and J. Levy, Lightweight Key Management in Wireless Sensor Networks by Leveraging

    Initial Trust,Technical Report SRI-SDL-04-02, SRI Intl, Apr. 2002.

    [6].

    J. Newsome, E. Shi, D. Song, and A. Perrig, The Sybil Attack in Sensor Networks: Analysis & Defenses, Proc.

    Intl Symp.Information Processing in Sensor Networks (IPSN 04), pp. 259-268,Apr. 2004.

    S. Capkun, L. Buttya_n, and J. Hubaux, Self-Organized Public Key Management for Mobile Ad Hoc

    Networks, IEEE Trans. Mobile Computing, vol. 2, no. 1, pp. 52-64, Jan.-Mar. 2003.

    [7].

    C. Piro, C. Shields, and B.N. Levine, Detecting the Sybil Attack in Mobile Ad Hoc Networks, Proc. Securecomm

    and Workshop, pp. 1-11, Aug. 2006.

    [8].H. Yu, M. Kaminsky, P.B. Gibbons, and A. Flaxman, Sybilguard:Defending against Sybil Attacks via Social

    Networks, Proc.SIGCOMM, pp. 267-278, Sept. 2006.

    [9].

    P. Maniatis, D.S.H. Rosenthal, M. Roussopoulos, M. Baker, T.Giuli , and Y. Muliadi, Preserving Peer Replicas

    by Rate-Limited Sampled Voting, Proc. 19th ACM Symp. Operating Systems Principles (SOSP 03), pp. 44-59, Oct.

    2003.

    [10]. H. Yu, M. Kaminsky, P.B. Gibbons, and A. Flaxman, Sybilguard:Defending against Sybil Attacks v ia Social

    Networks, Proc.SIGCOMM, pp. 267-278, Sept. 2006.

    [11].

    M.S. Bouassida, G. Guette, M. Shawky, and B. Ducourthial, Sybil Nodes Detection Based on Received Signal

    Strength Variations within Vanet, Intl J. Network Security, vol. 9, no. 1, pp. 22-32, 2009.

    [12]. B. Xiao, B. Yu, and C. Gao, Detection and Localization of Sybil Nodes in Vanets, Proc. Workshop Dependability

    Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS 06), pp. 1 -8, Sept. 2006.

    [13].

    T. Zhou, R.R. Choudhury, P. Ning, and K. Chakrabarty, Privacy-Preserving Detection of Sybil Attacks in

    Vehicular Ad Hoc Networks, Proc. Fourth Ann. Intl Conf. Mobile and Ubiquitous Systems: Networking and Services

    (MobiQuitous 07), pp. 1-8, Aug.2007.

  • 8/11/2019 MonuA PRACTICAL APPROACH ON DETECTING MALICIOUS NODE IN URBAN VEHICULAR NETWORK

    11/11

    IEJRD Journal of Science & Technology

    E-I SSN: 2349-0721

    Volume :1 Issue 1

    www.iejrd.in Page 11

    [14].

    Q. Wu, J. Domingo-Ferrer, and U. Gon_zalez-Nicola s, Balanced Trustworthiness, Safety and Privacy in

    Vehicle-to-vehicle Communications, IEEE Trans. Vehicular Technology, vol. 59, no. 2, pp. 559-573, Feb. 2010.

    [15]. L. Chen, S.-L. Ng, and G. Wang, Threshold Anonymous Announcement in VANETs, IEEE J. SelectedAreas in

    Comm., vol. 29, no. 3, pp. 1-11, Mar. 2011.

    [16].

    C. Chen, X. Wang, W. Han, and B. Zang, A Robust Detection of the Sybil Attack inUrbanVanets,Proc. IEEE IntlConf. Distributed Computing Systems Workshops (ICDCSW 09), pp. 270-276, June 2009.

    [17]. S. Park, B. Aslam, D. Turgut, and C.C. Zou, Defense against Sybil Attack in Vehicular Ad Hoc Network Based on

    Roadside Unit Support, Proc. 28th IEEE Conf. Military Comm. (MILCOM 09),pp. 1 -7, Oct. 2009.

    [18].

    IEEE Vehicular Technology Soc.: 5.9 GHz Dedicated Short Range Comm. (DSRC) - Overview.

    http://grouper.ieee.org.groups/scc32/dsrc/, 2011.

    [19].

    H. Yu, M. Kaminsky, P. Gibbons, and A. Flaxman, Sybilguard: defending against sybil attacks via social

    networks, in Proc. of ACM SIGCOMM, vol. 36, no. 4, 2006, pp. 267278.

    [20]. H. Yu, Sybil defenses via social networks: a tutorial and survey, SIGACT News, vol. 42, no. 3, pp. 80101, 2011.