A trust based model (TBM) to detect rogue nodes in vehicular ad-hoc networks (VANETS)

被引:23
作者
Tripathi, Kuldeep Narayan [1 ]
Sharma, S. C. [1 ]
机构
[1] Indian Inst Technol Roorkee, DPT, Elect & Comp Discipline, Roorkee, Uttar Pradesh, India
关键词
Trust; Rogue nodes; Vehicular ad-hoc network; Entity centric trust; Direct trust; Indirect trust; Black hole attack; NS-2; INTRUSION DETECTION; PREVENTION; EFFICIENT; MECHANISM; DELIVERY; PROTOCOL; ATTACKS; SCHEME;
D O I
10.1007/s13198-019-00871-0
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Due to the exponential growth in the automobile industry, we need intelligence transportation system. Vehicular ad-hoc network (VANET), a part of the intelligence transportation system is the network created by vehicles. Security is the main issue in vehicular ad-hoc network. Many intruders try to use the vulnerability presents in the vehicular network. In VANET communication between two nodes, may involves multiple intermediate nodes to forward the data due to low transmission range. The intermediate nodes must be trustworthy enough to be a part of the communication process. Rogue or malicious nodes can accept the data and drop the data in between source to destination. In this paper, we proposed a trust based model to detect rogue nodes in a vehicular network. The proposed model first estimates the trust value of the nodes and based on that identifies the rogue nodes in the network. We select only trustworthy nodes to relay the data in the routing process. The simulation and performance evaluation of the proposed model performed with the help of network simulator (NS-2). We evaluate the performance of the network based on the four performance matrices i.e. successful packet delivery fraction, throughput, routing load and end to end delay. The simulation result shows that the proposed model enhances network performance significantly.
引用
收藏
页码:426 / 440
页数:15
相关论文
共 27 条
  • [1] Alam B, 2014, PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS AND COMPUTER NETWORKS (ISCON), P11, DOI 10.1109/ICISCON.2014.6965209
  • [2] [Anonymous], 2002, Proc. 4th Middle East. Model. Simulat. MultiConf. (MESM)
  • [3] [Anonymous], 2016, P RES DEV MAN C
  • [4] Arya KV, 2013, INT CONF IND INF SYS, P477, DOI 10.1109/ICIInfS.2013.6732031
  • [5] Bedi P, 2014, 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P1677, DOI 10.1109/ICACCI.2014.6968352
  • [6] Investigation of routing reliability of vehicular ad hoc networks
    Eiza, Mahmoud Hashem
    Ni, Qiang
    Owens, Thomas
    Min, Geyong
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2013,
  • [7] Issariyakul T., 2009, Processing an NS2 Simulation: Debugging, Tracing, and Result Compilation, P1, DOI [10.1007/978-0-387-71760-9, DOI 10.1007/978-0-387-71760-9, 10.1007/978-0-387-71760-913, DOI 10.1007/978-0-387-71760-913]
  • [8] TFDD: A trust-based framework for reliable data delivery and DoS defense in VANETs
    Kerrache, Chaker Abdelaziz
    Lagraa, Nasreddine
    Calafate, Carlos T.
    Lakas, Abderrahmane
    [J]. VEHICULAR COMMUNICATIONS, 2017, 9 : 254 - 267
  • [9] A detection and prevention system against collaborative attacks in Mobile Ad hoc Networks
    Khan, Farrukh Aslam
    Imran, Muhammad
    Abbas, Haider
    Durad, Muhammad Hanif
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 68 : 416 - 427
  • [10] Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks
    Khan, Uzma
    Agrawal, Shikha
    Silakari, Sanjay
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 965 - 972