Malicious Node Detection On Vehicular Ad-Hoc Network Using Dempster Shafer Theory For Denial Of Services Attack

被引:6
|
作者
Kushwah, Neha [1 ]
Sonker, Abhilash [1 ]
机构
[1] MITS, CSE & IT Dept, Gwalior, India
关键词
VANET; ANN; SOM; Malicious; Identification; Security;
D O I
10.1109/CICN.2016.91
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
VANET is the network which monitoring the traffic on the road and share the information with neighbors. Movable nodes (vehicle) and fixed node (RSU) are used in VANET. This network is about the safety purpose of driver and sharing confidential information about traffic and accident. On network some vehicles do not share information, send fake requests and try to break network security. Lots of techniques are present here, to overcome by these attacks. Overcome by these issues we give artificial neural network based technique in which we used self-organized map. For trained our network, we use trace file, and these trace file work as input to self-organized map so that we provide supervised learning to our network. In this paper those malicious vehicles have been identified. We used SOM classifier for the detection of misbehavior node. In this classification the group of malicious nodes being created and for the improvement the use of Dempster-Shafer theory for finding attacker node is applied.
引用
收藏
页码:432 / 436
页数:5
相关论文
共 50 条
  • [1] Malicious Node Detection in Vehicular Ad-Hoc Network Using Machine Learning and Deep Learning
    Eziama, Elvin
    Tepe, Kemal
    Balador, Ali
    Nwizege, Kenneth Sorle
    Jaimes, Luz M. S.
    2018 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2018,
  • [2] DETECTION OF MALICIOUS NODE IN MOBILE AD-HOC NETWORK
    Sangeetha, V
    Kumar, S. Swapna
    2018 FOURTH INTERNATIONAL CONFERENCE ON POWER, SIGNALS, CONTROL AND COMPUTATION (EPSCICON), 2018,
  • [3] Malicious route detection in vehicular ad-hoc network using geographic routing with masked data
    Palani S.
    Ravi L.
    Varadarajan V.
    Vairavasundaram S.
    Gao X.-Z.
    Recent Advances in Computer Science and Communications, 2020, 13 (03) : 319 - 325
  • [4] Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
    Li, Wenjia
    Joshi, Anupam
    MDM: 2009 10TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, 2009, : 112 - 121
  • [5] Malicious node detection in ad-hoc wireless networks
    Griswold, RL
    Medidi, S
    DIGITAL WIRELESS COMMUNITCATIONS V, 2003, 5100 : 40 - 50
  • [6] Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks
    Khan, Uzma
    Agrawal, Shikha
    Silakari, Sanjay
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 965 - 972
  • [7] Early Detection of Incident using Vehicular Ad-hoc Network
    Singh, Bharat
    Hasbullah, Halabi
    Nayan, Md. Yunus
    Tahlan, Bhumit
    2014 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCOINS), 2014,
  • [8] Dempster-Shafer theory for intrusion detection in ad hoc networks
    Chen, TM
    Venkataramanan, V
    IEEE INTERNET COMPUTING, 2005, 9 (06) : 35 - 41
  • [9] Detection of malicious node using Improved CONFIDANT Technique in Ad-hoc Networks
    Devi, Nirma
    Sunitha, R.
    PROCEEDINGS OF 2ND IEEE INTERNATIONAL CONFERENCE ON ENGINEERING & TECHNOLOGY ICETECH-2016, 2016, : 604 - 610
  • [10] Cluster Based Malicious Node Detection System for Mobile Ad-Hoc Network Using ANFIS Classifier
    Subburayalu, Gopalakrishnan
    Duraivelu, Hemanand
    Raveendran, Arun Prasath
    Arunachalam, Rajesh
    Kongara, Deepika
    Thangavel, Chitra
    JOURNAL OF APPLIED SECURITY RESEARCH, 2023, 18 (03) : 402 - 420