Malicious Node Detection On Vehicular Ad-Hoc Network Using Dempster Shafer Theory For Denial Of Services Attack

被引:6
|
作者
Kushwah, Neha [1 ]
Sonker, Abhilash [1 ]
机构
[1] MITS, CSE & IT Dept, Gwalior, India
关键词
VANET; ANN; SOM; Malicious; Identification; Security;
D O I
10.1109/CICN.2016.91
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
VANET is the network which monitoring the traffic on the road and share the information with neighbors. Movable nodes (vehicle) and fixed node (RSU) are used in VANET. This network is about the safety purpose of driver and sharing confidential information about traffic and accident. On network some vehicles do not share information, send fake requests and try to break network security. Lots of techniques are present here, to overcome by these attacks. Overcome by these issues we give artificial neural network based technique in which we used self-organized map. For trained our network, we use trace file, and these trace file work as input to self-organized map so that we provide supervised learning to our network. In this paper those malicious vehicles have been identified. We used SOM classifier for the detection of misbehavior node. In this classification the group of malicious nodes being created and for the improvement the use of Dempster-Shafer theory for finding attacker node is applied.
引用
收藏
页码:432 / 436
页数:5
相关论文
共 50 条
  • [41] Extended Location-Based Ad-Hoc Routing with Erroneous/Malicious Intermediate Node Detection
    Yakura, Naoshi
    Higaki, Hiroaki
    2019 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2019), 2019, : 1074 - 1079
  • [42] A Novel Fuzzy Logic-Based Scheme for Malicious Node Eviction in a Vehicular Ad Hoc Network
    Igried, Bashar
    Alsarhan, Ayoub
    Al-Khawaldeh, Igried
    AL-Qerem, Ahmad
    Aldweesh, Amjad
    ELECTRONICS, 2022, 11 (17)
  • [43] Wireless ad hoc network: Detection of malicious node by using neighbour-based authentication approach
    Rana K.G.
    Yongquan C.
    Azeem M.
    Ditta A.
    Yu H.
    Khuhro S.A.
    International Journal of Wireless and Mobile Computing, 2018, 14 (01) : 16 - 24
  • [44] An Improved Blackhole Attack Detection and Prevention Method for Wireless Ad-hoc Network
    Bendale, Gayatri
    Shrivastava, Sameeksha
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [45] A Distributed Network Intrusion Detection System for Distributed Denial of Service Attacks in Vehicular Ad Hoc Network
    Gao, Ying
    Wu, Hongrui
    Song, Binjie
    Jin, Yaqia
    Luo, Xiongwen
    Zeng, Xing
    IEEE ACCESS, 2019, 7 : 154560 - 154571
  • [46] Secure Identity Management Framework for Vehicular Ad-hoc Network using Blockchain
    George, Sonia Alice
    Jaekel, Arunita
    Saini, Ikjot
    2020 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2020, : 1064 - 1069
  • [47] Early Alert System Using Relative Positioning in Vehicular Ad-hoc Network
    Raut, Y. C.
    Katkar, V. N.
    Sarode, S. M.
    2014 ANNUAL INTERNATIONAL CONFERENCE ON EMERGING RESEARCH AREAS: MAGNETICS, MACHINES AND DRIVES (AICERA/ICMMD), 2014,
  • [48] Black Hole Attack Detection and Performance Improvement in Mobile Ad-Hoc Network
    Arunmozhi, S. A.
    Venkataramani, Y.
    INFORMATION SECURITY JOURNAL, 2012, 21 (03): : 150 - 158
  • [49] Innovative approach to prevent wormhole attack on reactive routing of vehicular ad-hoc network by using clustering and digital signatures
    Ali S.
    Nand P.
    Tiwari S.
    Ali, Shahjahan (shahjahansrms@gmail.com), 1600, Inderscience Publishers (06): : 295 - 316
  • [50] Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network
    Abdelkreem, Eslam
    Hussein, Sherif
    Tammam, Ashraf
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (03) : 1939 - 1961