A PRACTICAL APPROACH ON DETECTING MALICIOUS NODE IN URBAN VEHICULAR NETWORK
Journal: International Engineering Journal For Research & Development (IEJRD) (Vol.1, No. 1)Publication Date: 2014-06-21
Authors : Mohan Jaynarayan Pande; Prof.Anil Rao;
Page : 52-62
Keywords : DSRC; ITS; RSU; V2X.;
Abstract
In V2V Area, where solitude of automobile, largely the position of automobile is extremely not crackled, nameless verification of vehicles is impossible to discuss or distinction. first, two authorized identity messages signed by the equivalent RSU inside the equal given period of time that concerning with each other for provisional purpose are recognizable in order that they can be used for discovery; Second ,Road-Side Unit signatures on messages are signer are different so that the RSU location identity information is hidden from the resulted official message. In this project , we mentioned a simple Sybil attack occur in the network using the trajectories of vehicles for identification of the node while at rest maintaining the node location privacy in the network. When a node in the vehicular network associates a Road-Side Unit (RSU), it dynamically demands an authorization identity message from the RSU as the proof identity of the vehicle in the Current RSU region. A malicious node (attacker in network) who tries to forging multiple same false identities of the node available in the network can easily launch an attack called Sybil attack, gaining a suspiciously large influence. More predominantly, we construct a location-hidden identity approved message invention method for two objectives: With the some restriction, official messages from the node used for long-term identification are declined so that at the exacting road side unit its authorization is used as proof of vehicle. With this order on the identity scheme, vehicles keep its location privacy as the identification by taking all the series of Sequence of authorized message. Also vehicle i.e. nodes in the vehicular network generate a location-hidden trajectory for preserving location-privacy identification. Utilizing social association amongst trajectories according to the resemblance definition of two trajectories, detecting attacker node can recognize and therefore discharge “community” of Sybil trajectory. Rigorous sanctuary analysis and widespread trace-driven simulations exhibit the worth of detection attacker.
Other Latest Articles
Last modified: 2014-06-23 18:45:38