Visible to the public Prevention of denial of service attack over vehicle ad hoc networks using quick response table

TitlePrevention of denial of service attack over vehicle ad hoc networks using quick response table
Publication TypeConference Paper
Year of Publication2017
AuthorsWaraich, P. S., Batra, N.
Conference Name2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)
Date Publishedsep
KeywordsAnalytical models, attack prevention, black hole, Bridges, common attacks, compositionality, computer network security, delays, denial of service attack, DoS, dynamic topology, gray hole, high mobility environment, infrastructure based network, MANET, Metrics, Mobile adhoc Network, network performance, packet drop, pubcrawl, quick response table, resilience, Resiliency, Routing, Routing protocols, secure communication, Secure Routing, security, security mechanisms, security threat, Sybil attack, threats, Throughput, tunnels, V2I, V2V, VANET, vehicle ad hoc networks, vehicular ad hoc networks, Wireless, wireless adhoc network, Wireless communication

Secure routing over VANET is a major issue due to its high mobility environment. Due to dynamic topology, routes are frequently updated and also suffers from link breaks due to the obstacles i.e. buildings, tunnels and bridges etc. Frequent link breaks can cause packet drop and thus result in degradation of network performance. In case of VANETs, it becomes very difficult to identify the reason of the packet drop as it can also occur due to the presence of a security threat. VANET is a type of wireless adhoc network and suffer from common attacks which exist for mobile adhoc network (MANET) i.e. Denial of Services (DoS), Black hole, Gray hole and Sybil attack etc. Researchers have already developed various security mechanisms for secure routing over MANET but these solutions are not fully compatible with unique attributes of VANET i.e. vehicles can communicate with each other (V2V) as well as communication can be initiated with infrastructure based network (V2I). In order to secure the routing for both types of communication, there is need to develop a solution. In this paper, a method for secure routing is introduced which can identify as well as eliminate the existing security threat.

Citation Keywaraich_prevention_2017