Malicious node detection in vanet
-
Upload
vysakhmanayath -
Category
Engineering
-
view
245 -
download
2
Transcript of Malicious node detection in vanet
1
2
DETECTION OF MALICIOUS NODES IN VEHICULAR AD-
HOC NETWORK
3
• PRESENTED BY: VYSAKH M
• GUIDED BY:
• CO-ORDINATED BY:
4
Presentation outline• Why VANET ?• What is a VANET ?• Malicious nodes• Related work• Network model and definitions• Proposed DMN algorithm• Performance evaluation• Conclusion • Future work• References
5
Why VANET? You are on the way in a car and ….
oWish to know about traffic jam condition at next turn or road condition
ahead
o Wish to have prior alert, if vehicle in front of you is applying breaks
oWish to have advance info, if any vehicles met with an accidents on the road
ahead
oWish to know whether the nearby parking area has vacancy or not
oWish to avoid accidents in ever increasing traffic conditions
A modern vehicle
F o r w a r d r a d a r
C o m p u t in g p l a t f o r m
E v e n t d a t a r e c o r d e r ( E D R )P o s i t i o n i n g s y s t e m
R e a r r a d a r
C o m m u n i c a t i o n f a c i l i t y
D i s p l a y
(GPS)
Human-Machine Interface
A modern vehicle is a network of sensors/actuators on wheels !
7
What is VANET? Network of moving and smart vehicles VANET is a technology that uses moving cars as nodes to
create a mobile network Vehicles Transformed into “Computers on the Wheels” or
“Networks on the Wheel” Vehicular Communication System (VCS):- Two main type
of communications Vehicle to Vehicle (V2V) Communication:-
Vehicle to Infrastructure (V2I) communication:- Wireless communication using short range radio
technologies
8
Vehicle to vehicle communication
9
Vehicle to infrastructure communication
10
Network Model &Definitions
VehiclesRoad Side Units(RSUs) Certificate Authorities(CAs): Authentication , Security , Management of identities , Verifying the misbehavior report and Modifying the distrust value of nodes.
11
Malicious Nodes
If malicious nodes are present in a VANET, they may attempt to reduce network connectivity by pretending to be cooperative but in effect dropping any data they are mean to pass on.
12
Algorithm DescriptionDMN Algorithm is based on the following three basic concepts
• A vehicle is considered to show an abnormal behavior if it drops or duplicate the packets received to it so as to create congestion in the network, misguide other vehicular nodes or destroy crucial messages for their selfish motives.
• An honest vehicle forwards the messages received to it correctly to other nodes in the network or creates right messages for transmission.
• A vehicle will be tagged as a malicious vehicle, if the vehicle repeats abnormal behavior such that its distrust value, DV exceeds the threshold value TMD.
13
DMN AlgorithmNotations:VN: relaying nodeVU: verifierPL: packet latencya: no of packets received by VNb: no of packets that VN drops/duplicatesDV: distrust value
14
Cont.DP: decision parameterTR: transmission rateSMX: maximum speed of vehicleSMN: minimum speed of vehicleW: weight factorTVS: selection thresholdCH: reliable node in a cluster
15
Parameters for the selection of verifier
Load(LD): It refers to the no of nodes a vehicle is already
monitoring. A node which has less LD value is selected as a verifier
Distrust value (DV): It refers to the measure of trustworthiness of a
vehicle Distance(DS): Distance of vehicle from node
16
Assumptions• DP=W1*LD+W2*DV+W3*DS
• W1+W2+W3=1
17
Proposed DMN algorithm• Step 1:Start• Step 2: Vehicle VN joins the vehicular network• Step 3: Get the cluster keys.• Step 4: Compute the parameters- Load, Distrust Value and
Distance for the nodes in area of VN for verifier selection.• Step5: Calculate the Decision parameter for verifier
selection, DP. DP = W1 * LD + W2 * DV + W3 * DS
Where, W1 + W2 + W3 = 1. W1, W2, and W3 are the weight factors for parameters
Load (LD), Distrust Value (DV) and Distance (DS) respectively.
• Step 6: Find out nodes with Decision parameter value less then Selection Threshold,ie (DP < TVS)
• Step 7: Allocate nodes obtained from Step 6 as verifiers to the recently joined vehicle VN.
18
• Step 8: Verifiers monitor behavior of vehicle VN.• Step 9: If (verifier detects vehicle VN showing abnormal
behavior) then Report to the cluster head (CH) go to step 10 else go to step 8;• Step 10: CH calculates new distrust value (DV) of VN.• Step 11: If distrust value is less than or equal to detection
threshold ie if (DV < = TMD ) then update the white list and goto 8 else go to 12• Step 12: Warning message is send to all other nodes.• Step 13: Update the entry of Vehicle VN in black list.• Step 14: Isolate the detected malicious vehicle from the
network.• Step 15:End
19
Performance Evaluation Performance of the proposed DMN algorithm is
computed in terms of
Average Throughput: The amount of data transferred per unit time or
average rate of successful message transmissions. measured in bits per seconds(bits/sec)
Packet Delivery Ratio: Ratio of data packets received by destination
nodes to those produced by source node.
20
Average End to End Delay: Time between origination of packet at the source
and packet delivery time at destination.
21
Average Throughput
22
Packet Delivery Ratio
23
Average End to End Delay
24
Conclusion
DMN algorithm enhance the network the network performance
Optimizes the selection of verifier nodesProvides higher throughput ,better packet delivery
ratio and reduce the end to end delay
25
Future work
In order to enhance the performance of DMN algorithm we will consider other optimization techniques like PSO to select verifiers in algorithm
26
References• 1. Al-kahtani, MS. Survey on security attacks in Vehicular Ad hoc
Networks (VANETs). In: 6th International Conference on Signal• Processing and Communication Systems (ICSPCS); 2012. p. 1-9.• 2. Vulimiri A, Gupta A, Roy P, Muthaiah SN, Kherani AA. Application of
Secondary Information for Misbehavior Detection in VANETs.• Springer, IFIP, LNCS 2010. 6091: 385-396.• 3. Daeinabi A, Rahbar AG. Detection of malicious vehicles (DMV)
through monitoring in Vehicular Ad-Hoc Networks. Springer, Multimedia
• Tools and Applications 2013. 66: 325-338.• 4. Barnwal RP, Ghosh SK. Heartbeat Message Based Misbehavior
Detection Scheme for Vehicular Ad-hoc Networks. In: International• Conference on Connected Vehicles and Expo (ICCVE) 2012; p. 29-34.• 5. Mishra B, Nayak P, Behera S, Jena D. Security in vehicular adhoc
networks: a survey. ACM, ICCCS; 2011. p. 590-595.
27
28
Thank you!