We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Various Techniques to detect DOS attack in VANET: A Review

by Rajwinder Kaur, Usvir Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 164 - Number 8
Year of Publication: 2017
Authors: Rajwinder Kaur, Usvir Kaur
10.5120/ijca2017913718

Rajwinder Kaur, Usvir Kaur . Various Techniques to detect DOS attack in VANET: A Review. International Journal of Computer Applications. 164, 8 ( Apr 2017), 38-41. DOI=10.5120/ijca2017913718

@article{ 10.5120/ijca2017913718,
author = { Rajwinder Kaur, Usvir Kaur },
title = { Various Techniques to detect DOS attack in VANET: A Review },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 164 },
number = { 8 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 38-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume164/number8/27506-2017913718/ },
doi = { 10.5120/ijca2017913718 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:10:48.327243+05:30
%A Rajwinder Kaur
%A Usvir Kaur
%T Various Techniques to detect DOS attack in VANET: A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 164
%N 8
%P 38-41
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The vehicular adhoc network is the type of network.It is self configuring and decentralized architecture. In the vehicular adhoc network two type of communication is possible which is vehicle to vehicle and vehicle to infrastructure. Due to decentralized architecture of vehicular adhoc networks many malicious nodes may join the network which is responsible to trigger various type of active and passive type of attacks. In the network various when some malicious nodes join the network and that nodes are responsible to trigger DOS type of attack which reduce network performance. Hence Dos attack is harmfull due to inside as well as outside attackers. Experimental results show that the proposed scheme not only alleviates DOS attack but also performs better with negligible computational overhead.

References
  1. R.M. Pai, N. Ajam, J. Mouzna, “Mitigation of Insider and outside DOS attack against Signature based Authentication in VANETs’’,Asia-Pacific Conference on Computer Aided System Engineering, pp.152-157, IEEE 2014.
  2. R.S. Raw,M. Kumar, N. Singh,“Security challenges, Issues and Their Solution For VANET’’, International Joural of network,Volume.5,No.5,September 2013.
  3. M.A. Khan and T. Zia, “Vehicular Ad-Hoc Networks(VANETs)- Overview and Challenges’’, Journal of Wiresless Networking and Communication,pp.29-36, 2013,
  4. Dr. Ramaprabha and V. Premalatha 2016,“Security challenges, Issues and Their Solution For VANET’’,International journal of Contemporay Research in computer Science and Technology ,Volume 2,pp.876-879, issue 7 july 2016.
  5. V. H. LA, A. CAVALLI,“Security attacks and solutionl in vehicular Ad Hoc network’’,International Journal of Network Security & Its Applications ,Volume. 4, No.2, April 2014.
  6. A. Quyoom, R. Ali, D. Nandan Gouttam, H.Sharma,“A Novel Mechanism of Detection of Denial of Service Attack in VANET using Malicious and Irrelevant Packet Detection Algorithm’’,International Conference on Computing Communication and Automation ,pp.414-419, IEEE 2015.
  7. A. Singh and P. Sharma,“A novel mechanism for detecting DOS Attack in VANET using Enhanced Attacked Packet Detection Algorithm’’,International Conference on Computing, Communication and Automation ,IEEE 21-22 December 2015.
  8. M. N. Mejri, N. Achir and M. Hamdi,“A New Security Games Based reaction algorithm Against DOS Attacks in VANETs”,13th IEEE Annual Consumer Communications & Networking Conference, 2016.
  9. N. lyamin, A. Vinel , J. loo,“Real Time Deteactin of denial of services attacks in IEEE 802.11p vehcular network ”,IEEE Commincation latter, Volume.18, No.1, pp.110-113, january 2014.
  10. D.Johnson, A. Menezes, S.Vanstone, “The Elliptic Curve Digital Signature Algorithm ”, International Journal of Informatics Security, Volume 1,No. 1,pp. 36-63,2011.
  11. M. Boban, G. Misek, and K. Tonguz, “What is the Best Achievable QoS for Unicast Routing in VANETs”, GLOBECOM Workshops, IEEE, pp.1-10, 4 November 2008
  12. X. Lin, X. Sun, X. Wang, C. Zhang, P.-H. Ho, and X. Shen, “TSVC: Timed efficient and secure vehicular communications with privacy preserving”, IEEE Transactions on Wireless Communications, Volume 7, pp. 4987-4998, December 2008.
  13. A. Wasef and X. Shen, “Efficient group signature scheme supporting batch verification for securing vehicular networks,” IEEE International Conference on Communications , pp.1-5, May 2010.
  14. S. Manvi, M. Kakkasageri, and D. Adiga, “Message authentication in vehicular ad-hoc networks: ECDSA based approach,” Future computer and Communication, International Conference ,pp.16-20, April 2009.
Index Terms

Computer Science
Information Sciences

Keywords

VANET Dos attack Security Availability