International Conference on Computing, Communication &Amp; Automation 2015
DOI: 10.1109/ccaa.2015.7148411
|View full text |Cite
|
Sign up to set email alerts
|

A novel mechanism of detection of denial of service attack (DoS) in VANET using Malicious and Irrelevant Packet Detection Algorithm (MIPDA)

Abstract: Security of Vehicular Ad Hoc Networks (VANET) plays a very important role in order to sustain critical life. VANET is a subtype of MANET. For the secure communication of critical life related information, network must need to be available at all the times. The network availability is exposed to several types of attacks and threads possible in VANET. These security attacks and threats include Sybil attacks, misbehaving nodes generate false information, jamming attacks, selfish driver attack, wrongs vehicle posi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
19
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 34 publications
(21 citation statements)
references
References 6 publications
0
19
0
Order By: Relevance
“…It has been characterized and modelled in [40], whereas a detection mechanism has been proposed in [41]. It is clear that diminishing the effect of jamming is not easy, specially because there's only one safety channel on the 802.11p protocol.…”
Section: F Securitymentioning
confidence: 99%
“…It has been characterized and modelled in [40], whereas a detection mechanism has been proposed in [41]. It is clear that diminishing the effect of jamming is not easy, specially because there's only one safety channel on the 802.11p protocol.…”
Section: F Securitymentioning
confidence: 99%
“…Man-in-the-middle: As its name implies, the attacker is inserted between the transmitter and the receiver, for example, as an OBU or RSU inserts between two communicating vehicles to introduces or inject false message or modified the original message. [16] , [17], [18], [19], [20], [21] [22], [23] M C2 Sybil Availbility Authenticity M M M [24], [25], [26], [27], [28], [29], [18], [30], [31], [32], [33], [34], [35], [36], [37], [38], [39], [40] H C3 Jamming Availbility H H H [41,42] [43], [13], [44], [12], [45], [46], [47], [22], [ [58], [59], [60], [61], [62], [63], [64], [65], [18], [66,67], [46]…”
Section: A V2e E2v and V2v Communication Networkmentioning
confidence: 99%
“…It is aimed to support both vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) communication over infrastructureless network. It is essential to realize that the ITS aims to improve road safety and provides a comfortable travel experience to driver and passengers [1], [8]. There have been numerous research initiatives such as COOPERS, CVIS, SAFESPOT, PReVENT, Wireless Access in Vehicular Environments (WAVE) and Advanced Safety Vehicle Program (ASV) carried out across Europe, US and Japan to turn ITS into a reality.…”
Section: Introductionmentioning
confidence: 99%