Avoiding Prankster Attack in Case of Selfish Driver Using the Location Aware Fixed Nodes - A Review

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2014 by IJETT Journal
Volume-12 Number-7
Year of Publication : 2014
Authors : Namrata Singh , Khushneet Kaur


Namrata Singh , Khushneet Kaur. "Avoiding Prankster Attack in Case of Selfish Driver Using the Location Aware Fixed Nodes - A Review ", International Journal of Engineering Trends and Technology (IJETT), V12(7),311-313 June 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group


VANET Security is a popular research area and concerns with the automatically driven vehicles. VANETs are prone to number of security breaching methods. These security breaches can be categorized as Replay Attach, Denial of Service, Fabrication Attack, Prankster Attack, etc. These attacks can cause massive traffic congestion, accident or to hurt large number of people with terrorism activities. Prankster Attack is the one, which is launched by sending the false information to other vehicles, which can cause traffic congestion, accident or terrorism activities. In this paper, we are proposing a method to prevent the prankster attack. This attack can be prevented by implementing fixed and location-aware nodes across the road, which can compare the GPS coordinates with its coverage area to make the decision that vehicle is transmitting true or false information.


[1] Fuad A. Ghaleb, M. A. Razzaque, Ismail FauziIsnin “Security and Privacy Enhancement in VANETs using Mobility Pattern” (IEEE,2013).
[2] Ghassan Samara, Wafaa A.H. Al-Salihy, R. Sures “Security Issues and Challenges of Vehicular Ad Hoc Networks (VANET)” (IEEE,2010).
[3] Patrice Seuwou, Dilip Patel, Dave Protheroe, George Ubakanma “Effective Security as an ill-defined Problem in Vehicular Ad hoc Networks (VANETs)”.
[4] Muhammad A. Javed and Jamil Y. Khan “A Geocasting Technique in an IEEE802.11p based Vehicular Ad hoc Network for Road Traffic Management”. (2010).
[5] Chia-Chen Hung, Hope Chan, and Eric Hsiao-Kuang Wu “Mobility Pattern Aware Routing for Heterogeneous Vehicular Networks”( IEEE WCNC 2008).
[6] João A. Dias, João N. Isento, Vasco N. G. J. Soares, FaridFarahmand, and Joel J. P. C. Rodrigues “Testbed-based Performance Evaluation of Routing Protocols for Vehicular Delay-Tolerant Networks” (2011 IEEE).
[7] Steffen Moser, Simon Eckert and Frank Slomka “An Approach for the Integration of Smart Antennas in the Design and Simulation of Vehicular Ad-Hoc Networks” 2012 IEEE.
[8] Irshad Ahmed Sumra, HalabiHasbullah, J.AbMananMohsanIftikhar,Iftikhar Ahmad, Mohammed Y Aalsalem “Trust Levels in Peer-to-Peer (P2P) Vehicular Network”2011 IEEE.
[9] Irshad Ahmed Sumra, HalabiHasbullah, Jamalul-lailAbManan, “VANET Security Research and Development Ecosystem”, 2011 IEEE.
[10] Lu Chen, Hongbo Tang, Junfei Wang, “Analysis of VANET Security Based on Routing Protocol Information”, 2013 Fourth International Conference on Intelligent Control and Information Processing (ICICIP) June 9 – 11, 2013, Beijing, China pp.134-138.
[11] M. Khabazian, M. K. Mehmet Ali, “A Performance Modeling of Vehicular Ad Hoc Networks (VANETs)”, 2007 IEEE.

Prankster attack, VANET(vehicular ad hoc network)