Intrusion Detection - Watchdog : For Secure AODV Routing Protocol in VANET

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2013 by IJETT Journal
Volume-4 Issue-5                      
Year of Publication : 2013
Authors : Nishant P Makwana , Sunil K Vithalani , Jayesh D Dhanesha

MLA 

Nishant P Makwana , Sunil K Vithalani , Jayesh D Dhanesha. "Intrusion Detection - Watchdog : For Secure AODV Routing Protocol in VANET". International Journal of Engineering Trends and Technology (IJETT). V4(5):2151-2157 May 2013. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group.

Abstract

Vehicular Ad hoc Network (VANET) needs security to implement the wireless environment and serves users with safety and comfort applications. Attackers generate different attacks in v ehicular network. In this paper , first phase implementation of attacker node in AODV routing protocol in VANET and in second phase identify malicious node with watchdog intrusion detection system. Once the attacker node is identified we will prevent it to communicate with other neighbor nodes in network with the help of Beyesian network theory. From Beyesian network theory find probability of the neighbouring node being attacker node. To make s ecure AODV connection with generate new Route Request Packet (RREQ) in VANET .

References

[1] Brijesh Kumar Chaurasia, Shekhar Verma “Attacks on Anonymity in VANET” - 209 International Conference on Computational Intelligence and Communication Systems
[2] Irshad Ahmed Sumra,Iftikhar Ahmad, Halabi Hasbullah,“ Class es of Attacks in VANET ”
[3] Sandhaya Kohli, Bandanjot Kaur, Sabina Bindra “A comparative study of Routing Protocols in VANET”
[4] F. Maan, Y. Abbas, N. Mazhar “ Vulnerability Assessment of AODV and SAODV Routing Protocols Against Network Routing Attacks and Pe rformance Comparisons ”
[5] Tajinder Kaur, A. K. Verma ” Simulation and Analysis of AODV routing protocol in VANETs ” - Volume - 2, Issue - 3, July 2012
[6] Harris Simaremare, Riri Fitri Sari ” Performance Evaluation of AODV variants on DDOS, Blackhole and Mal icious Attacks ” - VOL.11 No.6, June 2011
[7] Sushil Kumar Chamoli, Santosh Kumar “ Performance of AODV against Black Hole Attack s in Mobile ad - hoc Networks “ - Vol 3 (4), 1395 - 1399
[8] Ghassan Samara, Wafaa A.H. Al - Salihy, R. Sures National Advanced IP v6 Center, Universities Sains Malaysia Pena ng, Malaysia “ Security Analysis of Vehicular Ad Hoc Networks ” - 2010 Second International Conference on Network Applications, Protocols and Services
[9] Vijay Kumar, Rakesh Kumar “ Effect of Malicious Nodes on A ODV in Mobile Ad Hoc Networks ” - Vol 1 Issue 3 October 2012
[10] SUMO User Documentation : http://sumo.sourceforge.net/
[11] Rapid Generation of Realistic Simulation for VANET Manual http://lens1.csie.ncku.edu.tw/MOVE/index.htm
[12] A Tutorial on the Implementation of Ad - hoc OnDemand Distance Vector (AODV) Protocol in Network Simulator (NS - 2)
[13] AWK : http://mohittahiliani.blogspot.in/2009/12/awk - script - for - ns2.html
[14] Add malicious node in AODV: http://narentada.com/what - is - black - hole - attack - in - manets - my - code - for - adding - malicious - node - as - blackhole - in - aodv - protocol/
[15] GNU Plot : https://sites.google.com/a/seecs.edu.pk/network - technologies - tcp - ip - suite/home/analysis - of - p erformance - of - broadcast - traffic - in - multi - radio - multi - channel - multi - rate - wireless - mesh - networks - using - ns - 3 - sarfraz - ahmed/implementation/handling - output - trace - files
[16] Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker “ Mitigating Routing Misbehavior in Mobile Ad Hoc Networks ”
[17] Jorge Hortelano, Juan Carlos Ruiz, Pietro Manzoni “ Evaluating the uselfusness of watchdogs for intrusion detection in VANETs ”
[18] Mahmoud Abuelela Stephan Olariu “ Automatic Incident Detection In VANETs: A Bayesian Ap proach ”
[19] Sanjay Sharma Abhinav Jain and Mahendra Singh Siso dia ” Network Intrusion Detection By using Supervised and Unsupervised Machine Learning Techniques: A Survey ". In:International Journal of Computer Technology and Electronics Engineering. 2011 .
[20] Christian CALLEGARI. “ Network Security: Attacks and Defenses ".
[21] Yu - Feng Hsu Chih - Fong Tsai. “ Intrusion detection by machine learning: A review ". In: Expert Systems with Applications 36. Expert Systems with Applications 36. Elsevier, 2009, pp. 11994{12000}
[22] S. Zair M. Mehdi, A. Anou, and M. Bensebti. “ A Bayesian Networks in Intrusion Detection Systems ". In: Journal of Computer Science 3 (5): 259 - 265. Science Publications, 200 7

Keywords
VANET, AODV, SUMO , NS2 , Watchdog, RREQ, Beyesian Network