A distributed trust mechanism for malicious behaviors in VANETs

Vehicular ad-hoc networks (VANETs) are one of the most important types of networks which are widely used in recent years. Along with all the benefits of quality of service (QoS) improvements, vulnerability analysis for this type of networks is an important issue. For instance, a gray-hole attack dec...

Full description

Saved in:
Bibliographic Details
Main Authors: Kamil Ahmed, Ali (Author), Najm Abdulwahed, Mohanad (Author), Farzaneh, Behnam (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2020-09-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02416 am a22003133u 4500
001 ijeecs22114_14145
042 |a dc 
100 1 0 |a Kamil Ahmed, Ali  |e author 
100 1 0 |e contributor 
700 1 0 |a Najm Abdulwahed, Mohanad  |e author 
700 1 0 |a Farzaneh, Behnam  |e author 
245 0 0 |a A distributed trust mechanism for malicious behaviors in VANETs 
260 |b Institute of Advanced Engineering and Science,   |c 2020-09-01. 
500 |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/22114 
520 |a Vehicular ad-hoc networks (VANETs) are one of the most important types of networks which are widely used in recent years. Along with all the benefits of quality of service (QoS) improvements, vulnerability analysis for this type of networks is an important issue. For instance, a gray-hole attack decreases network performance. We proposed a novel solution to help to secure these networks against this vulnerability. The proposed method can detect and prevent the gray-hole attack. Anywhere in the network, each node (vehicle) can distinguish between the gray-hole attack and the failed link. Some topology related information helps us to detect attacks more accurately. Also, the proposed method uses the most reliable path in terms of link failure when there is no malicious node. In this paper, we used the TOPSIS method for choosing the most trusted node for routing intelligently. We validated our proposal using a simulation model in the NS-2 simulator. Simulation results show that the proposed method can prevent Gray-hole attack efficiently with low overhead. 
540 |a Copyright (c) 2020 Institute of Advanced Engineering and Science 
540 |a http://creativecommons.org/licenses/by-nc/4.0 
546 |a eng 
690 |a Computer Networks; Vehicular Ad-hoc Networks 
690 |a Detection and prevention; Gray-hole attack; TOPSIS method; VANET; Vulnerability 
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 19, No 3: September 2020; 1147-1155 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v19.i3 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/22114/14145 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/22114/14145  |z Get fulltext