Sunteți pe pagina 1din 2

SECURITY THREATS: A FRAMEWORK FOR PATH FORGING ATTACK IN VANET USING NCTUNS 5.

0
Shivani Singh1, Dr. B.V.R Reddy2
1

Department of Computer Engineering, JSS Academy of Technical Education, Noida, India University School of Information Technology, G.G.S. Indraprastha University, Delhi, India shivani1928@gmail.com1, bvrreddy64@yahoo.co.in2

1. Abstract Vehicular networks are very appealing and important concept as traffic is becoming heavy and mobility is getting increased. This heavy traffic and increased speed has raised the issues related with security threats because it can cause inconvenience in traffic and can also result into accidents. Security analysis in the past years has shown that VANETs are vulnerable of many attacks based on position information and node IDs. This work is the modelling of attackers that target sensitive safety applications in vehicular ad-hoc network. Through the introduction of integrated network and traffic simulation platform called NCTUns-5.0, this work simulates threats and severe attacks in inter-Vehicle communication. This platform provides the capabilities of roadmap simulation, communication and vehicular traffic simulation. It is very appropriate for advanced wireless vehicular ad-hoc network research where a vehicle needs to change its mobility behaviour after receiving a message from a neighbouring vehicle. The simulation work shows that the most serious threat arises from forged position information and fake node IDs. The work show that freedom, available for position forging and node ID brings two attacks in light: Sybil attack and Path Forging attack.

8. References [1]. Kargl F., Leinmller T, Schoch E, Position verification approaches for vehicular ad-hoc networks. IEEE Wireless Communications, Special Issue on Inter ehicular Communications 2006; 13(5): 16-21. [2]. E. Schoch, F. Kargl, C. Maihfer, and T. Leinmller, Decentralized position verification in geographic ad-hoc routing, Wiley Security and Communication Networks Journal, 2009. [3]. Kargl F, Leinmller T, Maihfer C, Schoch E. Improved security in geographic ad-hoc routing through autonomous position verification In VANET 06: Proceedings of the 3 rd International Workshop on Vehicular Ad-Hoc Networks, ACM Press, New York, NY, USA, 2006; pp. 57-66.

[4]. T. Leinmlleret, Influence of Falsified Position Data on Geographic Ad-Hoc Routing, Proc. 2nd European Wksp. Security and Privacy in Ad-hoc and Sensor Networks (ESAS2005), July 2005. [5]. E. Schoch, T. Leinmllerand, Greedy Routing in Highay Scenarios: The Impact of Position Faking Nodes, Proc. Wksp. Intelligent Transportation (WIT2006), Mar. 2006. [6]. B. Parno and A. Perrig. Challenges in Securing Vehicular Networks. In Proc. Of the Fourth Workshop on Hot Topics in Networks (Hot Nets-IV), 2005. [7]. J. Newsome, E. Shi, D. Song, and A. Perrig. The Sybil Attack in Sensor Networks: Analysis & Defences. In Proc. Of the Third International Symposium on Information Processing in Sensor Networks (IPSN2004), pp.259-268, 2004. [8]. J. J. Blum, A. Eskandarian, and L. J. Hoffman, Challenges of intervehicle ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, vol. 5, pp. 347-351, 2004. [9]. R. Maxim and H. Jean-Pierre, The security of vehicular ad hoc networks, Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, 2005. [10]. J. Douceur. The Sybil Attack. In First International Workshop on Peer to Peer Systems, pages251260, 2002. [11]. A. Aijaz, B. Bochow, F. Dotzer, A. Festag, M. Gerlach, R. Kroh, and T. Leinmuller, Attacks on inter-vehicle communication systems an analysis, in Proceedings of Workshop on Intelligent Transportation (WIT2006), 2006. [Online]. Available: http://www.leinmueller.de/ publications/wit2006- AttackModel.pdf

S-ar putea să vă placă și