Abstract- VANET is a vehicular ad hoc network where a short- Nodes in VANET are subjected to various types of
lived network is formed among the VANET nodes. VANET impersonation attacks, few of which are hard to deal with,
nodes communicate and interchange messages with other even if any security mechanisms are enforced. Some of
vehicular nodes either in an infrastructure or infrastructure- which are Sybil attack, stolen identity attack, Man-in-the-
less network. Due to lack of fixed infrastructure, VANET is Middle attack. Identification of the node and its
prone to varied attacks. In impersonation attack, identity of authentication are of fundamental importance within a
the legitimate node is stolen by an attacker. In this paper, secure network [4].
Building up Secure Connection along with Key Factors
(BUCK) Filter detects against impersonation attack by Over the last few decades, many researches and efforts
broadcasting beacons and detecting the accurate position of the have been done to investigate various issues related to V2I,
messaged vehicle. Once the faulty node is detected, it is isolated V2X areas. Several approaches to deal with identification of
from the communication environment. VANET Content the node and its authentication in VANET have been
Fragile Watermarking is used to transit the messages in a proposed in the literature. Norbert Bibmeyer [9] et al
secure way through images. The proposed scheme has been proposes a scheme based on data plausibility check that
analyzed using the metrics Beaconing Overhead, Node Load, ensures positional reliability in order to assess the
Routing Stretch, CDF, Delay.
trustworthiness of the neighboring node. S. Roselin Mary
Index Terms--BUCK, VCFW, CA, IDS, MI, CDF. [3] et al proposes an attacked packet detection algorithm to
detect the position of the vehicle and checks whether the
I. INTRODUCTION packet sent by the vehicle has been attacked or not.
Vehicular Ad Hoc Network (VANETs) is a mobile The proposed scheme floods the beacons into the
network where a short lived and self organizing network is network to discover the presence of the neighboring
formed among the vehicles. Network operates either in an vehicles and accurate position of the messaged vehicle is
infrastructure network (V2X) or in an infrastructure less
detected. It verifies the MD5 hashes assigned to the VANET
network (V2V). In an infrastructure network, Road Side
Units (RSUs) interacts with vehicles wireless equipments nodes and once a malicious node is detected, warning
in a sporadically mode when a vehicle passes by it. In an message will be broadcasted to all the trusted VANET
infrastructure less network, Vehicles communicate with nodes and the malicious node is isolated from the
other vehicles on-Board Units (OBUs) to exchange security communication environment. Authentication is done
messages. Each vehicle is equipped with a set of sensors through VANET Content Fragile Watermarking. In this
such as GPS, Radar, and Directional antenna [1]. paper we focus on security, faulty node detection and
authentication schemes. A city scenario is considered with
The characteristics of this network are: wireless
10 vehicles and 3 RSUs and it is further analyzed on the
medium, mobile nature, high mobility, absence of
basis of various performance metrics.
infrastructure, high dynamic network topology [2].
The paper is devised as followed; Section 2 described
Due to lack of fixed infrastructure, nodes are prone to
varied attacks. Securing the communication among vehicles IDS; Section 3 describes the system model; Section 4 shows
is the main challenge that lies in the vehicular network. the simulation results.
Deployment of network intrusion detection system helps in
identifying the attack taken place in vehicular network [3].
___________________________________
978-1-4799-6805-3/15/$31.00 2015 IEEE
2015 International Conference on Computer Communication and Informatics (ICCCI -2015), Jan. 08 10, 2015, Coimbatore, INDIA
It will give two images as an output that seems to Routing Stretch: Routing stretch addresses the reliable
be identical. But in actual, one image is the original delivery at large scale and at high constrained node. Due to
one and the other image is the watermarked image increasing network size and the network density, routing
that hid the content in it. stretch is important to achieve.
Before the transmission of the image over the
Cumulative Distribution Frequency is taken at the y-axis
network, it is compressed as it would consume
that represents the function that described that the
less bandwidth and other resources. probability of a random-variable provided with the
Compression takes place at the sender end in which probability distribution is found to be less than it should be.
dimensions of the image are made half to its actual Here in this graph, successful delivery of the data is attained
size. It has no effect on the content hidden in it. no matter how much dense the network is.
Image is then transmitted over the network.
At the Destination End;
Compressed image is received at the destination
end.
Compressed image is then decompressed to bring
the dimensions of the image back to the original
size.
Key used for insertion of data in the image is used
at the destination end to extract the data from the
image.
IV. SIMULATION RESULTS
Delay: Delay is calculated from one end to another end. [3] [S. RoselinMary, M. Maheshwari, M. Thamaraiselvan, Early
Detection of DOS Attacks in VANET Using Attacked Packet
Delay is a parameter that plays a crucial role in the field of
Detection Algorithm (APDA), IEEE, 21-22 February 2013, pp.
VANET. Vehicles are not stationary. Impact of mobility is 237-240.
very high and due to mobile nature of vehicular network, [4] Dimitris Glynos, Panayiotis Kotzanikolaou, Christos Douligeris,
various threats and attacks are prone to it. So, drivers must Preventing Impersonation Attacks in MANET with Multi-factor
Authentication, WIOPT05 Proceedings of the Third International
be provided with timely and accurate information so as to
Symposium on Modeling and Optimization in Mobile, Ad Hoc, and
avoid the collisions. Here in this graph, the delay is accepted Wireless Networks, 2005, pp. 59-64.
up to some milliseconds. [5] Noriaki Tanabe, Eitaro Kohno, and Yoshiaki Kakuda, An
Impersonation Attack Detection Method Using Bloom Filters and
Dispersed Data Transmission for Wireless Sensor Networks, IEEE
International Conference on Green Computing and Communications,
Conference on Internet of Things, and Conference on Cyber,
Physical and Social Computing, 20-23 November 2012. pp. 767-770.
[6] Irshad Ahmed Sumra, Iftikhar Ahmad, Halabi Hasbullah, Classes
of Attacks in VANET, IEEE, April 2011, pp. 1-5.
[7] Irshad Ahmed Sumra, Iftikhar Ahmad, Halabi Hasbullah, Behavior
of Attacker and Some New Possible Attacks in Vehicular Ad hoc
Network (VANET), Ultra Modern Telecommunications and
Control Systems and Workshops (ICUMT), 2011 3rd International
Congress on IEEE 5-7 Oct. 2011, pp. 1-8.
[8] Chen Lyu, Dawu Gu, Xiaomei Zhang, Shifeng Sun, Yingi Tang,
2013, Efficient, Fast and Scalable Authentication for VANETs,
IEEE Wireless Communications and Networking Conference, 7-10
April 2013, pp. 1768-1773.
[9] Md. Mashud Rana, Khandakar Entenam Unayes Ahmed, Nazmur
Rowshan Sumel, Md. Shamsul Alam, Liton Sarkar, Security in Ad
Figure 8: Number of Vehicles vs. Delay Hoc Networks: A Location Based Impersonation Detection
Method, IEEE International Conference on Computer Engineering
V. CONCLUSION and Technology, vol. 2, January 2009. pp. 380-384.
[10] Norbert Bibmeyer, Sebastian Mauthofer, Kpatcha M. Bayarou,
Detection of attack is an important requirement for the Frank Kargl, Assessment of Node Trustworthiness in VANETs
trustworthy communication among VANET network nodes. Using Data Plausibility Checks with Particle Filters, IEEE
Vehicular Networking Conference (VNC), 14-16 November 2012.
BUCK Filter is a method proposed to detect against pp. 77-85.
impersonation attack whereas VANET Content Fragile [11] Wei-Fan Hsieh, Pei-Yu Lin, Analyze the Digital Watermarking
Watermark transmits the message in a more secure manner. Security Demands for the Facebook Website, IEEE Sixth
Attacker after stealing the identity of a valid user pretends to International Conference on Genetic and Evolutionary Computing,
25-28 August 2012. pp. 31-34.
be a registered user further sends messages to other VANET [12] Rodrigo Fonseca, Sylvia Ratnasamy, Jerry Zhao, Cheng Tien Ee,
nodes at different timestamps and from different locations. Beacon Vector Routing: Scalable Point-to-point Routing in
Detection of the location of the messaged vehicle helps in Wireless Sensornets, NSDI'05 Proceedings of the 2nd conference
detecting the intruder. A range of simulations have on Symposium on Networked Systems Design & Implementation,
vol. 2, 2005, pp. 329-342.
conducted, BUCK Filter is found to be useful in identifying
the attacker with a low overhead of beacons and high
throughput.
REFERENCES