IEJRD Journal of Science & Technology E-ISSN: 2349-0721 Volume :1 Issue 1
A PRACTICAL APPROACH ON DETECTING MALICIOUS NODE IN URBAN VEHICULAR NETWORK Mr.Mohan Jaynarayan Pande1,Prof.Anil Rao2 1
M-Tech Student , 2Asst. Professor IET,Alwar ,Rajastan
1
pande.mohan62@gmail.com, 2 anil.alw@gmail.com
---------------------------------------------------------------------------------------Abstract In V2V Area, where solitude of automobile, largely the position of automobile is extremely not crackled, nameless verification of vehicles is impossible to discuss or distinction. first, two authorized identity messages signed by the equivalent RSU inside the equal given period of time that concerning with each other for provisional purpose are recognizable in order that they can be used for discovery; Second ,Road-Side Unit signatures on messages are signer are different so that the RSU location identity information is hidden from the resulted official message. In this project , we mentioned a simple Sybil attack occur in the network using the trajectories of vehicles for identification of the node while at rest maintaining the node location privacy in the network. When a node in the vehicular network associates a Road-Side Unit (RSU), it dynamically demands an authorization identity message from the RSU as the proof identity of the vehicle in the Current RSU region. A malicious node (attacker in network) who tries to forging multiple same false identities of the node available in the network can easily launch an attack called Sybil attack, gaining a suspiciously large influence. More predominantly, we construct a location-hidden identity approved message invention method for two objectives: With the some restriction, official messages from the node used for long-term identification are declined so that at the exacting road side unit its authorization is used as proof of vehicle. With this order on the identity scheme, vehicles keep its location privacy as the identification by taking all the series of Sequence of authorized message. Also vehicle i.e. nodes in the vehicular network
generate a location-hidden trajectory for preserving
location-privacy identification. Utilizing social association amongst trajectories according to the resemblance definition of two trajectories, detecting attacker node can recognize and therefore discharge “community” of Sybil trajectory. Rigorous sanctuary analysis and widespread trace-driven simulations exhibit the worth of detection attacker. Key Terms: DSRC, ITS, RSU, V2X.
Introduction An application domain where those visions can become reality in the near future is wireless communication in vehicular traffic networks in order to improve traffic safety and to increase traffic efficiency, vehicle-to-X communication (V2X) networks. The notations car-to-X communication (C2X) and vehicular ad- hoc networks (VANETs) are synonymously used. The “X” emphasizes that either solely vehicles communicate (vehicle-to-vehicle communication (V2V)), or so do vehicles and infrastructure points (vehicle-to-infrastructure communication(V2I)). For both types of communication similar technologies may be used, and networks combining both are expected. In this thesis www.iejrd.in
Page 1