Detection of Wormhole Attack in Vehicular Ad-hoc Network over Real Map using Machine Learning Approach with Preventive Scheme
Publish Year: 1401
نوع سند: مقاله ژورنالی
زبان: English
View: 130
This Paper With 21 Page And PDF Format Ready To Download
- Certificate
- من نویسنده این مقاله هستم
این Paper در بخشهای موضوعی زیر دسته بندی شده است:
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
JR_JITM-14-6_012
تاریخ نمایه سازی: 22 تیر 1401
Abstract:
VANET (Vehicular Ad-hoc Network) is a developing technology, which is a combination of cellular technology, ad-hoc network & wireless LAN to improve the safety of vehicle as well as driver. VANET communication can be of two types, first one is broadcast and second one is unicast. Either communication may be broadcast or unicast both are sensitive to different types ofassaults, for example message forgery, (DOS) denial of service, Sybil assault, Greyhole, Blackhole & Wormhole assault. In this paper machine learning method is used to detect the wormhole assault in VANET’s multi-hop communication. We have created a scenario of VANET by using AODV routing protocol on NS-۳.۲۴.۱ simulator, which utilizes the overall mobility traces generated by the simulator SUMO-۰.۳۲.۰ to model the wormhole assault. The simulation is performed by using NS-۳.۲۴.۱ simulator, and the statistics created by flow monitor are collected. The collected data is pre-processed and the k-NN & Random Forest algorithms are applied on this data, to make the model such type so that it can memorize the wormhole attack. The novelty of this research work is that with the help of proposed detection & prevention technique, vehicular ad-hoc network can be made free from wormhole assault by using ML approach. The performance of proposed machine learning models is compared with existing work. In this way it is clear that our proposed approach by using ML is powerful tool by which the wormhole assaults can be detected in VANETs. A scheme based on packet lease and cryptographic techniques is used to prevent the wormhole attack in VANET
Keywords:
VANET , AODV , Broadcast , Unicast , k-NN , Random forest , SUMO-۰.۳۲.۰ , NS-۳.۲۴.۱ , Packet leash , Cryptography
Authors
Ali
Assistant Professor, Department of Computer Science & Engineering at SRMSCET, Bareilly (UP) India, Affiliated to Dr. A.P.J. Abdul Kalam Technical University, Lucknow, Uttar Pradesh, India.
Nand
Professor and Dean Academic Affairs, Sharda University Greater Noida (U.P.) India, Pin Code:۲۰۱۳۰۶.
Tiwari
Professor and Director, KEC, Ghaziabad (U.P.) India, Affiliated to Dr. A.P.J. Abdul Kalam Technical University, Lucknow, Uttar Pradesh, India.
مراجع و منابع این Paper:
لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :