2016 8th International Conference on Computational Intelligence and Communication Networks (CICN) 2016
DOI: 10.1109/cicn.2016.91
|View full text |Cite
|
Sign up to set email alerts
|

Malicious Node Detection on Vehicular Ad-Hoc Network Using Dempster Shafer Theory for Denial of Services Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…The current lack of a high level of security in driverless cars is one of the biggest inhibiting factors for their wide use. VANET supervises the road traffic and shares the data of each vehicle with those in its proximity (Kushwah and Sonker 2016). VANET employs fixed and movable nodes.…”
Section: Introductionmentioning
confidence: 99%
“…The current lack of a high level of security in driverless cars is one of the biggest inhibiting factors for their wide use. VANET supervises the road traffic and shares the data of each vehicle with those in its proximity (Kushwah and Sonker 2016). VANET employs fixed and movable nodes.…”
Section: Introductionmentioning
confidence: 99%
“…The leakage of that model is a bunch of compromised nodes can run DoS attack. A scheme has been proposed in [16] to prevent any quantity sending fake requests and trying to break the security of the network.…”
Section: Related Workmentioning
confidence: 99%
“…The best strategy for a criminal when both criminals do not know the other's decision is to "defect" to avoid 9 years which is the worst case. Trust model with group leader GL Security risk assessment methodology [11] Fuzzy trust model Fuzzy logic [12] Trust management ALRS and ATMS [13] Trust management VANSec [14] Blockchain-based decentralized trust management Asymmetric cryptography, signature [15] Game theory NE is used to choose the appropriate parameters for detecting and responding to the attack [16] Game theory Three NEs are used to model trust in network to cooperate and reach the efficient equilibrium [17] Game theory NE is used to model networks security problems [18] Game theory NEs are used to model the simultaneous move game [19] Game theory NE is used to allocate resources in each Battlefields [20] Game theory Dempster-Shafer theory is used for finding attacker node [21] Game theory NE is obtained when the attacker vehicle continues to attack and the honest vehicle change its direction [22] Game theory NE is used to define stability of the system [23] Game theory NE is used to calculate best strategy for attacker and defender In Table 2, (defect, defect) = (5, 5) is a Nash equilibrium but it is not an optimal equilibrium.…”
Section: Proposed Approachmentioning
confidence: 99%
“…In Chia and Chuang [19], authors used NE to allocate resources in each Battlefields (example phishing site in term on domain name or IP address or site on shared hosting service. In Kushwah and Sonker [20], the authors used self-organizing map classifier for the detection of misbehavior node. In this classification, they used Dempster-Shafer theory for finding attacker node is applied.…”
Section: Introductionmentioning
confidence: 99%