International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056
Volume: 11 Issue: 09 | Sep 2024
p-ISSN: 2395-0072
www.irjet.net
Mitigating Gray Hole Attacks in the Internet of Vehicles Using PGHA and Network Trust Score Niharika N1, Akhila S2 1Post Graduate Student, Department of ECE, BMS College of Engineering, Bengaluru, India 2Professor, Department of ECE, BMS College of Engineering, Bengaluru, India
---------------------------------------------------------------------***--------------------------------------------------------------------Owing to its practicality, ease of use, and adaptability, the development of the Internet of Vehicles (IoV), new cars with integrated onboard sensors allow them Intelligent Transportation Systems (ITS), and Vehicles to interact with one another and make best use of the to Everything (V2X) connectivity by providing a advantages offered by VANET's. These kinds of multitude of commercial and safety applications. technologies work best in a variety of domains, such as Though VANETs have potential advantages, they are fleet and traffic management, entertainment, and safety open, distributed, and dynamic making them [4]. Three components make up a VANET from an vulnerable to a range of security threats, including architectural perspective: Trusted Authority (TA), inherent protocol design vulnerabilities. The infamous RSUs, and OBUs (On-Board Units). Three Gray- Hole Attack (GHA), which comes in two versions: communication modes produced by these components Smart GHA and Sequence Number-based GHA, is one are infrastructure-to-infrastructure (I2I) such attack. The malicious node in Sequence Numbercommunications, vehicle-to-vehicle (V2V), and vehiclebased GHA begins acting strangely throughout the to-infrastructure (V2I) communications [14]. The ITS's route discovery process, whereas in Smart GHA, the backbone, VANET, is essential for giving real time malicious node acts normally during this phase. In both information to drivers, passengers, and traffic the cases, the packets are dropped immediately after the administration authorities [7], [8]. route is successfully established. In this paper, a novel security approach called ‘‘Prevention of GHA’’ (PGHA) is proposed to detect and prevent both variants of GHA in Ad Hoc On-Demand Distance Vector (AODV) based VANETs. The approach is based on the generation of dynamic threshold values that identify abnormal differences in received, forwarded, and generated control or data packets among nodes and their sequence numbers. The proposed PGHA is implemented and tested in MATLAB and its performance is compared with the most relevant benchmark approaches. The results showed that the proposed PGHA Fig 1. Vehicle to Everything performed better than the benchmark approaches in terms of increased detection accuracy of 97% on an Security Problems with VANETs: Because of their average. unique features, VANETs face a number of security problems and challenges in spite of their remarkable Key Words: — GHA, PGHA, RREP, RREQ, RSU, MRT, applications, importance, and adaptability. VANET DSN, NTS. communications are particularly vulnerable to various security threats owing to their large-scale, rapid pace, 1.INTRODUCTION open access medium, a highly dynamic network architecture, frequent disconnection, and protocol Vehicular Ad Hoc Network (VANET) is a specific type of design flaws [2], [4], [9], [10]. Though there are several ad hoc network in which a group of moving vehicles routing protocols available for establishing paths and fixed Road Side Units (RSUs) are connected between nodes, AODV is one of the most popular together through a wireless medium to provide a safe choices for VANETs [12], [13]. and secure traffic environment [1], [2], [3]. Abstract - Vehicular Ad-Hoc Networks (VANETs) drive
© 2024, IRJET
|
Impact Factor value: 8.315
|
ISO 9001:2008 Certified Journal
|
Page 89