Prevention of Session Hijacking Attack in VANETs Using Intrusion Detection System

Full Text (PDF, 540KB), PP.73-88

Views: 0 Downloads: 0

Author(s)

Jeevitha.R 1 N.Sudha Bhuvaneswari 1

1. Department of Computer Science, Dr.G.R.Damodaran College of Science, Coimbatore641014, India.

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2018.06.06

Received: 9 Apr. 2018 / Revised: 15 Aug. 2018 / Accepted: 2 Oct. 2018 / Published: 8 Nov. 2018

Index Terms

VANET, IDS, Session, RSU, ITS

Abstract

Vehicular Adhoc Networks (VANET) is a type of road network that provides road safety and other infotainment applications to drivers and passengers for an effective and uninterrupted communication. In this network, the communication between the vehicles are equipped with the Road Side Units (RSU). VANET is the major component of Intelligent Transportation System (ITS). Research on Vehicular Adhoc network security presents many challenging issues to the researchers. The security mechanism available for VANETs are not highly effective. Hence it is as on time requirement of new and sophisticated security solutions. This paper mainly focuses on Intrusion Detection System (IDS) for VANETs to prevent Session Hijacking Attack (SHA). The work discusses on the total number of packet generated, sent, received and dropped with varying number of nodes with the help of Network Simulator-2 (NS2) and the inferred results are discussed.

Cite This Paper

Jeevitha.R, N.Sudha Bhuvaneswari, "Prevention of Session Hijacking Attack in VANETs Using Intrusion Detection System", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.8, No.6, pp. 73-88, 2018. DOI: 10.5815/ijwmt.2018.06.06

Reference

[1]Mostofa Kamal Nasir, Mohammad Khaled Sohel , Mohammad Touhidur Rahman, A.K.M. Kamrul Islam, “A Review on Position Based Routing Protocol in Vehicular Adhoc Network”, American Journal of Engineering Research (AJER), Volume 02, Issue-02, pp.07-13,2013.

[2]Athira V Panicker, Jisha G, “Network Layer Attacks and Protection in MANET- A Survey”, International Journal of Computer Science and Information Technologies, Vol. 5 (3), pp.3437-3443, 2014.

[3]Bassem Mokhtar, Mohamed Azab, “Survey on Security Issues in Vehicular Ad Hoc Networks”, Alexandria Engineering Journal, Volume 54, pp.1115–1126, 2015.

[4]Manraj kaur and Parvinder Singh, “Detection and prevention of DOS Attacks Using Preventive Approach”, International Journal of Research (IJR), Volume 2, Issue 12, pp.211-219, 2015.

[5]M.Azees, P.Vijayakumar, L.Jegatha Deborah, “A Comprehensive Survey on Security Services in Vehicular Ad-Hoc Networks (VANETs)”, IET Intelligent Transport Systems, Vol.10 (6), pp.379-388, 2016. 

[6]Al-Sakib Khan Pathan, “Security of Self-Organizing Networks: MANET, WSN, WMN, VANET”, Chapter 10, Auerbach Publications, CRC Press, pp.218, 2016.

[7]B.S.Manoj and C. Siva Ram Murthy,"Ad Hoc Wireless Networks: Architectures and Protocols” Pearson Education, pp.436-456, 2004.

[8]Shikha Sharma, Shivani Sharma, “A Review: Analysis of Various Attacks in VANET” , International Journal of Advanced Research in Computer Science, Volume 7, No. 3, pp.249-253, 2016.

[9]Chetna Guntewar, Vaishali Sahare, “A Review on Byzantine Attack Detection and Prevention Using Game Theory”, International Journal of Computer Science and Information Technologies, Volume 6 (1), pp.749-752, 2015.

[10]T.Ramaprabha, V.Premalatha, “ A survey on security issues and challenges in VANET”, International Journal of Contemporary Research in Computer Science and Technology (IJCRCST) , Volume2, Issue 7, pp.876-879, 2016.

[11]Lavanya Sharma, Sunil Kumar Bharti, Dileep Kumar Yadav, “ Vehicular Ad Hoc Networks (VANETs): A Survey on Security issues and challenges” International Journal of Advanced Research in Computer and Communication Engineering, Vol. 6, Special Issue 2, pp. 50-55, 2017.

[12]R.S.Raghav, R.Danu, A.Ramalingam, G.Krishna Kumar, “Detection of Node Impersonation for Emergency   Vehicles in VANET”, International Journal of Engineering Research and Technology, Volume 2, Issue 12, pp.3383-3389, 2013.

[13]Geetha.K , N.Sreenath, “Mitigation of session hijacking in mobile ad hoc networks”, International Journal of Applied Engineering Research, Volume 10, pp. 34281-34287, 2015.

[14]Ravikiran Pandurang Pawar, “Detect and Prevent Session Hijacking Attacks in MANET”, Journal of Networking, Computer Security and Engineering, Volume 1 Issue 1, pp.1-7, 2016.

[15]Fahad Nazir Bhatti, R.B. Ahmed, Mohamed Elshaikh and Hamid Mohammad Bhatti, “Comparison of Various Intrusion Detection Systems in VANET”, Journal of Applied Sciences Research, Volume 11, Issue 24 ,pp.1-8, 2015.

[16]Ravi Shanker, Ashish Kr. Luhach and Amit Sardar, “To Enhance the Security in Wireless Nodes using Centralized and Synchronized IDS Technique”, Indian Journal of Science and Technology, Volume 9, Issue 32, pp.1-5, 2016.

[17]Omkar Pattnaik and Binod Kumar Pattanayak, “Security in Vehicular ad hoc network based on Intrusion Detection System”, American Journal of Applied Sciences, Volume 11, Issue 2, pp.337-346, 2014.

[18]Kuyoro Shade O., Okolie Samuel O. and Oyebode Aduragbemi, “Session Hijacking in Mobile Ad-hoc Networks: Trends, Challenges and Future”, Research Journal of Mathematics and Computer Science, Volume 1, Issue 2, pp.1-8, 2017.

[19]Needhi Lathar, Shashi Bhushan and Manish Mahajan, “Enhanced Direction Based Hazard Routing Protocol for Smooth Movement of Vehicles”, International Journal of Computer Network and Information Security, 2, pp.49-55, 2016.

[20]Uzma Khan, Shikha Agrawal and Sanjay Silakari, “ A Detailed Survey on Misbehavior Node Detection Techniques in Vehicular Adhoc Networks”, Information Systems Design and Intelligent Applications,Proceedings of Second International Conference, Volume 1, pp.11-19, 2015.

[21]http://www.isi.edu/nsnam/ns/ 

[22]http://www.tracegraph.com/download.html

[23]www.nsnam.com/2012/09/tracegraph-graphing-software-to-plot.html

[24]Richa Sharma, Jyoteesh Malhotra,"Performance Evaluation of AODV and GOD for Qos Aware Applications through Realistic Conditions in VANET", International Journal of Computer Network and Information Security, Volume 7, no.11, pp.64-71, 2015.