Skip to main content

Advertisement

Log in

Attack Resilient and Efficient Protocol based on Greedy Perimeter Coordinator Routing—Mobility Awareness for Preventing the Attack in the VANET

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

A Correction to this article was published on 10 October 2022

This article has been updated

Abstract

A Greedy Perimeter Coordinator Routing and Mobility Awareness (GPCR-MA) vehicular routing is a widely accepted routing protocol for VANET (Vehicular Ad hoc Network). The insufficiency of security measures in the operating design of GPCR-MA gives possible exposure to a Sybil attack. During a Sybil attack, the attacker (usually a vehicle) collects data packets by replicating multiple forged identities of numerous vehicles. The collected data packets are dropped instead of being forwarded. This paper presented a novel strategy to reduce Sybil attacks effect in the network through reduced storage and routing with computational overhead. The process integrates the phony route request to target or destination vehicles, the sequence number of destination vehicles and then further hop information to improve the restrictions of prevailing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability

Data sharing not applicable to this article as no datasets were generated or analysed during the current study.

Change history

  • 17 September 2022

    The original version of this article was revised: The author name Priti Maheshwary was incorrectly written as Priti Maheshwari. The original article has been corrected.

  • 10 October 2022

    A Correction to this paper has been published: https://doi.org/10.1007/s11277-022-10047-y

References

  1. Fiore, M., Harri, J., Filali, F., & Bonnet, C. (2007, March). Vehicular mobility simulation for VANETs. In 40th Annual Simulation Symposium (ANSS'07) (pp. 301-309). IEEE.

  2. Lee, K. C., Lee, U., & Gerla, M. (2010). Survey of routing protocols in vehicular ad hoc networks. Advances in vehicular ad-hoc networks: Developments and challenges, 149–170.

  3. Bai, F., Sadagopan, N., & Helmy, A. (2003). The IMPORTANT framework for analyzing the impact of mobility on performance of RouTing protocols for adhoc NeTworks. Ad hoc networks, 1(4), 383–403.

    Article  Google Scholar 

  4. Bustamante, D. R. C. F. E. (2005). An integrated mobility and traffic model for vehicular wireless networks. In: Second ACM international workshop on vehicular ad hoc networks (VANET’05).

  5. Camp, T., Boleng, J., & Davies, V. (2002). A survey of mobility models for ad hoc network research. Wireless communications and mobile computing, 2(5), 483–502.

    Article  Google Scholar 

  6. Bai, F., Sadagopan, N., & Helmy, A. (2003, March). IMPORTANT: A framework to systematically analyze the Impact of Mobility on Performance of RouTing protocols for Adhoc NeTworks. In IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428) (Vol. 2, pp. 825-835). IEEE.

  7. Hussain, N., Singh, A., & Shukla, P. K. (2016). In depth analysis of attacks & countermeasures in vehicular ad hoc network. International Journal of Software Engineering and Its Applications, 10(12), 329–368.

    Article  Google Scholar 

  8. Davies, V. A. (2000). Evaluating mobility models within an ad hoc network (Master's thesis, advisor: Tracy Camp, Department of mathematical and computer sciences. Colorado School of Mines).

  9. Saha, A. K., & Johnson, D. B. (2004). Modeling mobility for vehicular ad-hoc networks. In: Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks (pp. 91–92). ACM.

  10. Choffnes, D. R., & Bustamante, F. E. (2005). An integrated mobility and traffic model for vehicular wireless networks. In Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks (pp. 69–78). ACM.

  11. Zuhairi, M., Zafar, H., & Harle, D. (2012). The impact of mobility models on the performance of mobile Ad Hoc network routing protocol. IETE Technical Review, 29(5), 414–420.

    Article  Google Scholar 

  12. Rai, A. P., Datia, S. R. I. T. S., Srivastava, V., Gwalior, I. T. M., & Khare, P. (2014). Effect of Mobility Models on the performance of Proactive and Reactive Routing Protocols. International Journal of Engineering and Innovative Technology (IJEIT), 3(12).

  13. Rani, P., Sharma, N., & Singh, P. K. (2011, September). Performance comparison of VANET routing protocols. In: Wireless communications, networking and mobile computing (WiCOM), 2011 7th international conference on (pp. 1–4). IEEE.

  14. Ahmad, N., & Hussain, S. Z. (2013). Performance analysis of adaptive routing protocol based on different mobility model with varying network size.

  15. Meghanathan, N. (2010). Impact of the gauss-markov mobility model on network connectivity, lifetime and hop count of routes for mobile ad hoc networks. JNW, 5(5), 509–516.

    Article  Google Scholar 

  16. Sharma, G., Mazumdar, R., & Shroff, N. B. (2007). Delay and capacity trade-offs in mobile ad hoc networks: a global perspective. IEEE/ACM Transactions on Networking (ToN), 15(5), 981–992.

    Article  Google Scholar 

  17. Muhtadi, A., Perdana, D., & Munadi, R. (2015). Performance Evaluation of AODV, DSDV, and ZRP Using Vehicular Traffic Load Balancing Scheme on VANETs. International journal of simulation system, science and technology.

  18. Perdana, D., & Sari, R. F. (2013). Mobility models performance analysis using random Dijkstra algorithm and Doppler Effect for IEEE 1609.4 standard. International journal of simulation, systems, science, and technology, united kingdom simulation society.

  19. Liang, B., & Haas, Z. J. (2003). Predictive distance-based mobility management for multidimensional PCS networks. IEEE/ACM Transactions on Networking, 11(5), 718–732.

    Article  Google Scholar 

  20. Ariyakhajorn, J., Wannawilai, P., & Sathitwiriyawong, C. (2006, October). A comparative study of random waypoint and gauss-markov mobility models in the performance evaluation of manet. In: Communications and information technologies, 2006. ISCIT'06. International symposium on (pp. 894–899). IEEE

  21. Hussain, N., Maheshwary, P., Shukla, P. K., & Singh, A. (2017). Simulation-based performance evaluation of GPSR and modified-GPCR routing protocols in vehicular Ad-hoc Network. IJCSIS.

  22. Hussain, N., Maheshwary, P., Shukla, P. K., & Singh, A. (2018). Attack resilient & efficient QoS based GPCR-ARE Protocol for VANET. International Journal of Applied Engineering Research, 13(3), 1613–1622.

    Google Scholar 

  23. Hussain, N., & Rani, P. (2020). Comparative studied based on attack resilient and efficient protocol with intrusion detection system based on deep neural network for vehicular system security. In: Distributed Artificial Intelligence (pp. 217–236). CRC Press.

  24. https://www.isi.edu/nsnam/ns

Download references

Funding

The authors have no funding was received for this manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Naziya Hussain.

Ethics declarations

Conflict of interest

The authors have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The original version of this article was revised: The author name Priti Maheshwary was incorrectly written as Priti Maheshwari. The original article has been corrected.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hussain, N., Maheshwary, P., Shukla, P.K. et al. Attack Resilient and Efficient Protocol based on Greedy Perimeter Coordinator Routing—Mobility Awareness for Preventing the Attack in the VANET. Wireless Pers Commun 126, 2841–2868 (2022). https://doi.org/10.1007/s11277-022-09669-z

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-09669-z

Keywords

Navigation