Skip to main content
Log in

Modelling and Detection of Worm Propagation for Web Vehicular Ad Hoc Network (WVANET)

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Web Vehicular Ad Hoc Network becomes the major research platform these days. This web vehicular ad hoc network is fundamentally different from the earlier vehicular ad hoc network communication models as it makes use of web technology to disseminate the messages among the nodes. When web technology is integrated in vehicular ad hoc network, the communication performance is greatly increased. However, the new web vehicular ad hoc network communication model should be prevented from various security threats. The major security threat to web vehicular ad hoc network is worm propagation. As web VANET operates through web technology, it is possible to the nodes to get infected with the worms. Once a node is infected with worm, it can spread out to the other nodes in the network that are vulnerable. This worm can propagate to all the vulnerable nodes and infect them within a fraction of time. The entire communication architecture can be collapsed due to this worm propagation and even these worms can broadcast false messages in the network to create accidents or to divert the nodes in such a way it will lead to collision. All the nodes should not be vulnerable to prevent itself from worm infection. This paper provides the worm propagation model for web vehicular ad hoc network. Further it provides detection measures of worm to enhance the security concern of web vehicular ad hoc network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Mohammed, N. H., El-Moafy, H. N., Abdel-Mageid, S. M., & Marie, M. I. (2017). Mobility management scheme based on smart buffering for vehicular networks. International Journal of Computer Networks and Applications (IJCNA), 4(2), 35–46.

    Google Scholar 

  2. Abdel-Mageid, S. (2016). Self-correcting localization scheme for vehicle to vehicle communication. International Journal of Computer Networks and Applications (IJCNA), 3(5), 95–107. https://doi.org/10.22247/ijcna/2016/48829.

    Article  Google Scholar 

  3. Abdel-Mageid, S. (2017). Connectivity based positioning system for underground vehicular ad hoc networks. International Journal of Computer Networks and Applications (IJCNA), 4, 1–14. https://doi.org/10.22247/ijcna/2017/41285.

    Article  Google Scholar 

  4. Ramakrishnan, B., Nishanth, R., Milton, J., & Selvi, M. (2015). Cluster based emergency message broadcasting technique for vehicular ad hoc network. Journal of Wireless Networks. https://doi.org/10.1007/s11276-015-1134-6.

    Article  Google Scholar 

  5. Ramakrishnan, B., Selvi, M., Nishanth, R., & Milton, J. (2016). An emergency message broadcasting technique using transmission power based clustering algorithm for vehicular ad hoc network. Journal of Wireless Personal Communications, 9, 99. https://doi.org/10.1007/s11277-016-3772-0.

    Article  Google Scholar 

  6. Xiong, H., Chen, Z., & Li, F. (2012). Efficient and multi-level privacy-preserving communication protocol for VANET. Computers & Electrical Engineering, 38, 573–581.

    Article  Google Scholar 

  7. Ramakrishnan, B., Milton Joe, M., & Bhagavath Nishanth, R. (2014). Modeling and simulation of efficient cluster based manhattan model for vehicular communication. Journal of Emerging Technologies in Web Intelligence, 6(2), 253–261.

    Google Scholar 

  8. Sandonis, Victor, Calderon, Maria, Soto, Ignacio, & Bernardos, Carlos J. (2013). Design and performance evaluation of a PMIPv6 solution for geonetworking-based VANETs. Ad Hoc Networks, 11, 2069–2082.

    Article  Google Scholar 

  9. Duarte, P. B. F., Fadlullah, Z. M., Vasilakos, A. V., & Kato, N. (2012). On the partially overlapped channel assignment on wireless mesh network backbone: a game theoretic approach. IEEE Journal on Selected Areas in Communications, 30(1), 119–127.

    Article  Google Scholar 

  10. Fonsecan, A., & Vazao, T. (2013). Applicability of position-based routing for VANET in highways and urban environments. Journal of Network and Computer Applications, 36(3), 961–973.

    Article  Google Scholar 

  11. Duarte, P. B. F., Fadlullah, Z. M., Vasilakos, A. V., & Kato, N. (2012). On the partially overlapped channel assignment on wireless mesh network backbone: a game theoretic approach. IEEE Journal on Selected Areas in Communications, 30(1), 119–127.

    Article  Google Scholar 

  12. Nouh, M. S. A., El-ramly, S. H., Zaki, M., & Elsayed, H. A. (2016). Enhanced route discovery mechanism of ad-hoc on demand distance vector for MANET. International Journal of Computer Networks and Applications (IJCNA), 3(6), 129–138.

    Google Scholar 

  13. Joe, M. M., & Ramakrishnan, B. (2015). WVANET: modelling a novel web based communication architecture for vehicular network. Wireless Personal Communications, 85(4), 1987–2001.

    Article  Google Scholar 

  14. Joe, M. M., & Ramakrishnan, B. (2016). Review of vehicular ad hoc network communication models including WVANET (Web VANET) model and WVANET future research directions. Wireless Networks, 22(7), 2369–2386.

    Article  Google Scholar 

  15. Xiang, X., Qin, W., & Xiang, B. (2014). Research on a DSRC-based rear-end collision warning model. IEEE Transactions on Intelligent Transportation Systems, 15(3), 1054–1065.

    Article  Google Scholar 

  16. Wang, Y., Wen, S., Xiang, Y., & Zhou, W. (2014). Modeling the propagation of worms in networks: A survey. IEEE Communications Surveys & Tutorials, 16(2), 942–960.

    Article  Google Scholar 

  17. Moore, D., Shannon, C., & Brown, J. (2002). Code-red: A case study on the spread and victims of an internet worm. In Proceedings of 2nd ACM SIGCOMM workshop on internet measurment (pp. 273–284). ACM. http://dl.acm.org/citation.cfm?id=637244. Accessed 3 May 2017.

  18. Poor, H. V. (1988). An introduction to signal detection and estimation (Vol. 1). New York: Springer.

    Book  Google Scholar 

  19. Weafer, V. (2010). Downadup/conficker and april fools day: One year later. http://www.symantec.com/connect/blogs/downadupconficker-andapril-fool-s-day-one-year-later. Accessed 8 May 2017.

  20. Symantec. (2008). W32.downadup (win32/conficker). http://www.symantec.com/securityresponse/writeup.jsp?docid=2008-112203-2408-99. Accessed 8 May 2017.

  21. Joe, M. M., Shaji, R. S., & Kumar, K. A. (2013). Prevention of worm at router level for providing seamless communication in network environment. International Journal of Engineering and Technology, 5(2), 586–593.

    Google Scholar 

  22. Yu, W., Wang, X., Calyam, P., Xuan, D., & Zhao, W. (2011). Modeling and detection of camouflaging worm. IEEE Transactions on Dependable and Secure Computing, 8(3), 377–390.

    Article  Google Scholar 

  23. Kienzle, D. M., & Elder, M. C. (2003). Recent worms: A survey and trends. In Proceedings of 2003 ACM workshop on rapid malcode (pp. 1–10). ACM. http://dl.acm.org/citation.cfm?id=948189. Accessed 10 May 2017.

  24. F-Secure. (2011). Love letter virus. http://www.fsecure.com/v-descs/love.shtml. Accessed 2 June 2017.

  25. Iloveyou virus lessons learned report. Army Forces Command. http://www.dtic.mil/cgibin/GetTRDoc?AD=ADA415104&Location=U2&doc=GetTRDoc.pdf. Accessed 9 June 2017.

  26. Symantec. (2001). W32.sircam.worm. http://www.symantec.com/securityresponse/writeup.jsp?docid=2001-071720-1640-99&tabid=2. Accessed 8 May 2017.

  27. Joe, M. M., Ramakrishnan, B., & Das, R. (2016). Designing a novel two-tier authentication algorithm for web service architecture. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 8(9), 67–75.

    Google Scholar 

  28. Staniford, S., Paxson, V., Weaver, N., et al. (2002). How to own the internet in your spare time. In USENIX security symposium (pp. 149–167).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Milton Joe.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Milton Joe, M., Ramakrishnan, B., Karthika Bai, S. et al. Modelling and Detection of Worm Propagation for Web Vehicular Ad Hoc Network (WVANET). Wireless Pers Commun 109, 223–241 (2019). https://doi.org/10.1007/s11277-019-06561-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06561-1

Keywords

Navigation