SlideShare a Scribd company logo
1 of 25
Avoiding Packet Dropping
Misbehavior in VANET Using Trust
Based Ant Colony Optimization
Prepared By:
Kishan N. Patel
CSE and IT Department
SVMIT, Bharuch
OUTLINES
 Introduction of VANET
 Security in VANET
 Security
 Trust
 Metaheuristic Approach
 Why Metaheuristic ?
 Ant Colony Optimization
 Literature Survey
 Problems
 Trust Based ACO
 Conclusion and Future work
 References
Kishan Patel M.E (I.T) En no - 130450723011 2
INTRODUCTION OF VANET
 Vehicular ad hoc network (VANET) [1] uses cars as mobile nodes in a MANET to create a
mobile network.
 Vehicular ad hoc networks are a subgroup of mobile ad hoc networks (MANETs).
Fig 1. Vehicular Ad hoc network [1]
 Cars fall out of the signal range and drop out of the network, other cars can join, by connecting
vehicles to one another form a wireless network called “Vehicular Ad Hoc Network”.
Kishan Patel M.E (I.T) En no - 130450723011 3
SECURITY IN VANET
 The nature of VANETs could lead to malicious attacks.
o Predictable movement of nodes.
 Adversaries could break the system.
o Data sinkholes (black hole).
o Gray hole
 Security measures must be taken to avoid malicious attacks on the system
Kishan Patel M.E (I.T) En no - 130450723011 4
ADVANTAGES AND DISADVANTAGES
Advantages
 Public Safety
 Traveller Information Support
 Air pollution emission measurement and reduction.
Disadvantages
 Wasted band width
 Increasing network congestion
Kishan Patel M.E (I.T) En no - 130450723011 5
SECURITY
 The protection afforded to an automated information system in order to attain
the applicable objectives of preserving the integrity, availability and
confidentiality of information system resources (includes hardware, software,
firmware, information/data, and telecommunications).”
6
CONFIDENTIALITY, INTEGRITY, AND
AVAILABILITY
 Confidentiality
Preserving the confidentiality of information means preventing unauthorized parties from
accessing the information or perhaps even being aware of the existence of the information.
I.e., secrecy.
 Integrity
Maintaining the integrity of information means that only authorized parties can manipulate
the information and do so only in authorized ways.
 Availability
Resources are available if they are accessible by authorized parties on all appropriate
occasions.
7
PACKET DROPPING ATTACK
 Packet dropping attacks are widespread DoS attacks on Ad hoc networks.
Fig 3. Packet dropper behavior [3]
 Packet dropper AODV or Packet dropping attack is the AODV under malicious attack.
 As shown in Figure 4 behavior of the attacker M that drops the packets sent by source A towards
destination C.
Kishan Patel M.E (I.T) En no - 130450723011 8
WHAT IS TRUST?
 Trust is a particular level of the subjective prob. with which an agent will perform a
particular action, before [we] can monitor such action and in a context in which it
affects [our] own action.
 Trust is context-dependent, dynamic & non-monotonic.
 Types of Trust
 Interpersonal (agent & context specific)
 Structural (system within which trust exists)
 Dispositional (independent of agent & context)
9
10
TWO TYPES OF MODELS
 Trust Management models
◦ Certificate-based
◦ Reputation-based (behavior observed directly or indirectly)
◦ Recommendations: trust information shared among peers
TRUST MANAGEMENT APPROACHES
 Individual Initiative
Each agent is responsible for his own fate.
 Global Trust
Each peer in the system has a unique global trust value that other peers can access.
 Federated Trust
Management of trust-related activities across multiple and heterogeneous security domains
and autonomous systems.
Deals with strategies for managing inter-domain behaviors
11
METAHEURISTIC APPROACH
 Heuristic [2] means to find or to discover by trial and error. And meta means higher level
and metaheuristics generally perform better than simple heuristics.
 There are two techniques:
1. Online metaheuristic approach
2.Offline metaheuristic approach.
 The main difference between them is the moment when they are applied for solving
problem.
 Metaheuristic Algorithms
1) Ant colony optimization (ACO)
2) Tabu search (TS)
3) Variable neighborhood search (VNS).
Kishan Patel M.E (I.T) En no - 130450723011 12
WHY METAHEURISTIC REQUIRED ?
 Metaheuristics [2] are used for solving the security and routing problems in ad hoc
networks.
 Security problem in the network may be due to selfish and malicious node.
Metaheuristic approach can be used for overcoming the problem.
 For route optimization e.g selecting the shortest and quality route from source to
destination.
Kishan Patel M.E (I.T) En no - 130450723011 13
ANT COLONY OPTIMIZATION
 The inspiring source of ACO [3] is the foraging behavior of real ants.
 This behavior enables ants to find shortest paths between food sources and their nest.
 While walking from food sources to the nest and vice versa, ants deposit a substance
called pheromone on the ground.
Fig 2. Ant Mechanism [3]
 Once an ant has built a solution, it can retrace the same path backward and update the
pheromone trails of the used component .
Kishan Patel M.E (I.T) En no - 130450723011 14
LITERATURE SURVEY
Kishan Patel M.E (I.T) En no - 130450723011 15
Title Mechanism / Algorithm Purpose Methodology
TARA: Trusted Ant Colony Multi
Agent Based Routing Algorithm
for Mobile Ad-Hoc Networks.[4]
TARA: Trusted Ant Colony Multi
Agent Based Routing Algorithm
To avoid trust value propagation.
To minimize the number of
messages been exchanged. To find
the best route for delivery.
Trust value of each node is
directly aped to the route and no
need to propagate the trust values
like other trusted protocols.
Trust Based QOS Protocol(TBQP)
using Metaheuristic Genetic
Algorithm for Optimizing and
Securing MANET. [5]
Trust Based QOS Protocol
(TBQP) Using Meta-heuristic
Genetic Algorithm.
To provide QOS by selecting the
fittest shortest route among the
number of routes to provide
optimization. Acquaintance
And Authentication of packets for
routing in network.
Intriguing a trust based packet
delivering scheme for detecting
and isolating the malignant nodes
using the routing layer
information. A trust weigh is
maintained and a node is
remunerated by decreasing or
increasing the trust weigh value. If
the trust weigh falls below a trust
threshold, node is marked as
malicious node.
Performance analysis of optimized
Trust AODV using ant
Algorithms. [6]
Ant colony optimization To sustain security against the dos
attacks.
At agents can move freely to find
destination it will update positive
pheromone to the routing table.
The pheromone is deposited if
node is trusted.
Kishan Patel M.E (I.T) En no - 130450723011 16
Table 1. Survey of various Metaheuristics
Title Mechanism / Algorithm Purpose Methodology
Ant Colony and Load Balancing
Optimizations for AODV Routing
Protocol. [7]
Multi-Route AODV Ant routing
(MRAA)
Load balancing( LBMRAA)
To reduce
the routing overhead, buffer
overflow, end-to-end delay and
increase the performance
Data packets are balanced
over discovered paths and energy
consumption is distributed across
many nodes through network.
Secure Ant-Based Routing
Protocol for Wireless Sensor
Network. [8]
Secure Ant-Based Routing
Protocol(SARP)
To provide Route security in
network.
It uses two paths for data
forwarding to overcome the
problem of node failure and to
increase the efficiency of overall
network.
MANET link Performance using
Ant Colony Optimization and
Particle Swarm Optimization
Algorithms. [9]
Ant colony optimization and
Particle swarm optimization.
Finds the best solution over the
particle’s position and velocity
with the cost and minimum. End-
to-end delay.
Ant Colony Optimization
(ACO) algorithm uses mobile
agents as ants to discover feasible
and best path in a network and
PSO finds the best solution over
the particle’s position and velocity
with the objective of cost and
minimum End-to-end delay.
AntTrust: A Novel Ant Routing
Protocol forWireless Ad-hoc
Network Based on Trust Between
Nodes. [10]
Ant Trust Routing Protocol To increase the security of route.
And malicious manipulations
of data packets.
AntTrust is located precisely in the
context of the security of routing.
It also facilitates malicious
manipulations of data packets.
Kishan Patel M.E (I.T) En no - 130450723011 17
[11] [12] [13] [14] ….
PROBLEMS IN NETWORK
 Due to the openness in network topology and absence of a centralized administration in
management, they are vulnerable to various attacks from malicious nodes.
 The networks work well only if the nodes are trusty and behave cooperatively.
 Some other problem are:
1) Difficult to evaluate trustworthiness of nodes
2) Security of data transmission
3) Fails to remove malicious nodes during route discovery process and therefore doesn´t succeed
to transfer all data packets.
 Main Objective of Proposed System :
1) To enhance the security
2) To address the packet dropping misbehavior
3) Distinguish malicious nodes
Kishan Patel M.E (I.T) En no - 130450723011 18
AUXILIARY EXAMPLE
Kishan Patel M.E (I.T) En no - 130450723011 19
ATTACKER MODEL
Kishan Patel M.E (I.T) En no - 130450723011 20
FD
CB
H
K
A
Source
node
Destination
Node
Malicious
node
RREQ
RREQ
RREQ
RREQ
RREQ
RREQ
RRE
P
RREP
RRE
P
RREQ
RREQ
RREP
RREP
C Malicious node
A Source node
K Destination node
Packet Dropping attack model
RRE
P
RRE
P
TACO-TRUST BASED ANT COLONY OPTIMIZATION
Kishan Patel M.E (I.T) En no - 130450723011 21
T.V= Trust value
P.V= Pheromone Value
N.T= Neighbor Table
[1] Wang, Yu, and Fan Li. "Vehicular ad hoc networks." Guide to wireless ad hoc networks. Springer
London, 2009. 503-525.
[2] Kishan Patel, Rutvij Jhaveri, “Addressing Packet Dropping Misbehavior using Metaheuristic
Approach: A Survey”, International Conference on Electrical, Electronics, Signals, Communication
and Optimization (IEEE EESCO-2015), Issue 3, pages 1036-1041, 24-25 January 2015.
[3] Kishan Patel, Rutvij Jhaveri, “Isolating Packet Dropping Misbehavior in VANET using Ant Colony
Optimization”, International Journal of Computer Applications (IJCA-2015), June 20 2015.
[4] Bahaa-Eldin, Ayman M. "TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm for
Mobile Ad-Hoc Networks." In Bio-inspiring Cyber Security and Cloud Services: Trends and
Innovations, pp. 151-184. Springer Berlin Heidelberg, 2014.
[5] Zafar, Sherin, and M. K. Soni. "Trust based QOS protocol (TBQP) using meta-heuristic genetic
algorithm for optimizing and securing MANET." InOptimization, Reliabilty, and Information
Technology (ICROIT), 2014 International Conference on, pp. 173-177. IEEE, 2014.
REFERENCES
Kishan Patel M.E (I.T) En no - 130450723011 22
[6] Simaremare, Harris, Abdelhafid Abouaissa, Riri Fitri Sari, and Pascal Lorenz. "Performance analysis
of optimized trust AODV using ant algorithm." InCommunications (ICC), 2014 IEEE International
Conference on, pp. 1843-1848. IEEE, 2014.
[7] Ahmed M. Abd Elmoniem, et al. "Ant Colony and Load Balancing Optimizations for AODV Routing
Protocol.
[8] Alrajeh, Nabil Ali, Mohamad Souheil Alabed, and Mohamed Shaaban Elwahiby. "Secure ant-based
routing protocol for wireless sensor network." International Journal of Distributed Sensor
Networks 2013 (2013).
[9] Nancharaiah, B., and B. Chandra Mohan. "MANET link performance using ant colony optimization
and particle swarm optimization algorithms." InCommunications and Signal Processing (ICCSP),
2013 International Conference on, pp. 767-770. IEEE, 2013.
[10] Melchor, Carlos Aguilar, Boussad Ait Salem, Philippe Gaborit, and Karim Tamine. "AntTrust: A
novel ant routing protocol for wireless ad-hoc network based on trust between nodes." In Availability,
Reliability and Security, 2008. ARES 08. Third International Conference on, pp. 1052-1059. IEEE,
2008.
Kishan Patel M.E (I.T) En no - 130450723011 23
[11] Satpute, Khushboo, Shikha Agrawal, Jitendra Agrawal, and Sanjeev Sharma. "A survey on anomaly
detection in network intrusion detection system using particle swarm optimization based machine
learning techniques." InProceedings of the International Conference on Frontiers of Intelligent
Computing: Theory and Applications (FICTA), pp. 441-452. Springer Berlin Heidelberg, 2013.
[12] Sreelaja, N. K., and G. A. Vijayalakshmi Pai. "Swarm intelligence based approach for sinkhole attack
detection in wireless sensor networks." Applied Soft Computing 19 (2014): 68-79.
[13] Sahoo, Rashmi Ranjan, Rameswar Panda, Dhiren Kumar Behera, and Mrinal Kanti Naskar. "A trust
based clustering with Ant Colony Routing in VANET." InComputing Communication & Networking
Technologies (ICCCNT), 2012 Third International Conference on, pp. 1-8. IEEE, 2012.
[14] Kaur, Harmandeep, and Ramanjit Singh. "A NOVELAPPROACH TO PREVENT BLACK HOLE
ATTACK IN WIRELESS SENSOR NETWORK."
[15] Zhou, Mingxing, and Jing Liu. "A memetic algorithm for enhancing the robustness of scale-free
networks against malicious attacks." Physical A: Statistical Mechanics and its Applications 410 (2014):
131-143.
[16] Lo, Chi-Chun, Chun-Chieh Huang, and Wen-Tian Liang. "Mitigating Routing Misbehavior Using Ant-
Tabu-Based Routing Algorithm for Wireless Ad-Hoc Networks." IJCSNS 10, no. 5 (2010): 46.
Kishan Patel M.E (I.T) En no - 130450723011 24
THANK YOU
Kishan Patel M.E (I.T) En no - 130450723011 25

More Related Content

What's hot

PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...ijsptm
 
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANETMLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANETijsptm
 
A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...IAEME Publication
 
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNSLSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNSIJNSA Journal
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
 
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...chennaijp
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPIOSR Journals
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...IRJET Journal
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETcscpconf
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
 
A SECURITY SCHEME BASED ON TRUST ATTACK IN MANET
A SECURITY SCHEME BASED ON TRUST ATTACK IN MANETA SECURITY SCHEME BASED ON TRUST ATTACK IN MANET
A SECURITY SCHEME BASED ON TRUST ATTACK IN MANETIAEME Publication
 
Iaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd Iaetsd
 
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsA Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsIDES Editor
 

What's hot (18)

Fc3110291035
Fc3110291035Fc3110291035
Fc3110291035
 
Protocol manet
Protocol manetProtocol manet
Protocol manet
 
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
 
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANETMLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
 
IJMNDI.2015.069218
IJMNDI.2015.069218IJMNDI.2015.069218
IJMNDI.2015.069218
 
A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...
 
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNSLSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
 
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
 
A SECURITY SCHEME BASED ON TRUST ATTACK IN MANET
A SECURITY SCHEME BASED ON TRUST ATTACK IN MANETA SECURITY SCHEME BASED ON TRUST ATTACK IN MANET
A SECURITY SCHEME BASED ON TRUST ATTACK IN MANET
 
Iaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detection
 
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsA Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
 

Viewers also liked

Real World Testbeds Emulation for Mobile Ad-hoc Networks
Real World Testbeds Emulation for Mobile Ad-hoc NetworksReal World Testbeds Emulation for Mobile Ad-hoc Networks
Real World Testbeds Emulation for Mobile Ad-hoc NetworksKishan Patel
 
Energy Efficient Routing Approaches in Ad-hoc Networks
                Energy Efficient Routing Approaches in Ad-hoc Networks                Energy Efficient Routing Approaches in Ad-hoc Networks
Energy Efficient Routing Approaches in Ad-hoc NetworksKishan Patel
 
Overview of Modem
Overview of Modem Overview of Modem
Overview of Modem Kishan Patel
 
Vehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemVehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemMonaco Motors
 
Vehicular ad hoc network - VANET
Vehicular ad hoc network - VANETVehicular ad hoc network - VANET
Vehicular ad hoc network - VANETSarah Baras
 
Vehicle to vehicle communication
Vehicle to vehicle communication  Vehicle to vehicle communication
Vehicle to vehicle communication Mohamed Zaki
 
inter vehicle communication
inter vehicle communicationinter vehicle communication
inter vehicle communicationNitish Tanwar
 

Viewers also liked (10)

Real World Testbeds Emulation for Mobile Ad-hoc Networks
Real World Testbeds Emulation for Mobile Ad-hoc NetworksReal World Testbeds Emulation for Mobile Ad-hoc Networks
Real World Testbeds Emulation for Mobile Ad-hoc Networks
 
Osi model
Osi modelOsi model
Osi model
 
Energy Efficient Routing Approaches in Ad-hoc Networks
                Energy Efficient Routing Approaches in Ad-hoc Networks                Energy Efficient Routing Approaches in Ad-hoc Networks
Energy Efficient Routing Approaches in Ad-hoc Networks
 
Overview of Modem
Overview of Modem Overview of Modem
Overview of Modem
 
Vehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemVehicle To Vehicle Communication System
Vehicle To Vehicle Communication System
 
Introduction to VANET
Introduction to VANETIntroduction to VANET
Introduction to VANET
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
Vehicular ad hoc network - VANET
Vehicular ad hoc network - VANETVehicular ad hoc network - VANET
Vehicular ad hoc network - VANET
 
Vehicle to vehicle communication
Vehicle to vehicle communication  Vehicle to vehicle communication
Vehicle to vehicle communication
 
inter vehicle communication
inter vehicle communicationinter vehicle communication
inter vehicle communication
 

Similar to Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

Trust Providence in Delay Tolerant Networks
Trust Providence in Delay Tolerant NetworksTrust Providence in Delay Tolerant Networks
Trust Providence in Delay Tolerant Networkstheijes
 
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANET
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANETA REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANET
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANETieijjournal
 
Different Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETDifferent Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETpijans
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
 
a probabilistic misbehavior detection scheme toward efficient trust establish...
a probabilistic misbehavior detection scheme toward efficient trust establish...a probabilistic misbehavior detection scheme toward efficient trust establish...
a probabilistic misbehavior detection scheme toward efficient trust establish...swathi78
 
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...ijcisjournal
 
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...IJTET Journal
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...IEEEMEMTECHSTUDENTPROJECTS
 
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTSECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTIJNSA Journal
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet pijans
 
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...IJCNCJournal
 
A comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manetA comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manetijwmn
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
 
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSRTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSIJNSA Journal
 

Similar to Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization (20)

Trust Providence in Delay Tolerant Networks
Trust Providence in Delay Tolerant NetworksTrust Providence in Delay Tolerant Networks
Trust Providence in Delay Tolerant Networks
 
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANET
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANETA REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANET
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANET
 
K1803036872
K1803036872K1803036872
K1803036872
 
Different Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETDifferent Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANET
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
 
a probabilistic misbehavior detection scheme toward efficient trust establish...
a probabilistic misbehavior detection scheme toward efficient trust establish...a probabilistic misbehavior detection scheme toward efficient trust establish...
a probabilistic misbehavior detection scheme toward efficient trust establish...
 
M026075079
M026075079M026075079
M026075079
 
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
 
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
 
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTSECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
 
An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet
 
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
 
A comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manetA comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manet
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
 
K1803046067
K1803046067K1803046067
K1803046067
 
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSRTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
 
1705 1708
1705 17081705 1708
1705 1708
 
1705 1708
1705 17081705 1708
1705 1708
 

Recently uploaded

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Optimization

  • 1. Avoiding Packet Dropping Misbehavior in VANET Using Trust Based Ant Colony Optimization Prepared By: Kishan N. Patel CSE and IT Department SVMIT, Bharuch
  • 2. OUTLINES  Introduction of VANET  Security in VANET  Security  Trust  Metaheuristic Approach  Why Metaheuristic ?  Ant Colony Optimization  Literature Survey  Problems  Trust Based ACO  Conclusion and Future work  References Kishan Patel M.E (I.T) En no - 130450723011 2
  • 3. INTRODUCTION OF VANET  Vehicular ad hoc network (VANET) [1] uses cars as mobile nodes in a MANET to create a mobile network.  Vehicular ad hoc networks are a subgroup of mobile ad hoc networks (MANETs). Fig 1. Vehicular Ad hoc network [1]  Cars fall out of the signal range and drop out of the network, other cars can join, by connecting vehicles to one another form a wireless network called “Vehicular Ad Hoc Network”. Kishan Patel M.E (I.T) En no - 130450723011 3
  • 4. SECURITY IN VANET  The nature of VANETs could lead to malicious attacks. o Predictable movement of nodes.  Adversaries could break the system. o Data sinkholes (black hole). o Gray hole  Security measures must be taken to avoid malicious attacks on the system Kishan Patel M.E (I.T) En no - 130450723011 4
  • 5. ADVANTAGES AND DISADVANTAGES Advantages  Public Safety  Traveller Information Support  Air pollution emission measurement and reduction. Disadvantages  Wasted band width  Increasing network congestion Kishan Patel M.E (I.T) En no - 130450723011 5
  • 6. SECURITY  The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications).” 6
  • 7. CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY  Confidentiality Preserving the confidentiality of information means preventing unauthorized parties from accessing the information or perhaps even being aware of the existence of the information. I.e., secrecy.  Integrity Maintaining the integrity of information means that only authorized parties can manipulate the information and do so only in authorized ways.  Availability Resources are available if they are accessible by authorized parties on all appropriate occasions. 7
  • 8. PACKET DROPPING ATTACK  Packet dropping attacks are widespread DoS attacks on Ad hoc networks. Fig 3. Packet dropper behavior [3]  Packet dropper AODV or Packet dropping attack is the AODV under malicious attack.  As shown in Figure 4 behavior of the attacker M that drops the packets sent by source A towards destination C. Kishan Patel M.E (I.T) En no - 130450723011 8
  • 9. WHAT IS TRUST?  Trust is a particular level of the subjective prob. with which an agent will perform a particular action, before [we] can monitor such action and in a context in which it affects [our] own action.  Trust is context-dependent, dynamic & non-monotonic.  Types of Trust  Interpersonal (agent & context specific)  Structural (system within which trust exists)  Dispositional (independent of agent & context) 9
  • 10. 10 TWO TYPES OF MODELS  Trust Management models ◦ Certificate-based ◦ Reputation-based (behavior observed directly or indirectly) ◦ Recommendations: trust information shared among peers
  • 11. TRUST MANAGEMENT APPROACHES  Individual Initiative Each agent is responsible for his own fate.  Global Trust Each peer in the system has a unique global trust value that other peers can access.  Federated Trust Management of trust-related activities across multiple and heterogeneous security domains and autonomous systems. Deals with strategies for managing inter-domain behaviors 11
  • 12. METAHEURISTIC APPROACH  Heuristic [2] means to find or to discover by trial and error. And meta means higher level and metaheuristics generally perform better than simple heuristics.  There are two techniques: 1. Online metaheuristic approach 2.Offline metaheuristic approach.  The main difference between them is the moment when they are applied for solving problem.  Metaheuristic Algorithms 1) Ant colony optimization (ACO) 2) Tabu search (TS) 3) Variable neighborhood search (VNS). Kishan Patel M.E (I.T) En no - 130450723011 12
  • 13. WHY METAHEURISTIC REQUIRED ?  Metaheuristics [2] are used for solving the security and routing problems in ad hoc networks.  Security problem in the network may be due to selfish and malicious node. Metaheuristic approach can be used for overcoming the problem.  For route optimization e.g selecting the shortest and quality route from source to destination. Kishan Patel M.E (I.T) En no - 130450723011 13
  • 14. ANT COLONY OPTIMIZATION  The inspiring source of ACO [3] is the foraging behavior of real ants.  This behavior enables ants to find shortest paths between food sources and their nest.  While walking from food sources to the nest and vice versa, ants deposit a substance called pheromone on the ground. Fig 2. Ant Mechanism [3]  Once an ant has built a solution, it can retrace the same path backward and update the pheromone trails of the used component . Kishan Patel M.E (I.T) En no - 130450723011 14
  • 15. LITERATURE SURVEY Kishan Patel M.E (I.T) En no - 130450723011 15
  • 16. Title Mechanism / Algorithm Purpose Methodology TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm for Mobile Ad-Hoc Networks.[4] TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm To avoid trust value propagation. To minimize the number of messages been exchanged. To find the best route for delivery. Trust value of each node is directly aped to the route and no need to propagate the trust values like other trusted protocols. Trust Based QOS Protocol(TBQP) using Metaheuristic Genetic Algorithm for Optimizing and Securing MANET. [5] Trust Based QOS Protocol (TBQP) Using Meta-heuristic Genetic Algorithm. To provide QOS by selecting the fittest shortest route among the number of routes to provide optimization. Acquaintance And Authentication of packets for routing in network. Intriguing a trust based packet delivering scheme for detecting and isolating the malignant nodes using the routing layer information. A trust weigh is maintained and a node is remunerated by decreasing or increasing the trust weigh value. If the trust weigh falls below a trust threshold, node is marked as malicious node. Performance analysis of optimized Trust AODV using ant Algorithms. [6] Ant colony optimization To sustain security against the dos attacks. At agents can move freely to find destination it will update positive pheromone to the routing table. The pheromone is deposited if node is trusted. Kishan Patel M.E (I.T) En no - 130450723011 16 Table 1. Survey of various Metaheuristics
  • 17. Title Mechanism / Algorithm Purpose Methodology Ant Colony and Load Balancing Optimizations for AODV Routing Protocol. [7] Multi-Route AODV Ant routing (MRAA) Load balancing( LBMRAA) To reduce the routing overhead, buffer overflow, end-to-end delay and increase the performance Data packets are balanced over discovered paths and energy consumption is distributed across many nodes through network. Secure Ant-Based Routing Protocol for Wireless Sensor Network. [8] Secure Ant-Based Routing Protocol(SARP) To provide Route security in network. It uses two paths for data forwarding to overcome the problem of node failure and to increase the efficiency of overall network. MANET link Performance using Ant Colony Optimization and Particle Swarm Optimization Algorithms. [9] Ant colony optimization and Particle swarm optimization. Finds the best solution over the particle’s position and velocity with the cost and minimum. End- to-end delay. Ant Colony Optimization (ACO) algorithm uses mobile agents as ants to discover feasible and best path in a network and PSO finds the best solution over the particle’s position and velocity with the objective of cost and minimum End-to-end delay. AntTrust: A Novel Ant Routing Protocol forWireless Ad-hoc Network Based on Trust Between Nodes. [10] Ant Trust Routing Protocol To increase the security of route. And malicious manipulations of data packets. AntTrust is located precisely in the context of the security of routing. It also facilitates malicious manipulations of data packets. Kishan Patel M.E (I.T) En no - 130450723011 17 [11] [12] [13] [14] ….
  • 18. PROBLEMS IN NETWORK  Due to the openness in network topology and absence of a centralized administration in management, they are vulnerable to various attacks from malicious nodes.  The networks work well only if the nodes are trusty and behave cooperatively.  Some other problem are: 1) Difficult to evaluate trustworthiness of nodes 2) Security of data transmission 3) Fails to remove malicious nodes during route discovery process and therefore doesn´t succeed to transfer all data packets.  Main Objective of Proposed System : 1) To enhance the security 2) To address the packet dropping misbehavior 3) Distinguish malicious nodes Kishan Patel M.E (I.T) En no - 130450723011 18
  • 19. AUXILIARY EXAMPLE Kishan Patel M.E (I.T) En no - 130450723011 19
  • 20. ATTACKER MODEL Kishan Patel M.E (I.T) En no - 130450723011 20 FD CB H K A Source node Destination Node Malicious node RREQ RREQ RREQ RREQ RREQ RREQ RRE P RREP RRE P RREQ RREQ RREP RREP C Malicious node A Source node K Destination node Packet Dropping attack model RRE P RRE P
  • 21. TACO-TRUST BASED ANT COLONY OPTIMIZATION Kishan Patel M.E (I.T) En no - 130450723011 21 T.V= Trust value P.V= Pheromone Value N.T= Neighbor Table
  • 22. [1] Wang, Yu, and Fan Li. "Vehicular ad hoc networks." Guide to wireless ad hoc networks. Springer London, 2009. 503-525. [2] Kishan Patel, Rutvij Jhaveri, “Addressing Packet Dropping Misbehavior using Metaheuristic Approach: A Survey”, International Conference on Electrical, Electronics, Signals, Communication and Optimization (IEEE EESCO-2015), Issue 3, pages 1036-1041, 24-25 January 2015. [3] Kishan Patel, Rutvij Jhaveri, “Isolating Packet Dropping Misbehavior in VANET using Ant Colony Optimization”, International Journal of Computer Applications (IJCA-2015), June 20 2015. [4] Bahaa-Eldin, Ayman M. "TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm for Mobile Ad-Hoc Networks." In Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 151-184. Springer Berlin Heidelberg, 2014. [5] Zafar, Sherin, and M. K. Soni. "Trust based QOS protocol (TBQP) using meta-heuristic genetic algorithm for optimizing and securing MANET." InOptimization, Reliabilty, and Information Technology (ICROIT), 2014 International Conference on, pp. 173-177. IEEE, 2014. REFERENCES Kishan Patel M.E (I.T) En no - 130450723011 22
  • 23. [6] Simaremare, Harris, Abdelhafid Abouaissa, Riri Fitri Sari, and Pascal Lorenz. "Performance analysis of optimized trust AODV using ant algorithm." InCommunications (ICC), 2014 IEEE International Conference on, pp. 1843-1848. IEEE, 2014. [7] Ahmed M. Abd Elmoniem, et al. "Ant Colony and Load Balancing Optimizations for AODV Routing Protocol. [8] Alrajeh, Nabil Ali, Mohamad Souheil Alabed, and Mohamed Shaaban Elwahiby. "Secure ant-based routing protocol for wireless sensor network." International Journal of Distributed Sensor Networks 2013 (2013). [9] Nancharaiah, B., and B. Chandra Mohan. "MANET link performance using ant colony optimization and particle swarm optimization algorithms." InCommunications and Signal Processing (ICCSP), 2013 International Conference on, pp. 767-770. IEEE, 2013. [10] Melchor, Carlos Aguilar, Boussad Ait Salem, Philippe Gaborit, and Karim Tamine. "AntTrust: A novel ant routing protocol for wireless ad-hoc network based on trust between nodes." In Availability, Reliability and Security, 2008. ARES 08. Third International Conference on, pp. 1052-1059. IEEE, 2008. Kishan Patel M.E (I.T) En no - 130450723011 23
  • 24. [11] Satpute, Khushboo, Shikha Agrawal, Jitendra Agrawal, and Sanjeev Sharma. "A survey on anomaly detection in network intrusion detection system using particle swarm optimization based machine learning techniques." InProceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA), pp. 441-452. Springer Berlin Heidelberg, 2013. [12] Sreelaja, N. K., and G. A. Vijayalakshmi Pai. "Swarm intelligence based approach for sinkhole attack detection in wireless sensor networks." Applied Soft Computing 19 (2014): 68-79. [13] Sahoo, Rashmi Ranjan, Rameswar Panda, Dhiren Kumar Behera, and Mrinal Kanti Naskar. "A trust based clustering with Ant Colony Routing in VANET." InComputing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on, pp. 1-8. IEEE, 2012. [14] Kaur, Harmandeep, and Ramanjit Singh. "A NOVELAPPROACH TO PREVENT BLACK HOLE ATTACK IN WIRELESS SENSOR NETWORK." [15] Zhou, Mingxing, and Jing Liu. "A memetic algorithm for enhancing the robustness of scale-free networks against malicious attacks." Physical A: Statistical Mechanics and its Applications 410 (2014): 131-143. [16] Lo, Chi-Chun, Chun-Chieh Huang, and Wen-Tian Liang. "Mitigating Routing Misbehavior Using Ant- Tabu-Based Routing Algorithm for Wireless Ad-Hoc Networks." IJCSNS 10, no. 5 (2010): 46. Kishan Patel M.E (I.T) En no - 130450723011 24
  • 25. THANK YOU Kishan Patel M.E (I.T) En no - 130450723011 25