Entity-Centric Combined Trust (ECT) Algorithm to Detect Packet Dropping Attack in Vehicular Ad Hoc Networks (VANETs)

  • Kuldeep Narayan TripathiEmail author
  • Gourav Jain
  • Ashish Mohan Yadav
  • S. C. Sharma
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1162)


Road safety and security are the most challenging topics in recent times. Vehicular ad hoc network, an active part of the intelligent transportation system, provides the advanced technology to tackle the various security and safety issues of vehicles. Vehicle is an integral part of the VANET that often gets compromised with numerous types of attackers and starts to perform malicious activities. To provide secure and smooth communication among the vehicles, we are required to detect those infected nodes and remove them from the network. In this paper, we proposed a trust-based security algorithm based on cooperation among the vehicles. The proposed algorithm detects the malicious activities, mainly centered on packet dropping, with the help of the trust-based security measurements. Our proposed model primarily based on the two things one is cooperation among the vehicles, and the other is monitoring network traffic of moving vehicles. Simulation analysis and results demonstrate the incredible growth in the performance of the AODV routing under the proposed algorithm. We present the simulation of the proposed algorithm in network simulator NS-2, and result evaluation by using network parameters like successful data delivery fraction and end-to-end delay. Simulation and result analysis show that our algorithm works better to detect malicious entities (vehicles) in the network and enhances the performance of the network of moving vehicles.


Data dissemination Trust-based security Vehicle cooperation Trust value Malicious nodes Packet drop attack VANETs 


  1. 1.
    Qu, F., Wu, Z., Wang, F.Y., Cho, W.: A security and privacy review of VANETs. IEEE Trans. Intell. Transp. Syst. 16(6), 2985–2996 (2015)CrossRefGoogle Scholar
  2. 2.
    Lim, K., Manivannan, D.: An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks. Veh. Commun. 4, 30–37 (2016)Google Scholar
  3. 3.
    Arya, K.V., Tripathi, K.N.: Power aware and secure routing in mobile and ad-hoc networks. In: 2013 IEEE 8th International Conference on Industrial and Information Systems, pp. 477–482. IEEE (2013)Google Scholar
  4. 4.
    Malathi, A., Sreenath, N.: Black hole attack prevention and detection in VANET using modified DSR protocol. Int. J. Comput. Appl. 168(7) (2017)Google Scholar
  5. 5.
    Tobin, J., Thorpe, C., Murphy, L.: An approach to mitigate black hole attacks on vehicular wireless networks. In: 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), pp. 1–7. IEEE (2017)Google Scholar
  6. 6.
    Rupareliya, J., Vithlani, S., Gohel, C.: Securing VANET by preventing attacker node using watchdog and Bayesian network theory. Procedia Comput. Sci. 79, 649–656 (2016)CrossRefGoogle Scholar
  7. 7.
    Abumansoor, O., Boukerche, A.: A secure cooperative approach for nonline-of-sight location verification in VANET. IEEE Trans. Veh. Technol. 61(1), 275–285 (2011)CrossRefGoogle Scholar
  8. 8.
    Malhi, A.K., Batra, S.: Genetic-based framework for prevention of masquerade and DDoS attacks in vehicular ad-hoc networks. Secur. Commun. Netw. 9(15), 2612–2626 (2016)CrossRefGoogle Scholar
  9. 9.
    Shabut, A.M., Dahal, K.P., Bista, S.K., Awan, I.U.: Recommendation based trust model with an effective defence scheme for MANETs. IEEE Trans. Mob. Comput. 14(10), 2101–2115 (2014)CrossRefGoogle Scholar
  10. 10.
    Mokhtar, B., Azab, M.: Survey on security issues in vehicular ad hoc networks. Alexandria Eng. J. 54(4), 1115–1126 (2015)CrossRefGoogle Scholar
  11. 11.
    Chen, J.M., Li, T.T., Panneerselvam, J.: TMEC: a trust management based on evidence combination on attack-resistant and collaborative internet of vehicles. IEEE Access (2018)Google Scholar
  12. 12.
    Djahel, S., Naït-Abdesselam, F., Zhang, Z., Khokhar, A.: Defending against packet dropping attack in vehicular ad hoc networks. Secur. Commun. Netw. 1(3), 245–258 (2008)CrossRefGoogle Scholar
  13. 13.
    Tripathi, K.N., Sharma, S.C.: A trust based model (TBM) to detect rogue nodes in vehicular ad-hoc networks (VANETS). Int. J. Syst. Assur. Eng. Manag. 1–15 (2019)Google Scholar
  14. 14.
    Zhang, S.S., Wang, S.W., Xia, H., Cheng, X.G.: An attack-resistant reputation management system for mobile ad hoc networks. Procedia Comput. Sci. 147, 473–479 (2019)CrossRefGoogle Scholar
  15. 15.
    Yang, S., Liu, Z., Li, J., Wang, S., Yang, F.: Anomaly detection for internet of vehicles: a trust management scheme with affinity propagation. Mob. Inf. Syst. (2016)Google Scholar
  16. 16.
    Fotohi, R., Ebazadeh, Y., Geshlag, M.S.: A new approach for improvement security against DoS attacks in vehicular ad-hoc network. Int. J. Adv. Comput. Sci. Appl. 7(7), 10–16 (2016)Google Scholar
  17. 17.
    Dhurandher, S.K., Obaidat, M.S., Jaiswal, A., Tiwari, A., Tyagi, A.: Vehicular security through reputation and plausibility checks. IEEE Syst. J. 8(2), 384–394 (2013)CrossRefGoogle Scholar
  18. 18.
    Pandey, K., Raina, S.K., Rao, R.S.: Performance analysis of routing protocols for vehicular adhoc networks using NS2/SUMO. In: 2015 IEEE international advance computing conference (IACC), pp. 844–848. IEEE (2015)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2021

Authors and Affiliations

  • Kuldeep Narayan Tripathi
    • 1
    Email author
  • Gourav Jain
    • 1
  • Ashish Mohan Yadav
    • 1
  • S. C. Sharma
    • 1
  1. 1.Electronics and Computer Discipline, DPTIndian Institute of Technology RoorkeeRoorkeeIndia

Personalised recommendations