Skip to main content

Secure Opportunistic Routing for Vehicular Ad Hoc Networks

  • Conference paper
  • First Online:
Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 1 ( ICTIS 2017)

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 83))

  • 1678 Accesses

Abstract

Vehicular Ad-hoc Networks (VANETs) is a growing interest and research area over recent years for it offers enhanced safety and non-safety applications for transportation. Vehicular Ad-Hoc Networks (VANETs) is a developing technology that is yet unclear to many security issues. Security and routing concerns that are unique to VANET present great challenges. In this paper, we have proposed a scheme basically solve the black hole and gray hole attack in vehicular ad hoc networks. Black-hole and gray hole are the well-known routing attacks through which malicious nodes try to downgrade the communication performance of VANETs. In this paper, we focus on recent proposals that aim to enhance VANETs security and routing in systematic and architectural approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Biswas, S., Morris, R.: ExOR: opportunistic multi-hop routing for wireless networks. In: Proceedings of SIGCOMM, Philadelphia, Pennsylvania, USA, pp. 133–144. ACM (2005)

    Google Scholar 

  2. Tahooni, M., Darehshoorzadeh, A., Boukerche, A.: Mobility-based opportunistic routing for mobile ad-hoc networks. In: Proceedings of the 11th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, pp. 9–16 (2014)

    Google Scholar 

  3. Cai, X., He, Y., Zhao, C., Zhu, L., Li, C.: LSGO: link state aware geographic opportunistic routing protocol for VANETs. EURASIP J. Wirel. Commun. Netw. 2014, 1–10 (2014)

    Article  Google Scholar 

  4. Yuan, P., Fan, L., Liu, P., Tang, S.: Recent progress in routing protocols of mobile opportunistic networks: a clear taxonomy, analysis and evaluation. J. Netw. Comput. Appl. 62, 163–170 (2016)

    Article  Google Scholar 

  5. Salehi, M., Darehshoorzadeh, A., Boukerche, A.: On the effect of black-hole attack on opportunistic routing protocols. In: PE-WASUN-2015, pp. 93–100 (2015)

    Google Scholar 

  6. Boukerche, A., Darehshoorzadeh, A.: Opportunistic routing in wireless networks: models, algorithms, and classifications. ACM Comput. Surv. 47(2), 1–26 (2015)

    Article  Google Scholar 

  7. Castineira, F.G.: Opportunistic routing and delay tolerant networking in vehicular communication systems. In: Vehicular Communications and Networks, pp. 114–126. Elsevier (2015)

    Google Scholar 

  8. Lee, K.C., Gerla, M.: Opportunistic vehicular routing (invited paper). In: IEEE European Wireless Conference 2010, pp. 873–880 (2010)

    Google Scholar 

  9. Lee, K.C., Lee, U., Gerla, M.: Geo-opportunistic routing for vehicular networks. IEEE Commun. Mag. 48, 164–170 (2010)

    Article  Google Scholar 

  10. Salehi, M., Boukerche, A., Darehshoorzadeh, A.: Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks. Ad Hoc Netw. 50, 88–101 (2016)

    Article  Google Scholar 

  11. Yan, G., Wen, D., Olariu, S., Weigle, M.C.: Security challenges in vehicular cloud computing. IEEE Trans. Intell. Transp. Syst. 14(1), 284–294 (2013)

    Article  Google Scholar 

  12. Mihaita, A., Dobrex, C., Mocanu, B., Popx, F., Cristea, V.: Analysis of security approaches for vehicular ad-hoc networks. In: 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp. 304–309 (2015)

    Google Scholar 

  13. Cha, H.J., Yang, H.K., Kim, Y.H.: A node management scheme for stable P2P service in mobile ad-hoc networks. Peer-to-Peer Netw. Appl. 9, 558–565 (2016)

    Article  Google Scholar 

  14. Zhang, D., Yu, F.R., Wei, Z., Boukerche, A.: Trust-based secure routing in software-defined vehicular ad hoc networks. ACM (2016)

    Google Scholar 

  15. Das, D., Misra, R., Raj, A.: Approximating geographic routing using coverage tree heuristics for wireless network. Wirel. Netw. (WINE) 21(4), 1109–1118 (2015). Springer, US

    Article  Google Scholar 

  16. Das, D., Misra, R.: Caching algorithm for fast hand off using AP graph with multiple vehicles for VANET. Int. J. Commun. Netw. Distrib. Syst. (IJCNDS) 14(3), 219–236 (2015). Inderscience Publishers Switzerland

    Article  Google Scholar 

Download references

Acknowledgement

This work is partially supported by Early Career Research Award from Science & Engineering Research Board (SERB), Department of Science & Technology (DST), Govt. of India, New Delhi, India (Project Number: ECR/2015/000256).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Debasis Das .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Das, D., Vasudev, H. (2018). Secure Opportunistic Routing for Vehicular Ad Hoc Networks. In: Satapathy, S., Joshi, A. (eds) Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 1. ICTIS 2017. Smart Innovation, Systems and Technologies, vol 83. Springer, Cham. https://doi.org/10.1007/978-3-319-63673-3_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-63673-3_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-63672-6

  • Online ISBN: 978-3-319-63673-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics