6533b821fe1ef96bd127baa1

RESEARCH PRODUCT

A secure intersection-based routing protocol for data collection in urban vehicular networks

Tarek BoualiEl-hassane AglzimSidi-mohammed Senouci

subject

Routing protocolDynamic Source RoutingWireless ad hoc networkComputer scienceEqual-cost multi-path routingDistributed computingEnhanced Interior Gateway Routing ProtocolWireless Routing ProtocolGeographic routinglaw.inventionRouting Information Protocol[SPI]Engineering Sciences [physics]RelaylawDestination-Sequenced Distance Vector routingComputingMilieux_MISCELLANEOUSHierarchical routingStatic routingZone Routing ProtocolVehicular ad hoc networkAdaptive quality of service multi-hop routingbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPolicy-based routingAd hoc wireless distribution serviceDistance-vector routing protocolOptimized Link State Routing ProtocolLink-state routing protocolInterior gateway protocolMultipath routingbusinessComputer network

description

Data routing has gained great intention since the appearance of Vehicular Networks (VANETs). However, in the presence of attackers, reliable and trustworthy operations in such networks become impossible without securing routing protocols. In this paper, we target to study and design a secure routing protocol S-GyTAR for vehicular environments. Several kinds of routing techniques are proposed in the literature and could be classified into topology-based or position-based strategies. Position-based is the most investigated strategy in vehicular networks due to the unique characteristics of such networks. For this reason, this work is based on the well-known intersection-based routing protocol GyTAR, which exploits the greedy forwarding technique to relay data. In fact, we benefit from GyTAR's characteristics and reshape it to introduce a new distributed trust management strategy to secure routing. We design a cluster-based mechanism to monitor nodes and a reputation-based schema to evaluate the vehicles and classify them. We evaluate our proposal using NS3 simulator. Simulation results show high performances regarding the detection rate of malicious nodes and overhead with an amelioration of the end-to-end communication delay in the presence of malicious vehicles.

https://doi.org/10.1109/glocom.2014.7036788