Malicious Node Detection using Route Prediction Based on HMM
Manoj Kumar G1, M. Abdul Rahiman2
1Manoj Kumar G, Research Scholar, Department of CSE, Karpagam Academy of Higher Education, Coimbatore, Tamil Nadu, India.
2M Abdul Rahiman, Research Guide, Karpagam Academy of Higher Education, Coimbatore, Tamil Nadu, India.
Manuscript received on November 17., 2019. | Revised Manuscript received on November 24 2019. | Manuscript published on 30 November, 2019. | PP: 12792-12795 | Volume-8 Issue-4, November 2019. | Retrieval Number: D4385118419/2019©BEIESP | DOI: 10.35940/ijrte.D4385.118419
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Driving route prediction methods based on Hidden Markov Model accurately predicts a vehicle’s entire route throughout a trip. Trip history of driver alone cannot be used for predicting the route. Routine history of routes can be modelled and learned for predicting purposes. Driver behavior, another factor of route prediction can be considered as another factor of route prediction. Route recommendation mechanism helps to identify the probability of mobility of vehicles over time. This method can be extended to identify malicious nodes within network traffic. First we define a road network model, the driving routes in a hexagonal coordinate system, build HMM models to predict the movement using a method of training set based on K-means++ technique. The route predicted is taken as input and transmitted along with network data using encrypted headers. A method to identify malicious nodes in VANETs using HMM of prediction about routes helps to identify malicious message from a compromised node. One method of identifying suspicious message is the signal strength which is incompatible with its originator’s geographical position. We provide encrypted headers in protocols for detecting suspicious transmissions. Identified malicious node information is disseminated in the network. Evaluation of the detection rate and the efficiency of solution is analyzed using cryptographic methods based on cloud computing. This helps to identify the malicious nodes in the network traffic.
Keywords: Hidden Markov Model, Route prediction, malicious nodes.
Scope of the Article: Health Monitoring and Life Prediction of Structures.