Novel approach of detecting the black hole attack for vehicular ad-hoc networks based on capability indicators

被引:0
|
作者
El Houssaini, Souad [1 ]
El Houssaini, Mohammed-Alamine [2 ]
El Kafi, Jamal [1 ]
机构
[1] Chouaib Doukkali Univ, Fac Sci, El Jadida, Morocco
[2] Chouaib Doukkali Univ, ESEF, El Jadida, Morocco
关键词
Vehicular ad-hoc networks; Black hole attack; Detection; Capability indicator; ROUTING PROTOCOL; OLSR PROTOCOL; ALGORITHM; IMPLEMENTATION; SECURITY; MANET; QOS;
D O I
10.1108/IJPCC-02-2022-0062
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Purpose In vehicular ad hoc networks (VANETs), the information transmitted is broadcast in a free access environment. Therefore, VANETs are vulnerable against attacks that can directly perturb the performance of the networks and then provoke big fall of capability. Black hole attack is an example such attack, where the attacker node pretends that having the shortest path to the destination node and then drops the packets. This paper aims to present a new method to detect the black hole attack in real-time in a VANET network. Design/methodology/approach This method is based on capability indicators that are widely used in industrial production processes. If the different capability indicators are greater than 1.33 and the stability ratio (S-r) is greater than 75%, the network is stable and the vehicles are communicating in an environment without the black hole attack. When the malicious nodes representing the black hole attacks are activated one by one, the fall of capability becomes more visible and the network is unstable, out of control and unmanaged, due to the presence of the attacks. The simulations were conducted using NS-3 for the network simulation and simulation of urban mobility for generating the mobility model. Findings The proposed mechanism does not impose significant overheads or extensive modifications in the standard Institute of Electrical and Electronics Engineers 802.11p or in the routing protocols. In addition, it can be implemented at any receiving node which allows identifying malicious nodes in real-time. The simulation results demonstrated the effectiveness of proposed scheme to detect the impact of the attack very early, especially with the use of the short-term capability indicators (Cp, Cpk and Cpm) of each performance metrics (throughput and packet loss ratio), which are more efficient at detecting quickly and very early the small deviations over a very short time. This study also calculated another indicator of network stability which is S-r, which allows to make a final decision if the network is under control and that the vehicles are communicating in an environment without the black hole attack. Originality/value According to the best of the authors' knowledge, the method, using capability indicators for detecting the black hole attack in VANETs, has not been presented previously in the literature.
引用
收藏
页码:734 / 755
页数:22
相关论文
共 50 条
  • [1] Variable control chart for detecting black hole attack in vehicular ad-hoc networks
    Cherkaoui, Badreddine
    Beni-hssane, Abderrahim
    Erritali, Mohammed
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (11) : 5129 - 5138
  • [2] Quality Control Chart for Detecting the Black Hole Attack in Vehicular Ad-hoc Networks
    Cherkaoui, Badreddine
    Beni-Hssane, Abderrahim
    Erritali, Mohammed
    8TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN 2017) / 7TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2017) / AFFILIATED WORKSHOPS, 2017, 113 : 170 - 177
  • [3] Variable control chart for detecting black hole attack in vehicular ad-hoc networks
    Badreddine Cherkaoui
    Abderrahim Beni-hssane
    Mohammed Erritali
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 5129 - 5138
  • [4] Effect of the black-hole attack in Vehicular Ad-Hoc Networks
    Mastouri, Mohamed Anis
    Hasnaoui, Salem
    2021 26TH IEEE ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS {APCC), 2021, : 205 - 210
  • [5] A Clustering Algorithm for Detecting and Handling Black Hole Attack in Vehicular Ad Hoc Networks
    Cherkaoui, Badreddine
    Beni-hssane, Abderrahim
    Erritali, Mohammed
    EUROPE AND MENA COOPERATION ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGIES, 2017, 520 : 481 - 490
  • [6] Detection and Prevention of Black Hole Attack and Sybil Attack in Vehicular Ad Hoc Networks
    Yadav, Dhananjay
    Chaubey, Nirbhay Kumar
    COMPUTING SCIENCE, COMMUNICATION AND SECURITY, COMS2 2024, 2025, 2174 : 176 - 189
  • [7] An innovative approach based on clustering and digital signature to prevent black hole attack from vehicular ad-hoc network
    Ali, Shahjahan
    Nand, Parma
    Tiwari, Shailesh
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2025, 31 (02)
  • [8] Trajectory tracking attack for vehicular ad-hoc networks
    Li, Changrong
    Li, Zhenfu
    SECURITY AND PRIVACY, 2024, 7 (06):
  • [9] Detecting Black Hole Attack in Wireless Ad Hoc Networks Based On Learning Automata
    Soleimani, Mohammad Taqi
    Ghasemi, Abdorasoul
    2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 514 - 519
  • [10] Security Analysis of Vehicular Ad-hoc Networks based on Attack Tree
    Houmer, Meriem
    Hasnaoui, Moulay Lahcen
    Elfergougui, Abdeslam
    2018 INTERNATIONAL CONFERENCE ON SELECTED TOPICS IN MOBILE AND WIRELESS NETWORKING (MOWNET), 2018, : 21 - 26