Novel approach of detecting the black hole attack for vehicular ad-hoc networks based on capability indicators

被引:0
|
作者
El Houssaini, Souad [1 ]
El Houssaini, Mohammed-Alamine [2 ]
El Kafi, Jamal [1 ]
机构
[1] Chouaib Doukkali Univ, Fac Sci, El Jadida, Morocco
[2] Chouaib Doukkali Univ, ESEF, El Jadida, Morocco
关键词
Vehicular ad-hoc networks; Black hole attack; Detection; Capability indicator; ROUTING PROTOCOL; OLSR PROTOCOL; ALGORITHM; IMPLEMENTATION; SECURITY; MANET; QOS;
D O I
10.1108/IJPCC-02-2022-0062
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Purpose In vehicular ad hoc networks (VANETs), the information transmitted is broadcast in a free access environment. Therefore, VANETs are vulnerable against attacks that can directly perturb the performance of the networks and then provoke big fall of capability. Black hole attack is an example such attack, where the attacker node pretends that having the shortest path to the destination node and then drops the packets. This paper aims to present a new method to detect the black hole attack in real-time in a VANET network. Design/methodology/approach This method is based on capability indicators that are widely used in industrial production processes. If the different capability indicators are greater than 1.33 and the stability ratio (S-r) is greater than 75%, the network is stable and the vehicles are communicating in an environment without the black hole attack. When the malicious nodes representing the black hole attacks are activated one by one, the fall of capability becomes more visible and the network is unstable, out of control and unmanaged, due to the presence of the attacks. The simulations were conducted using NS-3 for the network simulation and simulation of urban mobility for generating the mobility model. Findings The proposed mechanism does not impose significant overheads or extensive modifications in the standard Institute of Electrical and Electronics Engineers 802.11p or in the routing protocols. In addition, it can be implemented at any receiving node which allows identifying malicious nodes in real-time. The simulation results demonstrated the effectiveness of proposed scheme to detect the impact of the attack very early, especially with the use of the short-term capability indicators (Cp, Cpk and Cpm) of each performance metrics (throughput and packet loss ratio), which are more efficient at detecting quickly and very early the small deviations over a very short time. This study also calculated another indicator of network stability which is S-r, which allows to make a final decision if the network is under control and that the vehicles are communicating in an environment without the black hole attack. Originality/value According to the best of the authors' knowledge, the method, using capability indicators for detecting the black hole attack in VANETs, has not been presented previously in the literature.
引用
收藏
页码:734 / 755
页数:22
相关论文
共 50 条
  • [21] On Characterization of the Traffic Hole Problem in Vehicular Ad-hoc Networks
    Song, Chao
    Wu, Jie
    Liu, Ming
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 4792 - 4797
  • [22] Novel gray hole attack detection scheme for mobile ad-hoc networks
    Chen, Wei
    Long, Xiang
    Gao, Xiaopeng
    Bai, Yuebin
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2007, 44 (08): : 1371 - 1377
  • [23] A Novel Gray Hole attack detection scheme for Mobile Ad-Hoc Networks
    Gao Xiaopeng
    Chen Wei
    2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 209 - 214
  • [24] Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks
    Banerjee, Sukla
    WCECS 2008: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, 2008, : 337 - 342
  • [25] Mitigating effects of Black hole Attack in Mobile Ad-hoc Networks: Military Perspective
    Singh, Bikramjeet
    Srikanth, Dasari
    Kumar, C. R. Suthikshn
    PROCEEDINGS OF 2ND IEEE INTERNATIONAL CONFERENCE ON ENGINEERING & TECHNOLOGY ICETECH-2016, 2016, : 810 - 814
  • [26] RETRACTION: A clustering approach for attack detection and data transmission in vehicular ad-hoc networks
    Barve, A.
    Patheja, P. S.
    NETWORK-COMPUTATION IN NEURAL SYSTEMS, 2024,
  • [27] Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm
    Kumar, Ankit
    Varadarajan, Vijayakumar
    Kumar, Abhishek
    Dadheech, Pankaj
    Choudhary, Surendra Singh
    Kumar, V. D. Ambeth
    Panigrahi, B. K.
    Veluvolu, Kalyana C.
    MICROPROCESSORS AND MICROSYSTEMS, 2021, 80
  • [28] Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks
    Kanellopoulos, Dimitris
    Cuomo, Francesca
    ELECTRONICS, 2021, 10 (04)
  • [29] Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks
    Schweitzer, Nadav
    Stulman, Ariel
    Margalit, Roy David
    Shabtai, Asaf
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (08) : 2174 - 2183
  • [30] Security Measures in the Vehicular Ad-Hoc Networks in the Aspect of DoS Attack
    Stepien, Krzysztof
    Poniszewska-Maranda, Aneta
    COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, 2021, 1194 : 222 - 232