Novel approach of detecting the black hole attack for vehicular ad-hoc networks based on capability indicators

被引:0
|
作者
El Houssaini, Souad [1 ]
El Houssaini, Mohammed-Alamine [2 ]
El Kafi, Jamal [1 ]
机构
[1] Chouaib Doukkali Univ, Fac Sci, El Jadida, Morocco
[2] Chouaib Doukkali Univ, ESEF, El Jadida, Morocco
关键词
Vehicular ad-hoc networks; Black hole attack; Detection; Capability indicator; ROUTING PROTOCOL; OLSR PROTOCOL; ALGORITHM; IMPLEMENTATION; SECURITY; MANET; QOS;
D O I
10.1108/IJPCC-02-2022-0062
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Purpose In vehicular ad hoc networks (VANETs), the information transmitted is broadcast in a free access environment. Therefore, VANETs are vulnerable against attacks that can directly perturb the performance of the networks and then provoke big fall of capability. Black hole attack is an example such attack, where the attacker node pretends that having the shortest path to the destination node and then drops the packets. This paper aims to present a new method to detect the black hole attack in real-time in a VANET network. Design/methodology/approach This method is based on capability indicators that are widely used in industrial production processes. If the different capability indicators are greater than 1.33 and the stability ratio (S-r) is greater than 75%, the network is stable and the vehicles are communicating in an environment without the black hole attack. When the malicious nodes representing the black hole attacks are activated one by one, the fall of capability becomes more visible and the network is unstable, out of control and unmanaged, due to the presence of the attacks. The simulations were conducted using NS-3 for the network simulation and simulation of urban mobility for generating the mobility model. Findings The proposed mechanism does not impose significant overheads or extensive modifications in the standard Institute of Electrical and Electronics Engineers 802.11p or in the routing protocols. In addition, it can be implemented at any receiving node which allows identifying malicious nodes in real-time. The simulation results demonstrated the effectiveness of proposed scheme to detect the impact of the attack very early, especially with the use of the short-term capability indicators (Cp, Cpk and Cpm) of each performance metrics (throughput and packet loss ratio), which are more efficient at detecting quickly and very early the small deviations over a very short time. This study also calculated another indicator of network stability which is S-r, which allows to make a final decision if the network is under control and that the vehicles are communicating in an environment without the black hole attack. Originality/value According to the best of the authors' knowledge, the method, using capability indicators for detecting the black hole attack in VANETs, has not been presented previously in the literature.
引用
收藏
页码:734 / 755
页数:22
相关论文
共 50 条
  • [31] Collaborative Learning Based Sybil Attack Detection in Vehicular AD-HOC Networks (VANETS)
    Azam, Sofia
    Bibi, Maryum
    Riaz, Rabia
    Rizvi, Sanam Shahla
    Kwon, Se Jin
    SENSORS, 2022, 22 (18)
  • [32] Localization in Vehicular Ad-Hoc Networks
    Benslimane, A
    2005 SYSTEMS COMMUNICATIONS, PROCEEDINGS: ICW 2005, WIRELESS TECHNOLOGIES; ICHSN 2005, HIGH SPEED NETWORKS; ICMCS 2005, MULTIMEDIA COMMUNICATIONS SYSTEMS; SENET 2005, SENSOR NETWORKS, 2005, : 19 - 25
  • [33] Profile based routing in vehicular ad-hoc networks
    BOHLOOLI Ali
    JAMSHIDI Kamal
    Science China(Information Sciences), 2014, 57 (06) : 154 - 164
  • [34] Profile based routing in vehicular ad-hoc networks
    Bohlooli, Ali
    Jamshidi, Kamal
    SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (06) : 1 - 11
  • [35] SECURING VEHICULAR AD-HOC NETWORKS
    Caballero-Gil, P.
    Hernandez-Goya, C.
    Fuster-Sabater, A.
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2009, 1 (01): : 25 - 35
  • [36] A false data detecting scheme based on coalition game for vehicular ad-hoc networks
    Liu, Jizhao
    Wang, Quan
    Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2015, 49 (02): : 69 - 73
  • [37] HLA based Vehicular Ad-Hoc Networks simulation
    Yuan Jialu
    Jiang Hailin
    Wang Huashen
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1458 - 1461
  • [38] Profile based routing in vehicular ad-hoc networks
    Ali Bohlooli
    Kamal Jamshidi
    Science China Information Sciences, 2014, 57 : 1 - 11
  • [39] Design and analysis of an improved AODV protocol for black hole and flooding attack in vehicular ad-hoc network (VANET)
    Kumar, Ankit
    Sinha, Madhavi
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 453 - 463
  • [40] A Novel Vertical Handoff Scheme for Vehicular Ad-hoc Networks
    Midya, Sadip
    Majumder, Koushik
    Roy, Asmita
    De, Debashis
    2016 3RD INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN INFORMATION TECHNOLOGY (RAIT), 2016, : 117 - 122