Novel approach of detecting the black hole attack for vehicular ad-hoc networks based on capability indicators

被引:0
作者
El Houssaini, Souad [1 ]
El Houssaini, Mohammed-Alamine [2 ]
El Kafi, Jamal [1 ]
机构
[1] Chouaib Doukkali Univ, Fac Sci, El Jadida, Morocco
[2] Chouaib Doukkali Univ, ESEF, El Jadida, Morocco
关键词
Vehicular ad-hoc networks; Black hole attack; Detection; Capability indicator; ROUTING PROTOCOL; OLSR PROTOCOL; ALGORITHM; IMPLEMENTATION; SECURITY; MANET; QOS;
D O I
10.1108/IJPCC-02-2022-0062
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Purpose In vehicular ad hoc networks (VANETs), the information transmitted is broadcast in a free access environment. Therefore, VANETs are vulnerable against attacks that can directly perturb the performance of the networks and then provoke big fall of capability. Black hole attack is an example such attack, where the attacker node pretends that having the shortest path to the destination node and then drops the packets. This paper aims to present a new method to detect the black hole attack in real-time in a VANET network. Design/methodology/approach This method is based on capability indicators that are widely used in industrial production processes. If the different capability indicators are greater than 1.33 and the stability ratio (S-r) is greater than 75%, the network is stable and the vehicles are communicating in an environment without the black hole attack. When the malicious nodes representing the black hole attacks are activated one by one, the fall of capability becomes more visible and the network is unstable, out of control and unmanaged, due to the presence of the attacks. The simulations were conducted using NS-3 for the network simulation and simulation of urban mobility for generating the mobility model. Findings The proposed mechanism does not impose significant overheads or extensive modifications in the standard Institute of Electrical and Electronics Engineers 802.11p or in the routing protocols. In addition, it can be implemented at any receiving node which allows identifying malicious nodes in real-time. The simulation results demonstrated the effectiveness of proposed scheme to detect the impact of the attack very early, especially with the use of the short-term capability indicators (Cp, Cpk and Cpm) of each performance metrics (throughput and packet loss ratio), which are more efficient at detecting quickly and very early the small deviations over a very short time. This study also calculated another indicator of network stability which is S-r, which allows to make a final decision if the network is under control and that the vehicles are communicating in an environment without the black hole attack. Originality/value According to the best of the authors' knowledge, the method, using capability indicators for detecting the black hole attack in VANETs, has not been presented previously in the literature.
引用
收藏
页码:734 / 755
页数:22
相关论文
共 50 条
[31]   Detection and Isolation of Black Hole attack in Mobile Ad Hoc Networks - A Review [J].
Nagasubramanian, Gayathri ;
Sakthivel, Rakesh Kumar ;
Patan, Rizwan ;
Ehtemami, Anahid ;
Meyer-Baese, Anke ;
Tahmassebi, Amirhessam ;
Gandomi, Amir H. .
DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES IV, 2020, 11419
[32]   A Novel Approach for Detecting and Eliminating Cooperative Black Hole Attack using Advanced DRI Table in Ad hoc Network [J].
Mishra, Ankur ;
Jaiswal, Ranjeet ;
Sharma, Sanjay .
PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, :499-504
[33]   Area-based Backbone for Vehicular Ad-Hoc Networks [J].
Haghani, Shadan ;
Bikdash, Marwan ;
Park, Hyoshin .
SOUTHEASTCON 2021, 2021, :38-44
[34]   Efficient vehicular ad-hoc networks routing based on junctions [J].
Chuang, Po-Jen ;
Huang, Tzu-Lun .
IET COMMUNICATIONS, 2015, 9 (04) :487-493
[35]   Privacy Issues of Vehicular Ad-Hoc Networks [J].
Dok, Hang ;
Fu, Huirong ;
Echevarria, Ruben ;
Weerasinghe, Hesiri .
INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2010, 3 (01) :17-32
[36]   Revocation Management in Vehicular Ad-hoc Networks [J].
Martin-Fernandez, Francisco ;
Caballero-Gil, Pino ;
Caballero-Gil, Candido .
2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, :1210-1217
[37]   Cybersecurity of Inference in Vehicular Ad-hoc Networks [J].
Wang, Zisheng ;
Blum, Rick S. .
2020 54TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2020, :138-143
[38]   Mobile Advertisement in Vehicular Ad-Hoc Networks [J].
Dobre, Ciprian ;
Tudor, George Cristian .
EUROMEDIA'2011, 2011, :43-49
[39]   A black hole attack model using topology approximation for reactive ad-hoc routing protocols [J].
Badenhop, Christopher W. ;
Mullins, Barry E. .
International Journal of Security and Networks, 2014, 9 (02) :63-77
[40]   A Novel Security Approach for Detecting Black Hole Attack in MANET [J].
Jaisankar, N. ;
Saravanan, R. ;
Swamy, K. Durai .
INFORMATION PROCESSING AND MANAGEMENT, 2010, 70 :217-+