Novel approach of detecting the black hole attack for vehicular ad-hoc networks based on capability indicators

被引:0
作者
El Houssaini, Souad [1 ]
El Houssaini, Mohammed-Alamine [2 ]
El Kafi, Jamal [1 ]
机构
[1] Chouaib Doukkali Univ, Fac Sci, El Jadida, Morocco
[2] Chouaib Doukkali Univ, ESEF, El Jadida, Morocco
关键词
Vehicular ad-hoc networks; Black hole attack; Detection; Capability indicator; ROUTING PROTOCOL; OLSR PROTOCOL; ALGORITHM; IMPLEMENTATION; SECURITY; MANET; QOS;
D O I
10.1108/IJPCC-02-2022-0062
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Purpose In vehicular ad hoc networks (VANETs), the information transmitted is broadcast in a free access environment. Therefore, VANETs are vulnerable against attacks that can directly perturb the performance of the networks and then provoke big fall of capability. Black hole attack is an example such attack, where the attacker node pretends that having the shortest path to the destination node and then drops the packets. This paper aims to present a new method to detect the black hole attack in real-time in a VANET network. Design/methodology/approach This method is based on capability indicators that are widely used in industrial production processes. If the different capability indicators are greater than 1.33 and the stability ratio (S-r) is greater than 75%, the network is stable and the vehicles are communicating in an environment without the black hole attack. When the malicious nodes representing the black hole attacks are activated one by one, the fall of capability becomes more visible and the network is unstable, out of control and unmanaged, due to the presence of the attacks. The simulations were conducted using NS-3 for the network simulation and simulation of urban mobility for generating the mobility model. Findings The proposed mechanism does not impose significant overheads or extensive modifications in the standard Institute of Electrical and Electronics Engineers 802.11p or in the routing protocols. In addition, it can be implemented at any receiving node which allows identifying malicious nodes in real-time. The simulation results demonstrated the effectiveness of proposed scheme to detect the impact of the attack very early, especially with the use of the short-term capability indicators (Cp, Cpk and Cpm) of each performance metrics (throughput and packet loss ratio), which are more efficient at detecting quickly and very early the small deviations over a very short time. This study also calculated another indicator of network stability which is S-r, which allows to make a final decision if the network is under control and that the vehicles are communicating in an environment without the black hole attack. Originality/value According to the best of the authors' knowledge, the method, using capability indicators for detecting the black hole attack in VANETs, has not been presented previously in the literature.
引用
收藏
页码:734 / 755
页数:22
相关论文
共 50 条
[41]   A Multi-Agent Approach For Routing On Vehicular Ad-Hoc Networks [J].
Harrabi, Samira ;
Chainbi, Walid ;
Ghedira, Khaled .
4TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2013), THE 3RD INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2013), 2013, 19 :578-585
[42]   An Optimal ODAM-Based Broadcast Algorithm for Vehicular Ad-Hoc Networks [J].
Sun, Weifeng ;
Xia, Feng ;
Ma, Jianhua ;
Fu, Tong ;
Sun, Yu .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (12) :3257-3274
[43]   A Probabilistic Energy-Efficient Approach for Monitoring and Detecting Malicious/Selfish Nodes in Mobile Ad-hoc Networks [J].
Lupia, Andrea ;
De Rango, Floriano .
2016 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, 2016,
[44]   Detecting Sybil Attack in Vehicular Ad-hoc Networks (Vanets) by Using Fitness Function, Signal Strength Index and Throughput [J].
Sefati, Seyed Salar ;
Tabrizi, Sara Ghiasi .
WIRELESS PERSONAL COMMUNICATIONS, 2022, 123 (03) :2699-2719
[45]   A Rank Sequence Method for Detecting Black Hole Attack in Ad hoc Network [J].
Xiong Kai ;
Yin Mingyong ;
Li Wenkang ;
Jiang Hong .
PROCEEDINGS OF 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTERNET OF THINGS, 2015, :155-159
[46]   Detecting Sybil Attack in Vehicular Ad-hoc Networks (Vanets) by Using Fitness Function, Signal Strength Index and Throughput [J].
Seyed Salar Sefati ;
Sara Ghiasi Tabrizi .
Wireless Personal Communications, 2022, 123 :2699-2719
[47]   An integrated vehicular and network simulator for vehicular ad-hoc networks [J].
Gorgorin, Cristian ;
Gradinescu, Victor ;
Diaconescu, Raluca ;
Cristea, Valentin ;
Iftode, Liviu .
MODELLING AND SIMULATION 2006, 2006, :142-+
[48]   Prevention of cooperative black hole attack in wireless ad hoc networks [J].
Ramaswamy, S ;
Fu, HR ;
Sreekantaradhya, M ;
Dixon, J ;
Nygard, K .
ICWN'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, 2003, :570-575
[49]   A Comprehensive Survey on Authentication and Attack Detection Schemes That Threaten It in Vehicular Ad-Hoc Networks [J].
Dong, Shi ;
Su, Huadong ;
Xia, Yuanjun ;
Zhu, Fei ;
Hu, Xinrong ;
Wang, Bangchao .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (12) :13573-13602
[50]   A comprehensive survey of network coding in vehicular ad-hoc networks [J].
Jamil, Farhan ;
Javaid, Anam ;
Umer, Tariq ;
Rehmani, Mubashir Husain .
WIRELESS NETWORKS, 2017, 23 (08) :2395-2414