Classification of Distributed Denial of Service Attacks in VANET: A Survey

被引:7
作者
Krishna, K. Vamshi [1 ]
Reddy, K. Ganesh [1 ]
机构
[1] VIT AP Univ, Amaravati, AP, India
关键词
DOS; DDOS; VANET; Layer-wise;
D O I
10.1007/s11277-023-10643-6
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Vehicular ad hoc network (VANET) is a self-organizing network established to provide wireless communication between vehicles where information plays an important role in aspects such as collision detection, re-routing, traffic monitoring, information related to gas stations, hospitals, hotels, entertainment, and more. The main challenges that VANET faces are security and privacy of information, which lead to a variety of attacks. Numerous types of attacks can be carried out on VANET, with distributed denial of service (DDOS) being one of the most common and dangerous. DDOS attacks on VANET result in the lack of availability of information for vehicles to communicate. Many methods were developed to counteract DDOS, however the efficacy of most of these existing systems was limited to some degree, and attackers exploited these weaknesses to conduct network attacks. Here we provide a full explanation of numerous DDOS attacks as well as a layer-by-layer classification of DDOS attacks that are specialized to specific layers or multi-layers. The goal of this survey is to provide useful information to fellow researchers on VANET attacks, in particular DDOS attacks, their layer-wise classification, the impact DDOS has on the network, and existing DDOS countermeasures, their limitations, and how they can be improved. We have referred to various journal papers to gather the information that can be helpful to researchers working in the field of VANET attacks.
引用
收藏
页码:933 / 964
页数:32
相关论文
共 58 条
[1]  
Al Shahrani Abdullah S., 2011, Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS 2011), P752, DOI 10.1109/INCoS.2011.145
[2]  
[Anonymous], 2004, WORKSH BROADB WIR SE
[3]   Assessing risks and threats with layered approach to Internet of Things security [J].
Aydos, Murat ;
Vural, Yilmaz ;
Tekerek, Adem .
MEASUREMENT & CONTROL, 2019, 52 (5-6) :338-353
[4]   SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles [J].
Babaghayou, Messaoud ;
Labraoui, Nabila ;
Ari, Ado Adamou Abba ;
Lagraa, Nasreddine ;
Ferrag, Mohamed Amine ;
Maglaras, Leandros .
COGNITIVE RADIO ORIENTED WIRELESS NETWORKS AND WIRELESS INTERNET, 2022, 427 :343-360
[5]  
Baccari S., 2020, SOFTCOM INT C SOFTW
[6]  
Bahramnejad S., 2023, PREPRINT VERSION 1 A, DOI [10.21203/rs.3.rs-2604220/v1, DOI 10.21203/RS.3.RS-2604220/V1]
[7]   A Hybrid Data-driven Model for Intrusion Detection in VANET [J].
Bangui, Hind ;
Ge, Mouzhi ;
Buhnova, Barbora .
12TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT) / THE 4TH INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40) / AFFILIATED WORKSHOPS, 2021, 184 :516-523
[8]  
Ben Rabah N., 2023, EMERGING TRENDS CYBE, DOI [10.1007/978-3-031-09640-2_10, DOI 10.1007/978-3-031-09640-2_10]
[9]   Secure Embedding of Rooted Spanning Trees for Scalable Routing in Topology-Restricted Networks [J].
Byrenheid, Martin ;
Strufe, Thorsten ;
Roos, Stefanie .
2020 INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2020), 2020, :175-184
[10]   A holistic approach to mitigating DoS attacks in SDN networks [J].
Dridi, Lobna ;
Zhani, Mohamed Faten .
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2018, 28 (01)