Defending against packet dropping attack in vehicular ad hoc networks

被引:8
作者
Djahel, Soufiene [1 ]
Nait-Abdesselam, Farid [1 ]
Zhang, Zonghua [1 ]
Khokhar, Ashfaq [2 ]
机构
[1] Univ Sci & Technol Lille, CNRS, UMR 8022, LIFL IRCICA, F-59600 Lille, France
[2] Univ Illinois, Dept Elect & Comp Engn, Chicago, IL 60680 USA
关键词
VANET; MANET; OLSR security; packet dropping attack;
D O I
10.1002/sec.25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular ad hoc networks (VANETs) are becoming very popular and a promising application of the so-called mobile ad hoc networks (MANET) technology. It has attracted recently an increasing attention from many car manufacturers as well as the wireless communication research community. Despite its tremendous potential to enhance road safety and to facilitate traffic management, VANET suffers from a variety of security and privacy issues which may dramatically limit their applications. In this paper, we address the problem of packet dropping attack launched against routing protocol's control packets, which represents one of the most aggressive attacks in MANET. The aim of this attack is to force nodes in the network to choose hostile nodes as relays to disseminate the partial topological information, thereby exploiting the functionality of the routing protocol to retain control packets. In particular, in optimized link state routing (OLSR) protocol, if a collusive packet dropping attack is launched during the propagation of the topology control (TC) packets, the topology information will fail in being disseminated to the entire network, which finally results in routing disruption. This paper focuses on the packet dropping attack, launched against OLSR, where two malicious multipoint relay (MPR) nodes collude to disrupt the topology discovery process. Based on the analysis of the attacker's behavior and the attack's consequence, we propose an acknowledgement-based mechanism as a countermeasure to enhance the security of OLSR. This mechanism helps the OLSR protocol to be less vulnerable to such attack by detecting and then isolating malicious nodes in the network. The simulation results of the proposed scheme show high detection rate under various scenarios. Copyright (C) 2008 John Wiley & Sons, Ltd.
引用
收藏
页码:245 / 258
页数:14
相关论文
共 50 条
  • [41] Using Road IDs to Enhance Clustering in Vehicular Ad hoc Networks
    Hadded, Mohamed
    Muhlethaler, Paul
    Zagrouba, Rachid
    Laouiti, Anis
    Saidane, Leila Azouz
    [J]. 2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 285 - 290
  • [42] Message Propagation in Vehicular Ad Hoc Networks: A Review
    Jeyaram, G.
    Madheswaran, M.
    [J]. INTELLIGENT COMPUTING AND NETWORKING, IC-ICN 2021, 2022, 301 : 207 - 218
  • [43] Trust management in vehicular ad hoc networks: a survey
    Souissi, Ilhem
    Ben Azzouna, Nadia
    Berradia, Tahar
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2019, 31 (04) : 230 - 243
  • [44] Veins based studies for vehicular ad hoc networks
    Haidari, Mohammad Jan
    Yetgin, Zeki
    [J]. 2019 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND DATA PROCESSING (IDAP 2019), 2019,
  • [45] A Stable Routing Protocol for Vehicular Ad hoc Networks
    Sivakumar, T.
    Manoharan, R.
    Kuppusamy, K. S.
    [J]. 2014 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & SOFT COMPUTING (ICNSC), 2014, : 46 - 49
  • [46] Realistic Mobility Modeling for Vehicular Ad Hoc Networks
    Akay, Hilal
    Tugcu, Tuna
    [J]. COMPUTATIONAL METHODS IN SCIENCE AND ENGINEERING, VOL 2: ADVANCES IN COMPUTATIONAL SCIENCE, 2009, 1148 : 5 - 8
  • [47] Reliable routing protocol for Vehicular Ad Hoc Networks
    Kim, Jung-Hun
    Lee, SuKyoung
    [J]. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2011, 65 (03) : 268 - 271
  • [48] Transmission Capacity Analysis for Vehicular Ad Hoc Networks
    He, Xinxin
    Shi, Weisen
    Luo, Tao
    [J]. IEEE ACCESS, 2018, 6 : 30333 - 30341
  • [49] A survey of authentication schemes for vehicular ad hoc networks
    Riley, Marshall
    Akkaya, Kemal
    Fong, Kenny
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (10) : 1137 - 1152
  • [50] A Survey on Routing Protocols in Vehicular Ad hoc Networks
    Ahmad, Sabbagh Amani
    Shcherbakov, Maxim
    [J]. 2018 9TH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA), 2018, : 369 - 376