Variable control chart for detecting black hole attack in vehicular ad-hoc networks

被引:0
|
作者
Badreddine Cherkaoui
Abderrahim Beni-hssane
Mohammed Erritali
机构
[1] Chouaïb Doukkali University,LAROSERI Laboratory, Computer Science Department, High School of Technology
[2] Chouaïb Doukkali University,LAROSERI Laboratory, Computer Science Department, Sciences Faculty
[3] University of Sultan Moulay Slimane,TIAD Laboratory, Computer Sciences Department, Sciences and Technics Faculty
来源
Journal of Ambient Intelligence and Humanized Computing | 2020年 / 11卷
关键词
Statistical process control; Black hole attack; VANET;
D O I
暂无
中图分类号
学科分类号
摘要
The nature of VANET networks makes the network vulnerable to several attacks such as the black hole attack which is part of Denial of Service attacks (DOS). The aim of these attacks is to prohibit users from using one or more services by making the communication unavailable. In this sense and during the routing process, the malicious node tries to acquire the route by forging routing information in order to receive the data and then drops it without transferring it to its destination. In this paper, we propose a novel detection method of such attack during communication in a VANET network. This method is based on a variable control chart which is widely used in the industrial field to monitor the quality of a given process. This method can identify malicious nodes in real time by deploying the monitoring system in each receiving node within the network. Our method is easy to implement and does not require any modification to the 802.11p standard or the routing protocol as we will demonstrate by NS-2 simulations and SUMO microscopic and continuous road traffic simulator using a real map.
引用
收藏
页码:5129 / 5138
页数:9
相关论文
共 50 条
  • [1] Variable control chart for detecting black hole attack in vehicular ad-hoc networks
    Cherkaoui, Badreddine
    Beni-hssane, Abderrahim
    Erritali, Mohammed
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (11) : 5129 - 5138
  • [2] Quality Control Chart for Detecting the Black Hole Attack in Vehicular Ad-hoc Networks
    Cherkaoui, Badreddine
    Beni-Hssane, Abderrahim
    Erritali, Mohammed
    8TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN 2017) / 7TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2017) / AFFILIATED WORKSHOPS, 2017, 113 : 170 - 177
  • [3] Effect of the black-hole attack in Vehicular Ad-Hoc Networks
    Mastouri, Mohamed Anis
    Hasnaoui, Salem
    2021 26TH IEEE ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS {APCC), 2021, : 205 - 210
  • [4] Novel approach of detecting the black hole attack for vehicular ad-hoc networks based on capability indicators
    El Houssaini, Souad
    El Houssaini, Mohammed-Alamine
    El Kafi, Jamal
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (05) : 734 - 755
  • [5] A Clustering Algorithm for Detecting and Handling Black Hole Attack in Vehicular Ad Hoc Networks
    Cherkaoui, Badreddine
    Beni-hssane, Abderrahim
    Erritali, Mohammed
    EUROPE AND MENA COOPERATION ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGIES, 2017, 520 : 481 - 490
  • [6] Detection and Prevention of Black Hole Attack and Sybil Attack in Vehicular Ad Hoc Networks
    Yadav, Dhananjay
    Chaubey, Nirbhay Kumar
    COMPUTING SCIENCE, COMMUNICATION AND SECURITY, COMS2 2024, 2025, 2174 : 176 - 189
  • [7] Trajectory tracking attack for vehicular ad-hoc networks
    Li, Changrong
    Li, Zhenfu
    SECURITY AND PRIVACY, 2024, 7 (06):
  • [8] Black Hole Attack's Effect Mobile Ad-hoc Networks (MANET)
    Sardana, Anjali
    Saini, Akanksha
    Bedwal, Tushina
    Tayal, Radhika
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 966 - 970
  • [9] Design and analysis of an improved AODV protocol for black hole and flooding attack in vehicular ad-hoc network (VANET)
    Kumar, Ankit
    Sinha, Madhavi
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 453 - 463
  • [10] Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks
    Banerjee, Sukla
    WCECS 2008: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, 2008, : 337 - 342