Variable control chart for detecting black hole attack in vehicular ad-hoc networks

被引:0
|
作者
Badreddine Cherkaoui
Abderrahim Beni-hssane
Mohammed Erritali
机构
[1] Chouaïb Doukkali University,LAROSERI Laboratory, Computer Science Department, High School of Technology
[2] Chouaïb Doukkali University,LAROSERI Laboratory, Computer Science Department, Sciences Faculty
[3] University of Sultan Moulay Slimane,TIAD Laboratory, Computer Sciences Department, Sciences and Technics Faculty
来源
Journal of Ambient Intelligence and Humanized Computing | 2020年 / 11卷
关键词
Statistical process control; Black hole attack; VANET;
D O I
暂无
中图分类号
学科分类号
摘要
The nature of VANET networks makes the network vulnerable to several attacks such as the black hole attack which is part of Denial of Service attacks (DOS). The aim of these attacks is to prohibit users from using one or more services by making the communication unavailable. In this sense and during the routing process, the malicious node tries to acquire the route by forging routing information in order to receive the data and then drops it without transferring it to its destination. In this paper, we propose a novel detection method of such attack during communication in a VANET network. This method is based on a variable control chart which is widely used in the industrial field to monitor the quality of a given process. This method can identify malicious nodes in real time by deploying the monitoring system in each receiving node within the network. Our method is easy to implement and does not require any modification to the 802.11p standard or the routing protocol as we will demonstrate by NS-2 simulations and SUMO microscopic and continuous road traffic simulator using a real map.
引用
收藏
页码:5129 / 5138
页数:9
相关论文
共 50 条
  • [41] A Multidimensional Trust Model for Vehicular Ad-Hoc Networks
    Najafi, Maryam
    Khoukhi, Lyes
    Lemercier, Marc
    PROCEEDINGS OF THE IEEE 46TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2021), 2021, : 419 - 422
  • [42] Profile based routing in vehicular ad-hoc networks
    Ali Bohlooli
    Kamal Jamshidi
    Science China Information Sciences, 2014, 57 : 1 - 11
  • [43] Vehicular Ad-hoc Networks: Architecture, Applications and Challenges
    Yeferny, Taoufik
    Hamad, Sofian
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (02): : 1 - 7
  • [44] Cooperation Enforcement Schemes in Vehicular Ad-Hoc Networks
    Hernandez-Goya, C.
    Caballero-Gil, P.
    Molina-Gil, J.
    Caballero-Gil, C.
    COMPUTER AIDED SYSTEMS THEORY - EUROCAST 2009, 2009, 5717 : 429 - 436
  • [45] Issues and Possibilities in Vehicular Ad-hoc Networks (VANETs)
    Jeremiah, Chukwu
    Nneka, Agwu Joy
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, CONTROL, NETWORKING, ELECTRONICS AND EMBEDDED SYSTEMS ENGINEERING (ICCNEEE), 2015, : 254 - 259
  • [46] Detection and Isolation of Black Hole attack in Mobile Ad Hoc Networks - A Review
    Nagasubramanian, Gayathri
    Sakthivel, Rakesh Kumar
    Patan, Rizwan
    Ehtemami, Anahid
    Meyer-Baese, Anke
    Tahmassebi, Amirhessam
    Gandomi, Amir H.
    DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES IV, 2020, 11419
  • [47] Flag-Based Vehicular Clustering Scheme for Vehicular Ad-Hoc Networks
    Samann, Fady
    Askar, Shavan
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 77 (03): : 2715 - 2734
  • [48] Vehicle Traffic Congestion Management in Vehicular ad-hoc networks
    Mohandas, Brijesh Kadri
    Liscano, Ramiro
    Yang, Oliver W. W.
    2009 IEEE 34TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2009), 2009, : 655 - +
  • [49] Enhanced MMIP6 for Vehicular Ad-hoc Networks
    Debnath, Sanjib
    Majumder, Abhishek
    2015 INTERNATIONAL SYMPOSIUM ON ADVANCED COMPUTING AND COMMUNICATION (ISACC), 2015, : 303 - 309
  • [50] Data Verification and Misbehavior Detection in Vehicular Ad-hoc Networks
    Ghaleb, Fuad A.
    Zainal, Anazida
    Rassam, Murad A.
    JURNAL TEKNOLOGI-SCIENCES & ENGINEERING, 2015, 73 (02):