Encrypted Access Mapping in a Distinctly Routed Optimized Immune System to Prevent DoS Attack Variants in VANET Architecture

PDF (2118KB), PP.99-114

Views: 0 Downloads: 0

Author(s)

Rama Mercy. S. 1,* G. Padmavathi 2

1. Avinashilingam Institute for Home Science and Higher Education for Women/ Department of Computer Science, Coimbatore, Pin/Zip code- 641043, India

2. Avinashilingam Institute for Home Science and Higher Education for Women/ Department of Computer Science, Coimbatore, Pin/Zip code- 641043, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2024.03.08

Received: 16 Feb. 2023 / Revised: 27 Apr. 2023 / Accepted: 19 Jun. 2023 / Published: 8 Jun. 2024

Index Terms

VANET, DDoS, Hyperbolic Encryption, Middlebox, Packet Delivery Ratio, Routing, Nodes, Roadside Unit

Abstract

The use of vehicle ad hoc networks (VANET) is increasing, VANET is a network in which two or more vehicles communicate with each other. The VANET architecture is vulnerable to various attacks, such as DoS and DDoS attacks hence various strategies were previously employed to combat these attacks, but the presence of end-to-end transparency and N-to-1 mapping of different IP addresses create failure in the blockage and not able to determine the twelve variants of DDoS attacks hence a novel technique, Encrypted Access Hex-tuple Mapping Attack detection was proposed, which uses triple random hyperbolic encryption, which performs triple random encoding to encrypt traffic signals and obtains the public key by plotting random values in hyperbola to strengthen the access control in the middlebox and Deep auto sparse impasse NN is used to detect twelve variant DDoS attacks in the VANET architecture. Moreover, to provide immunity against attack, the existing approach uses various artificial immune systems to prevent DDoS attacks but the selection of positive and negative clusters generates too many indicator packets. Hence a novel technique, Stable Automatic Optimized Cache Routing proposed, which uses a Deep trust factorization NN to detect irrational nodes without requiring prior negotiation about local outliner factor and direct evidence by automatically extracting trust factors of each node to manage the packet flows and detecting transmission of dangerous malware files in the network to prevent various types of hybrid DDoS attacks at VANET architecture. The proposed model is implemented in NS-3 to detect and prevent hybrid DDoS attacks. 

Cite This Paper

Rama Mercy. S., G. Padmavathi, "Encrypted Access Mapping in a Distinctly Routed Optimized Immune System to Prevent DoS Attack Variants in VANET Architecture", International Journal of Computer Network and Information Security(IJCNIS), Vol.16, No.3, pp.99-114, 2024. DOI:10.5815/ijcnis.2024.03.08

Reference

[1]R. Shrestha, R. Bajracharya, A. P. Shrestha and S. Y. Nam, “A new type of blockchain for secure message exchange in VANET,” Digital communications and networks, vol.  6, no. 2, pp. 177-186, 2020.
[2]A. K. Kazi, S. M. Khan and N. G. Haider, “Reliable group of vehicles (RGoV) in VANET,” IEEE Access, vol. 9, pp. 111407-111416, 2021.
[3]A. Ilavendhan and K. Saruladha, “Comparative analysis of various approaches for DoS attack detection in VANETs,” In 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC) IEEE, pp. 821-825, July 2020.
[4]A. Khraisat and A. Alazab, “A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges,” Cybersecurity, vol. 4, no. 1, pp. 1-27, 2021.
[5]I. O. Olayode, L. K. Tartibu and M. O. Okwu, “Application of Fuzzy Mamdani Model for effective prediction of traffic flow of vehicles at signalized road intersections,” In 2021 IEEE 12th International Conference on Mechanical and Intelligent Manufacturing Technologies (ICMIMT) IEEE, pp. 219-224, May 2021. 
[6]M. A. Al-Absi, A. A. Al-Absi and H. J. Lee, “Comparison between DSRC and other Short Range Wireless Communication Technologies,” In 2020 22nd International Conference on Advanced Communication Technology (ICACT) IEEE, pp. 1-5, February 2020. 
[7]N. Ganeshkumar and S. Kumar, “Obu (on-board unit) wireless devices in vanet (s) for effective communication—A review,” Computational Methods and Data Engineering, pp. 191-202, 2021.
[8]M. Poongodi, V. Vijayakumar, F. Al-Turjman, M. Hamdi and M. Ma, “Intrusion prevention system for DDoS attack on VANET with reCAPTCHA controller using information based metrics,” IEEE Access, vol. 7, pp. 158481-158491, 2019.
[9]M. Poongodi, M. Hamdi, A. Sharma, M. Ma and P. K. Singh, “DDoS detection mechanism using trust-based evaluation system in VANET,” IEEE Access, vol. 7, pp. 183532-183544, 2019.
[10]N. A. Alsulaim, R. A. Alolaqi and R. Y. Alhumaidan, “proposed solutions to detect and prevent DoS attacks on VANETs system,” In 2020 3rd international conference on computer applications & information security (ICCAIS) IEEE, pp. 1-6, March 2020.
[11]R. Kolandaisamy, R. M. Noor, I. Kolandaisamy, I. Ahmedy, M. L. M. Kiah, M. E. M. Tamil and T. Nandy, “A stream position performance analysis model based on DDoS attack detection for cluster-based routing in VANET,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 6, pp. 6599-6612, 2021.
[12]S. Kumar and K. S. Mann, “Prevention of dos attacks by detection of multiple malicious nodes in VANETs,” In 2019 International Conference on Automation, Computational and Technology Management (ICACTM) IEEE, pp. 89-94, April 2019.
[13]H. Bangui, M. Ge and B. Buhnova, “A hybrid machine learning model for intrusion detection in VANET,” Computing, vol. 104, no. 3, pp. 503-531, 2022.
[14]K. Adhikary, S. Bhushan, S. Kumar and K. Dutta, “Hybrid algorithm to detect DDoS attacks in VANETs,” Wireless Personal Communications, vol. 114, no. 4, pp. 3613-3634, 2020.
[15]S. Ercan, M. Ayaida and N. Messai, “Misbehavior detection for position falsification attacks in VANETs using machine learning,” IEEE Access, vol. 10, pp. 1893-1904, 2021.
[16]S. Ahmed, M. U. Rehman, A. Ishtiaq, S. Khan and A. Ali, S. Begum, “VANSec: Attack-resistant VANET security algorithm in terms of trust computation error and normalized routing overhead,” Journal of Sensors, 2018.
[17]W. Li and H. Song, “ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks,” IEEE transactions on intelligent transportation systems, vol. 17, no. 4, pp. 960-969, 2015.
[18]W. Othman, M. Fuyou, K. Xue and A. Hawbani, “Physically secure lightweight and privacy-preserving message authentication protocol for VANET in smart city,” IEEE Transactions on Vehicular Technology, vol. 70, no. 12, pp. 12902-12917, 2021.
[19]B. A. Bensaber, C. G. P. Diaz and Y. Lahrouni, “Design and modeling an Adaptive Neuro-Fuzzy Inference System (ANFIS) for the prediction of a security index in VANET,” Journal of Computational Science, vol. 47, pp. 101234, 2020.
[20]N. C. Velayudhan, A. Anitha and M. Madanan, “Sybil attack with RSU detection and location privacy in urban VANETs: An efficient EPORP technique,” Wireless Personal Communications, vol. 122, no. 4, pp. 3573-3601, 2022.
[21]S. Aldhaheri, D. Alghazzawi, L. Cheng, B. Alzahrani and A. Al-Barakati, “Deepdca: novel network-based detection of iot attacks using artificial immune system,” Applied Sciences, vol. 10, no. 6, pp. 1909, 2020.
[22]R. Kolandaisamy, R. M. Noor, M. R. Z’aba, I. Ahmedy and I. Kolandaisamy, “Adapted stream region for packet marking based on DDoS attack detection in vehicular ad hoc networks,” The Journal of Supercomputing, vol. 76, no. 8, pp. 5948-5970, 2020)
[23]K. Adhikary, S. Bhushan, S. Kumar and K. Dutta, “Hybrid algorithm to detect DDoS attacks in VANETs,” Wireless Personal Communications, vol. 114, no. 4, pp. 3613-3634, 2020.
[24]B. Sousa, N. Magaia, and S. Silva, “An Intelligent Intrusion Detection System for 5G-Enabled Internet of Vehicles,” Electronics, vol. 12, no. 8, pp. 1757, 2023.
[25]A. Gaurav, B. B. Gupta, F. J. G. Peñalvo, N. Nedjah and K. Psannis, “Ddos attack detection in vehicular ad-hoc network (vanet) for 5g networks,” In Security and Privacy Preserving for IoT and 5G Networks Springer, Cham., pp. 263-278, 2022.