IJWMT Vol. 12, No. 4, 8 Aug. 2022
Cover page and Table of Contents: PDF (size: 1178KB)
Full Text (PDF, 1178KB), PP.1-14
Views: 0 Downloads: 0
Cyber-resilient, GPSR, Path Aware GPSR, VANET, Internet of Vehicles (IoV), Malicious nodes.
The ever need for transportation safety, faster and convenient travel, decrease in energy consumption, as well as inter-connectivity has led to the field of intelligent transportation system (ITS). At the core of ITS is the Internet of Vehicles (IoV) combining hardware/sensors, software, and network technologies. Vehicular ad hoc networks (VANETs) create mechanisms to connect IoV main elements, including vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), and Vehicle-to-Sensors (V2S). ITS systems heavily rely on its network connecting different parts of its infrastructure and ensuring data exchanges. However, VANET security is one of the primary challenges faced by connected vehicles. In IoV, the network is accessed by a variety device making the system vulnerable to a multitude of malicious attacks, including distributed denial-of-service (DDoS) and black hole attacks. Since critical vehicle systems can be accessed remotely, successful attacks can lead to fatalities. In VANET, any node can function as a router for the other nodes, therefore a malicious node connected to the network may inject spoofed routing tables to the other nodes thereby affecting the operation of the entire network. To overcome this issue, we proposed a security scheme designed to improve routing protocols in the detection of black hole attack. The proposed approach is demonstrated on a Network Simulator (NS3.27) using different network parameters such as average packet loss rate, end-to-end delay, packet delivery ratio (PDR) and network yield. Simulation results demonstrate the proposed method adds 10-15% improvement (on average) in End-to-End Delay, Packet Delivery Rate, Packet Loss Rate and Network Yield as compared with conventional Greedy Parameter Stateless Routing and Path Aware Greedy Parameter Stateless Routing under the black hole attack.
Mehnaz Tabassum, Aurenice Oliveira, "Cyber-resilient Routing for Internet of Vehicles Networks During Black Hole Attack", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.12, No.4, pp. 1-14, 2022. DOI:10.5815/ijwmt.2022.04.01
[1]Goyal, Amit Kumar, Gaurav Agarwal, and Arun Kumar Tripathi. "Network Architectures, Challenges, Security Attacks, Research Domains and Research Methodologies in VANET: A Survey." International Journal of Computer Network & Information Security 11, no. 10 (2019).
[2]NHTSA, “Vehicle-to-Vehicle Communication Report”, United States Department of Transportation, 2018.
[3]Congress, S.S.C., Puppala, A.J., Banerjee, A. and Patil, U.D., “Identifying hazardous obstructions within an intersection using unmanned aerial data analysis”, International Journal of Transportation Science and Technology, 10(1), pp.34-48, 2021.
[4]Kumar, A., Varadarajan, V., Kumar, A., Dadheech, P., Choudhary, S.S., Kumar, V.A., Panigrahi, B.K. and Veluvolu, K.C., “Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm”, Microprocessors and Microsystems, 80, p.103352, 2021.
[5]Upadhyaya, A.N. and Shah, J.S., “Blackhole Attack and its effect on VANET”, 2017.
[6]Zaidi, T. and Faisal, S., 2018, “An overview: Various attacks in VANET”, 4th International Conference on Computing Communication and Automation (ICCCA) (pp. 1-6). IEEE, December 2018.
[7]Pokar, T., Patel, S. and Shah, R., “An Efficient Approach of DSR Protocol to Detect and Prevent Black Hole Attack For VANET”, International Journal of Research and Analytical Reviws (IJRAR), 2019.
[8]Bibhu, V., Roshan, K., Singh, K.B. and Singh, D.K., “Performance Analysis of Black Hole Attack in Vanet”, International Journal of Computer Network & Information Security, 4(11), 2012.
[9]Yassein, M.B., Hmeidi, I., Khamayseh, Y., Al-Rousan, M. and Arrabi, D., “Black Hole Attack Security Issues, Challenges & Solution in MANET”, CS & IT Conference Proceedings (Vol. 8, No. 18). CS & IT Conference Proceedings, December 2018.
[10]Yasin, A. and Abu Zant, M., “Detecting and isolating black-hole attacks in MANET using timer based baited technique”, Wireless Communications and Mobile Computing, 2018.
[11]Stępień, K. and Poniszewska-Marańda, A., “November. Security methods against Black Hole attacks in Vehicular Ad-Hoc Network”, 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA) (pp. 1-4). IEEE, 2020.
[12]Dhiman, Vikram, Ikjot Saini, P. Manoj, M. Kumar, and P. Manoj. "A Comprehensive Survey of Location Based Routing in Vehicular Networks." International Journal of Wireless and Microwave Technology 1: 40-48, 2017.
[13]Karp, B. and Kung, H.T., “GPSR: Greedy perimeter stateless routing for wireless networks”, Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 243-254), August 2000.
[14]Silva, A., Reza, N. and Oliveira, A., “Improvement and performance evaluation of GPSR based routing techniques for vehicular ad hoc networks”, IEEE Access, 7, pp.21722-21733, 2019.
[15]Selvi, M., and B. Ramakrishnan. "Secured Message Broadcasting in VANET using Blowfish Algorithm with Oppositional Deer Hunting Optimization." International Journal of Computer Network & Information Security 13, no. 2, 2021.
[16]Ahmad, Shahnawaz. "Alleviating Malicious Insider Attacks in MANET using a Multipath On-demand Security Mechanism." International Journal of Computer Network & Information Security 10, no. 6, 2018.
[17]Houssaini, Z.S., Zaimi, I., Oumsis, M. and Ouatik, S.E.A., “Comparative study of routing protocols performance for vehicular ad-hoc networks”, International Journal of Applied Engineering Research, 12(13), pp.3867-3878, 2017.
[18]Ahmed, A.K., Abdulwahed, M.N. and Farzaneh, B., “A distributed trust mechanism for malicious behaviors in VANETs”, Indonesian Journal of Electrical Engineering and Computer Science, 19(3), pp.1147-1155, 2020.
[19]Lyu, J., Chen, C. and Tian, H., “Secure Routing Based on Geographic Location for Resisting Blackhole Attack In Three-dimensional VANETs”, 2020 IEEE/CIC International Conference on Communications in China (ICCC) (pp. 1168-1173). IEEE, August 2020.
[20]Fiade, A., Triadi, A.Y., Sulhi, A., Masruroh, S.U., Handayani, V. and Suseno, H.B., “Performance Analysis of Black Hole Attack and Flooding Attack AODV Routing Protocol on VANET (Vehicular Ad-Hoc Network)”, 2020 8th International Conference on Cyber and IT Service Management (CITSM) (pp. 1-5). IEEE, October, 2020.
[21]Shajin, F.H. and Rajesh, P., “Trusted secure geographic routing protocol: outsider attack detection in mobile ad hoc networks by adopting trusted secure geographic routing protocol”, International Journal of Pervasive Computing and Communications, 2020.
[22]Krajzewicz, D., Erdmann, J., Behrisch, M. and Bieker, L., “Recent development and applications of SUMO-Simulation of Urban Mobility”, International journal on advances in systems and measurements, 5(3&4), 2012