Year 2022,
Volume: 5 Issue: 3, 304 - 314, 31.12.2022
Buğra Alp Tosunoglu
,
Cemal Koçak
References
- Reference1 S.-H. Kim and I.-Y. Lee, “A secure and efficient vehicle-to-vehicle communication scheme using bloom filter in VANETs,” Int. j. secur. appl., vol. 8, no. 2, pp. 9–24, 2014.
- Reference2 M. Y. Gadkari, “VANET: Routing protocols, security issues and simulation tools,” IOSR J. Comput. Eng., vol. 3, no. 3, pp. 28–38, 2012.
- Reference3 N. Arulkumar and E. G. D. P. Raj, “A simulation based study to implement Intelligent Transport Systems concepts in VANETs using AODV routing protocol in NS2,” in 2012 Fourth International Conference on Advanced Computing (ICoAC), 2012.
- Reference4 J. Zhang, “Trust management for VANETs: challenges, desired properties and future directions,” International Journal of Distributed Systems and Technologies (IJDST), vol. 3, no. 1, pp. 48–62, 2012.
- Reference5 M. J. Faghihniya, S. M. Hosseini, and M. Tahmasebi, “Security upgrade against RREQ flooding attack by using balance index on vehicular ad hoc network,” Wirel. netw., vol. 23, no. 6, pp. 1863–1874, 2017.
- Reference6 M. Pawar and J. Agarwal, “A literature survey on security issues of WSN and different types of attacks in network,” Indian Journal of Computer Science and Engineering, vol. 8, no. 2, pp. 80–83, 2017.
- Reference7 M. Rmayti, Y. Begriche, R. Khatoun, L. Khoukhi, and D. Gaiti, “Flooding attacks detection in MANETs,” in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015.
- Reference8 Q. Li, A. Malip, K. M. Martin, S.-L. Ng, and J. Zhang, “A reputation-based announcement scheme for VANETs,” IEEE Trans. Veh. Technol., vol. 61, no. 9, pp. 4095–4108, 2012.
- Reference9 Y. Shashwat, P. Pandey, K. V. Arya, and S. Kumar, “A modified AODV protocol for preventing blackhole attack in MANETs,” Inf. Secur. J. Glob. Perspect., vol. 26, no. 5, pp. 240–248, 2017.
- Reference10 A. Sharma and P. K. Johari, Eliminating Collaborative Black-hole Attack by Using Fuzzy Logic in Mobile Ad-hoc Network. 2017.
- Reference11 M. Abdel-Azim, H. E. D. Salah, and M. Ibrahim, “Black Hole attack Detection using fuzzy based IDS,” International Journal of Communication Networks and Information Security, vol. 9, no. 2, 2017.
- Reference12 A. K. Khare, J. L. Rana, and R. C. Jain, Detection of Wormhole, Blackhole and DDOS Attack in MANET using Trust Estimation under Fuzzy Logic Methodology. 2017.
- Reference13 M. Shivhare and P. K. Gautam, “Prevention of BLACK HOLE attack in MANET Using Indexing Algorithm,” International Journal of Engineering Science, 2017.
- Reference14 O. A. Wahab, H. Otrok, and A. Mourad, “A Dempster–Shafer based tit-for-tat strategy to regulate the cooperation in VANET using QoS-OLSR protocol,” Wirel. Pers. Commun., vol. 75, no. 3, pp. 1635–1667, 2014.
- Reference15 O. A. Wahab, H. Otrok, and A. Mourad, “VANET QoS-OLSR: QoS-based clustering protocol for Vehicular Ad hoc Networks,” Comput. Commun., vol. 36, no. 13, pp. 1422–1435, 2013.
- Reference16 A. Gupta, “Mitigation algorithm against black hole attack using Real Time Monitoring for AODV routing protocol in MANET,” in 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), IEEE, 2015, pp. 134–138.
- Reference17 G. Arulkumaran and R. K. Gnanamurthy, “Fuzzy trust approach for detecting black hole attack in mobile adhoc network,” Mob. Netw. Appl., vol. 24, no. 2, pp. 386–393, 2019.
- Reference18 Y. A. Choudhary and R. Gaikwad, “A Probabilistic black hole & gray hole attacks Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks,” International Journal of Advanced Electronics and Communication Systems, vol. 6, no. 3, 2017.
- Reference19 P. Rathiga and S. Sathappan, “Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique,” International Journal of Applied Engineering Research, vol. 12, no. 18, pp. 7459–7465, 2017.
- Reference20 K. Laeeq, “RFAP, a preventive measure against route request Flooding Attack in MANETS,” in 2012 15th International Multitopic Conference (INMIC), 2012.
- Reference21 P. Choudhury, S. Nandi, A. Pal, and N. C. Debnath, “Mitigating route request flooding attack in MANET using node reputation,” in IEEE 10th International Conference on Industrial Informatics, 2012.
- Reference22 C. Panos, C. Xenakis, P. Kotzias, and I. Stavrakakis, “A specification-based intrusion detection engine for infrastructure-less networks,” Comput. Commun., vol. 54, pp. 67–83, 2014.
- Reference23 S. Gurung and S. Chauhan, “A novel approach for mitigating route request flooding attack in MANET,” Wirel. netw., vol. 24, no. 8, pp. 2899–2914, 2018.
- Reference24 M. R. Hasan, Y. Zhao, Y. Luo, G. Wang, and R. M. Winter, “An effective AODV-based flooding detection and prevention for smart meter network,” Procedia Comput. Sci., vol. 129, pp. 454–460, 2018.
- Reference25 K. Saravanan and J. Vellingiri, “Defending MANET against flooding attack for medical application,” in 2017 2nd International Conference on Communication and Electronics Systems (ICCES), 2017.
- Reference26 K. Geetha and N. Sreenath, “Detection of SYN flooding attack in mobile ad hoc networks with AODV protocol,” Arab. J. Sci. Eng., vol. 41, no. 3, pp. 1161–1172, 2016.
- Reference27 E. Altman and T. Jiménez, “NS simulator for beginners,” Synth. lect. commun. netw., vol. 5, no. 1, pp. 1–184, 2012.
- Reference28 “The Network Simulator - ns-2,” Isi.edu. [Online]. Available: http://www.isi.edu/nsnam/ns/. [Accessed: 14-Sep-2022].
FA-AODV: Flooding Attacks Detection Based Ad Hoc On-Demand Distance Vector Routing Protocol for VANET
Year 2022,
Volume: 5 Issue: 3, 304 - 314, 31.12.2022
Buğra Alp Tosunoglu
,
Cemal Koçak
Abstract
Vehicular Ad-Hoc Networks (VANET) is anticipated to be the most effective way of increasing performance and safety in transportation in the near future. VANETs are the sub-branch of Ad-Hoc Networks which provide safety and comfort features together with related services for the vehicle operators. RREQ flood attack mostly encountered in the literature for security of VANET. Due to the nature of the reactive protocols, the AODV routing protocol is quite open to attack types such as flood attack. Flood attacks occur in the network layer. The impact of flood attacks is not about victim nodes, it can be also affect the whole network. A malicious attack that could be carried out in VANET could cause accidents that would cause a serious disaster. A malicious node could penetrate into the IP addresses on a Flood Attack based User Datagram Protocol (UDP) to breakdown the data communication between two vehicles. The main purpose of this paper is to detect and prevent the flood attack, during the operation of the routing protocol and to decrease the end-to-end delay on the network.
References
- Reference1 S.-H. Kim and I.-Y. Lee, “A secure and efficient vehicle-to-vehicle communication scheme using bloom filter in VANETs,” Int. j. secur. appl., vol. 8, no. 2, pp. 9–24, 2014.
- Reference2 M. Y. Gadkari, “VANET: Routing protocols, security issues and simulation tools,” IOSR J. Comput. Eng., vol. 3, no. 3, pp. 28–38, 2012.
- Reference3 N. Arulkumar and E. G. D. P. Raj, “A simulation based study to implement Intelligent Transport Systems concepts in VANETs using AODV routing protocol in NS2,” in 2012 Fourth International Conference on Advanced Computing (ICoAC), 2012.
- Reference4 J. Zhang, “Trust management for VANETs: challenges, desired properties and future directions,” International Journal of Distributed Systems and Technologies (IJDST), vol. 3, no. 1, pp. 48–62, 2012.
- Reference5 M. J. Faghihniya, S. M. Hosseini, and M. Tahmasebi, “Security upgrade against RREQ flooding attack by using balance index on vehicular ad hoc network,” Wirel. netw., vol. 23, no. 6, pp. 1863–1874, 2017.
- Reference6 M. Pawar and J. Agarwal, “A literature survey on security issues of WSN and different types of attacks in network,” Indian Journal of Computer Science and Engineering, vol. 8, no. 2, pp. 80–83, 2017.
- Reference7 M. Rmayti, Y. Begriche, R. Khatoun, L. Khoukhi, and D. Gaiti, “Flooding attacks detection in MANETs,” in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015.
- Reference8 Q. Li, A. Malip, K. M. Martin, S.-L. Ng, and J. Zhang, “A reputation-based announcement scheme for VANETs,” IEEE Trans. Veh. Technol., vol. 61, no. 9, pp. 4095–4108, 2012.
- Reference9 Y. Shashwat, P. Pandey, K. V. Arya, and S. Kumar, “A modified AODV protocol for preventing blackhole attack in MANETs,” Inf. Secur. J. Glob. Perspect., vol. 26, no. 5, pp. 240–248, 2017.
- Reference10 A. Sharma and P. K. Johari, Eliminating Collaborative Black-hole Attack by Using Fuzzy Logic in Mobile Ad-hoc Network. 2017.
- Reference11 M. Abdel-Azim, H. E. D. Salah, and M. Ibrahim, “Black Hole attack Detection using fuzzy based IDS,” International Journal of Communication Networks and Information Security, vol. 9, no. 2, 2017.
- Reference12 A. K. Khare, J. L. Rana, and R. C. Jain, Detection of Wormhole, Blackhole and DDOS Attack in MANET using Trust Estimation under Fuzzy Logic Methodology. 2017.
- Reference13 M. Shivhare and P. K. Gautam, “Prevention of BLACK HOLE attack in MANET Using Indexing Algorithm,” International Journal of Engineering Science, 2017.
- Reference14 O. A. Wahab, H. Otrok, and A. Mourad, “A Dempster–Shafer based tit-for-tat strategy to regulate the cooperation in VANET using QoS-OLSR protocol,” Wirel. Pers. Commun., vol. 75, no. 3, pp. 1635–1667, 2014.
- Reference15 O. A. Wahab, H. Otrok, and A. Mourad, “VANET QoS-OLSR: QoS-based clustering protocol for Vehicular Ad hoc Networks,” Comput. Commun., vol. 36, no. 13, pp. 1422–1435, 2013.
- Reference16 A. Gupta, “Mitigation algorithm against black hole attack using Real Time Monitoring for AODV routing protocol in MANET,” in 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), IEEE, 2015, pp. 134–138.
- Reference17 G. Arulkumaran and R. K. Gnanamurthy, “Fuzzy trust approach for detecting black hole attack in mobile adhoc network,” Mob. Netw. Appl., vol. 24, no. 2, pp. 386–393, 2019.
- Reference18 Y. A. Choudhary and R. Gaikwad, “A Probabilistic black hole & gray hole attacks Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks,” International Journal of Advanced Electronics and Communication Systems, vol. 6, no. 3, 2017.
- Reference19 P. Rathiga and S. Sathappan, “Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique,” International Journal of Applied Engineering Research, vol. 12, no. 18, pp. 7459–7465, 2017.
- Reference20 K. Laeeq, “RFAP, a preventive measure against route request Flooding Attack in MANETS,” in 2012 15th International Multitopic Conference (INMIC), 2012.
- Reference21 P. Choudhury, S. Nandi, A. Pal, and N. C. Debnath, “Mitigating route request flooding attack in MANET using node reputation,” in IEEE 10th International Conference on Industrial Informatics, 2012.
- Reference22 C. Panos, C. Xenakis, P. Kotzias, and I. Stavrakakis, “A specification-based intrusion detection engine for infrastructure-less networks,” Comput. Commun., vol. 54, pp. 67–83, 2014.
- Reference23 S. Gurung and S. Chauhan, “A novel approach for mitigating route request flooding attack in MANET,” Wirel. netw., vol. 24, no. 8, pp. 2899–2914, 2018.
- Reference24 M. R. Hasan, Y. Zhao, Y. Luo, G. Wang, and R. M. Winter, “An effective AODV-based flooding detection and prevention for smart meter network,” Procedia Comput. Sci., vol. 129, pp. 454–460, 2018.
- Reference25 K. Saravanan and J. Vellingiri, “Defending MANET against flooding attack for medical application,” in 2017 2nd International Conference on Communication and Electronics Systems (ICCES), 2017.
- Reference26 K. Geetha and N. Sreenath, “Detection of SYN flooding attack in mobile ad hoc networks with AODV protocol,” Arab. J. Sci. Eng., vol. 41, no. 3, pp. 1161–1172, 2016.
- Reference27 E. Altman and T. Jiménez, “NS simulator for beginners,” Synth. lect. commun. netw., vol. 5, no. 1, pp. 1–184, 2012.
- Reference28 “The Network Simulator - ns-2,” Isi.edu. [Online]. Available: http://www.isi.edu/nsnam/ns/. [Accessed: 14-Sep-2022].