Araştırma Makalesi
BibTex RIS Kaynak Göster
Yıl 2022, Cilt: 5 Sayı: 3, 304 - 314, 31.12.2022
https://doi.org/10.35377/saucis...1175613

Öz

Kaynakça

  • Reference1 S.-H. Kim and I.-Y. Lee, “A secure and efficient vehicle-to-vehicle communication scheme using bloom filter in VANETs,” Int. j. secur. appl., vol. 8, no. 2, pp. 9–24, 2014.
  • Reference2 M. Y. Gadkari, “VANET: Routing protocols, security issues and simulation tools,” IOSR J. Comput. Eng., vol. 3, no. 3, pp. 28–38, 2012.
  • Reference3 N. Arulkumar and E. G. D. P. Raj, “A simulation based study to implement Intelligent Transport Systems concepts in VANETs using AODV routing protocol in NS2,” in 2012 Fourth International Conference on Advanced Computing (ICoAC), 2012.
  • Reference4 J. Zhang, “Trust management for VANETs: challenges, desired properties and future directions,” International Journal of Distributed Systems and Technologies (IJDST), vol. 3, no. 1, pp. 48–62, 2012.
  • Reference5 M. J. Faghihniya, S. M. Hosseini, and M. Tahmasebi, “Security upgrade against RREQ flooding attack by using balance index on vehicular ad hoc network,” Wirel. netw., vol. 23, no. 6, pp. 1863–1874, 2017.
  • Reference6 M. Pawar and J. Agarwal, “A literature survey on security issues of WSN and different types of attacks in network,” Indian Journal of Computer Science and Engineering, vol. 8, no. 2, pp. 80–83, 2017.
  • Reference7 M. Rmayti, Y. Begriche, R. Khatoun, L. Khoukhi, and D. Gaiti, “Flooding attacks detection in MANETs,” in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015.
  • Reference8 Q. Li, A. Malip, K. M. Martin, S.-L. Ng, and J. Zhang, “A reputation-based announcement scheme for VANETs,” IEEE Trans. Veh. Technol., vol. 61, no. 9, pp. 4095–4108, 2012.
  • Reference9 Y. Shashwat, P. Pandey, K. V. Arya, and S. Kumar, “A modified AODV protocol for preventing blackhole attack in MANETs,” Inf. Secur. J. Glob. Perspect., vol. 26, no. 5, pp. 240–248, 2017.
  • Reference10 A. Sharma and P. K. Johari, Eliminating Collaborative Black-hole Attack by Using Fuzzy Logic in Mobile Ad-hoc Network. 2017.
  • Reference11 M. Abdel-Azim, H. E. D. Salah, and M. Ibrahim, “Black Hole attack Detection using fuzzy based IDS,” International Journal of Communication Networks and Information Security, vol. 9, no. 2, 2017.
  • Reference12 A. K. Khare, J. L. Rana, and R. C. Jain, Detection of Wormhole, Blackhole and DDOS Attack in MANET using Trust Estimation under Fuzzy Logic Methodology. 2017.
  • Reference13 M. Shivhare and P. K. Gautam, “Prevention of BLACK HOLE attack in MANET Using Indexing Algorithm,” International Journal of Engineering Science, 2017.
  • Reference14 O. A. Wahab, H. Otrok, and A. Mourad, “A Dempster–Shafer based tit-for-tat strategy to regulate the cooperation in VANET using QoS-OLSR protocol,” Wirel. Pers. Commun., vol. 75, no. 3, pp. 1635–1667, 2014.
  • Reference15 O. A. Wahab, H. Otrok, and A. Mourad, “VANET QoS-OLSR: QoS-based clustering protocol for Vehicular Ad hoc Networks,” Comput. Commun., vol. 36, no. 13, pp. 1422–1435, 2013.
  • Reference16 A. Gupta, “Mitigation algorithm against black hole attack using Real Time Monitoring for AODV routing protocol in MANET,” in 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), IEEE, 2015, pp. 134–138.
  • Reference17 G. Arulkumaran and R. K. Gnanamurthy, “Fuzzy trust approach for detecting black hole attack in mobile adhoc network,” Mob. Netw. Appl., vol. 24, no. 2, pp. 386–393, 2019.
  • Reference18 Y. A. Choudhary and R. Gaikwad, “A Probabilistic black hole & gray hole attacks Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks,” International Journal of Advanced Electronics and Communication Systems, vol. 6, no. 3, 2017.
  • Reference19 P. Rathiga and S. Sathappan, “Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique,” International Journal of Applied Engineering Research, vol. 12, no. 18, pp. 7459–7465, 2017.
  • Reference20 K. Laeeq, “RFAP, a preventive measure against route request Flooding Attack in MANETS,” in 2012 15th International Multitopic Conference (INMIC), 2012.
  • Reference21 P. Choudhury, S. Nandi, A. Pal, and N. C. Debnath, “Mitigating route request flooding attack in MANET using node reputation,” in IEEE 10th International Conference on Industrial Informatics, 2012.
  • Reference22 C. Panos, C. Xenakis, P. Kotzias, and I. Stavrakakis, “A specification-based intrusion detection engine for infrastructure-less networks,” Comput. Commun., vol. 54, pp. 67–83, 2014.
  • Reference23 S. Gurung and S. Chauhan, “A novel approach for mitigating route request flooding attack in MANET,” Wirel. netw., vol. 24, no. 8, pp. 2899–2914, 2018.
  • Reference24 M. R. Hasan, Y. Zhao, Y. Luo, G. Wang, and R. M. Winter, “An effective AODV-based flooding detection and prevention for smart meter network,” Procedia Comput. Sci., vol. 129, pp. 454–460, 2018.
  • Reference25 K. Saravanan and J. Vellingiri, “Defending MANET against flooding attack for medical application,” in 2017 2nd International Conference on Communication and Electronics Systems (ICCES), 2017.
  • Reference26 K. Geetha and N. Sreenath, “Detection of SYN flooding attack in mobile ad hoc networks with AODV protocol,” Arab. J. Sci. Eng., vol. 41, no. 3, pp. 1161–1172, 2016.
  • Reference27 E. Altman and T. Jiménez, “NS simulator for beginners,” Synth. lect. commun. netw., vol. 5, no. 1, pp. 1–184, 2012.
  • Reference28 “The Network Simulator - ns-2,” Isi.edu. [Online]. Available: http://www.isi.edu/nsnam/ns/. [Accessed: 14-Sep-2022].

FA-AODV: Flooding Attacks Detection Based Ad Hoc On-Demand Distance Vector Routing Protocol for VANET

Yıl 2022, Cilt: 5 Sayı: 3, 304 - 314, 31.12.2022
https://doi.org/10.35377/saucis...1175613

Öz

Vehicular Ad-Hoc Networks (VANET) is anticipated to be the most effective way of increasing performance and safety in transportation in the near future. VANETs are the sub-branch of Ad-Hoc Networks which provide safety and comfort features together with related services for the vehicle operators. RREQ flood attack mostly encountered in the literature for security of VANET. Due to the nature of the reactive protocols, the AODV routing protocol is quite open to attack types such as flood attack. Flood attacks occur in the network layer. The impact of flood attacks is not about victim nodes, it can be also affect the whole network. A malicious attack that could be carried out in VANET could cause accidents that would cause a serious disaster. A malicious node could penetrate into the IP addresses on a Flood Attack based User Datagram Protocol (UDP) to breakdown the data communication between two vehicles. The main purpose of this paper is to detect and prevent the flood attack, during the operation of the routing protocol and to decrease the end-to-end delay on the network.

Kaynakça

  • Reference1 S.-H. Kim and I.-Y. Lee, “A secure and efficient vehicle-to-vehicle communication scheme using bloom filter in VANETs,” Int. j. secur. appl., vol. 8, no. 2, pp. 9–24, 2014.
  • Reference2 M. Y. Gadkari, “VANET: Routing protocols, security issues and simulation tools,” IOSR J. Comput. Eng., vol. 3, no. 3, pp. 28–38, 2012.
  • Reference3 N. Arulkumar and E. G. D. P. Raj, “A simulation based study to implement Intelligent Transport Systems concepts in VANETs using AODV routing protocol in NS2,” in 2012 Fourth International Conference on Advanced Computing (ICoAC), 2012.
  • Reference4 J. Zhang, “Trust management for VANETs: challenges, desired properties and future directions,” International Journal of Distributed Systems and Technologies (IJDST), vol. 3, no. 1, pp. 48–62, 2012.
  • Reference5 M. J. Faghihniya, S. M. Hosseini, and M. Tahmasebi, “Security upgrade against RREQ flooding attack by using balance index on vehicular ad hoc network,” Wirel. netw., vol. 23, no. 6, pp. 1863–1874, 2017.
  • Reference6 M. Pawar and J. Agarwal, “A literature survey on security issues of WSN and different types of attacks in network,” Indian Journal of Computer Science and Engineering, vol. 8, no. 2, pp. 80–83, 2017.
  • Reference7 M. Rmayti, Y. Begriche, R. Khatoun, L. Khoukhi, and D. Gaiti, “Flooding attacks detection in MANETs,” in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015.
  • Reference8 Q. Li, A. Malip, K. M. Martin, S.-L. Ng, and J. Zhang, “A reputation-based announcement scheme for VANETs,” IEEE Trans. Veh. Technol., vol. 61, no. 9, pp. 4095–4108, 2012.
  • Reference9 Y. Shashwat, P. Pandey, K. V. Arya, and S. Kumar, “A modified AODV protocol for preventing blackhole attack in MANETs,” Inf. Secur. J. Glob. Perspect., vol. 26, no. 5, pp. 240–248, 2017.
  • Reference10 A. Sharma and P. K. Johari, Eliminating Collaborative Black-hole Attack by Using Fuzzy Logic in Mobile Ad-hoc Network. 2017.
  • Reference11 M. Abdel-Azim, H. E. D. Salah, and M. Ibrahim, “Black Hole attack Detection using fuzzy based IDS,” International Journal of Communication Networks and Information Security, vol. 9, no. 2, 2017.
  • Reference12 A. K. Khare, J. L. Rana, and R. C. Jain, Detection of Wormhole, Blackhole and DDOS Attack in MANET using Trust Estimation under Fuzzy Logic Methodology. 2017.
  • Reference13 M. Shivhare and P. K. Gautam, “Prevention of BLACK HOLE attack in MANET Using Indexing Algorithm,” International Journal of Engineering Science, 2017.
  • Reference14 O. A. Wahab, H. Otrok, and A. Mourad, “A Dempster–Shafer based tit-for-tat strategy to regulate the cooperation in VANET using QoS-OLSR protocol,” Wirel. Pers. Commun., vol. 75, no. 3, pp. 1635–1667, 2014.
  • Reference15 O. A. Wahab, H. Otrok, and A. Mourad, “VANET QoS-OLSR: QoS-based clustering protocol for Vehicular Ad hoc Networks,” Comput. Commun., vol. 36, no. 13, pp. 1422–1435, 2013.
  • Reference16 A. Gupta, “Mitigation algorithm against black hole attack using Real Time Monitoring for AODV routing protocol in MANET,” in 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), IEEE, 2015, pp. 134–138.
  • Reference17 G. Arulkumaran and R. K. Gnanamurthy, “Fuzzy trust approach for detecting black hole attack in mobile adhoc network,” Mob. Netw. Appl., vol. 24, no. 2, pp. 386–393, 2019.
  • Reference18 Y. A. Choudhary and R. Gaikwad, “A Probabilistic black hole & gray hole attacks Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks,” International Journal of Advanced Electronics and Communication Systems, vol. 6, no. 3, 2017.
  • Reference19 P. Rathiga and S. Sathappan, “Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique,” International Journal of Applied Engineering Research, vol. 12, no. 18, pp. 7459–7465, 2017.
  • Reference20 K. Laeeq, “RFAP, a preventive measure against route request Flooding Attack in MANETS,” in 2012 15th International Multitopic Conference (INMIC), 2012.
  • Reference21 P. Choudhury, S. Nandi, A. Pal, and N. C. Debnath, “Mitigating route request flooding attack in MANET using node reputation,” in IEEE 10th International Conference on Industrial Informatics, 2012.
  • Reference22 C. Panos, C. Xenakis, P. Kotzias, and I. Stavrakakis, “A specification-based intrusion detection engine for infrastructure-less networks,” Comput. Commun., vol. 54, pp. 67–83, 2014.
  • Reference23 S. Gurung and S. Chauhan, “A novel approach for mitigating route request flooding attack in MANET,” Wirel. netw., vol. 24, no. 8, pp. 2899–2914, 2018.
  • Reference24 M. R. Hasan, Y. Zhao, Y. Luo, G. Wang, and R. M. Winter, “An effective AODV-based flooding detection and prevention for smart meter network,” Procedia Comput. Sci., vol. 129, pp. 454–460, 2018.
  • Reference25 K. Saravanan and J. Vellingiri, “Defending MANET against flooding attack for medical application,” in 2017 2nd International Conference on Communication and Electronics Systems (ICCES), 2017.
  • Reference26 K. Geetha and N. Sreenath, “Detection of SYN flooding attack in mobile ad hoc networks with AODV protocol,” Arab. J. Sci. Eng., vol. 41, no. 3, pp. 1161–1172, 2016.
  • Reference27 E. Altman and T. Jiménez, “NS simulator for beginners,” Synth. lect. commun. netw., vol. 5, no. 1, pp. 1–184, 2012.
  • Reference28 “The Network Simulator - ns-2,” Isi.edu. [Online]. Available: http://www.isi.edu/nsnam/ns/. [Accessed: 14-Sep-2022].
Toplam 28 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Bilgisayar Yazılımı, Yazılım Mimarisi, Yazılım Testi, Doğrulama ve Validasyon
Bölüm Makaleler
Yazarlar

Buğra Alp Tosunoglu 0000-0002-5712-187X

Cemal Koçak 0000-0002-8902-0934

Yayımlanma Tarihi 31 Aralık 2022
Gönderilme Tarihi 15 Eylül 2022
Kabul Tarihi 24 Ekim 2022
Yayımlandığı Sayı Yıl 2022Cilt: 5 Sayı: 3

Kaynak Göster

IEEE B. A. Tosunoglu ve C. Koçak, “FA-AODV: Flooding Attacks Detection Based Ad Hoc On-Demand Distance Vector Routing Protocol for VANET”, SAUCIS, c. 5, sy. 3, ss. 304–314, 2022, doi: 10.35377/saucis...1175613.

    Sakarya University Journal of Computer and Information Sciences in Applied Sciences and Engineering: An interdisciplinary journal of information science