Defending against packet dropping attack in vehicular ad hoc networks

被引:8
|
作者
Djahel, Soufiene [1 ]
Nait-Abdesselam, Farid [1 ]
Zhang, Zonghua [1 ]
Khokhar, Ashfaq [2 ]
机构
[1] Univ Sci & Technol Lille, CNRS, UMR 8022, LIFL IRCICA, F-59600 Lille, France
[2] Univ Illinois, Dept Elect & Comp Engn, Chicago, IL 60680 USA
关键词
VANET; MANET; OLSR security; packet dropping attack;
D O I
10.1002/sec.25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular ad hoc networks (VANETs) are becoming very popular and a promising application of the so-called mobile ad hoc networks (MANET) technology. It has attracted recently an increasing attention from many car manufacturers as well as the wireless communication research community. Despite its tremendous potential to enhance road safety and to facilitate traffic management, VANET suffers from a variety of security and privacy issues which may dramatically limit their applications. In this paper, we address the problem of packet dropping attack launched against routing protocol's control packets, which represents one of the most aggressive attacks in MANET. The aim of this attack is to force nodes in the network to choose hostile nodes as relays to disseminate the partial topological information, thereby exploiting the functionality of the routing protocol to retain control packets. In particular, in optimized link state routing (OLSR) protocol, if a collusive packet dropping attack is launched during the propagation of the topology control (TC) packets, the topology information will fail in being disseminated to the entire network, which finally results in routing disruption. This paper focuses on the packet dropping attack, launched against OLSR, where two malicious multipoint relay (MPR) nodes collude to disrupt the topology discovery process. Based on the analysis of the attacker's behavior and the attack's consequence, we propose an acknowledgement-based mechanism as a countermeasure to enhance the security of OLSR. This mechanism helps the OLSR protocol to be less vulnerable to such attack by detecting and then isolating malicious nodes in the network. The simulation results of the proposed scheme show high detection rate under various scenarios. Copyright (C) 2008 John Wiley & Sons, Ltd.
引用
收藏
页码:245 / 258
页数:14
相关论文
共 50 条
  • [31] Development of an Attack Detection Module for Vehicular Ad-hoc Networks
    Drenyovszki, Rajmund
    Johanyak, Zsolt Csaba
    18TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS, SACI 2024, 2024, : 255 - 260
  • [32] Detection and Prevention of Black Hole Attack and Sybil Attack in Vehicular Ad Hoc Networks
    Yadav, Dhananjay
    Chaubey, Nirbhay Kumar
    COMPUTING SCIENCE, COMMUNICATION AND SECURITY, COMS2 2024, 2025, 2174 : 176 - 189
  • [33] Vehicular Ad Hoc Networks
    Simic, Milan N.
    2013 11TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICES (TELSIKS), VOLS 1 AND 2, 2013, : 613 - 618
  • [34] Vehicular Ad Hoc Networks
    Pishro-Nik, Hossein
    Valaee, Shahrokh
    Nekovee, Andmaziar
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
  • [35] Vehicular Ad Hoc Networks
    Hossein Pishro-Nik
    Shahrokh Valaee
    Maziar Nekovee
    EURASIP Journal on Advances in Signal Processing, 2010
  • [36] Packet Storage Time Attack - A Novel Routing Attack in Mobile Ad hoc Networks
    Jim, Lincy Elizebeth
    Gregory, Mark A.
    2016 26TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2016, : 127 - 132
  • [37] Defense against misbehavior in anonymous vehicular ad hoc networks
    Sun, Jinyuan
    Fang, Yuguang
    AD HOC NETWORKS, 2009, 7 (08) : 1515 - 1525
  • [38] Cross-layer design for packet routing in vehicular ad hoc networks
    Wiegel, Bernhard
    Guenter, Yvonne
    Grossmann, Hans Peter
    2007 IEEE 66TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-5, 2007, : 2169 - 2173
  • [39] Measuring the Performance of Packet size and Data rate for Vehicular Ad Hoc Networks
    Park, Chan-Ki
    Cho, Kuk-Hyun
    Ryu, Min-Woo
    Cha, Si-Ho
    2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND APPLICATIONS (ICISA 2013), 2013,
  • [40] OBPF: Opportunistic Beaconless Packet Forwarding Strategy for Vehicular Ad Hoc Networks
    Qureshi, Kashif Naseer
    Abdullah, Abdul Hanan
    Lloret, Jaime
    Altameem, Ayman
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (05): : 2144 - 2165