Machine Learning Based Approach to Detect Wormhole Attack in VANETs

VANET is one of the key enabling technologies for connected and autonomous vehicles (CAVs). In a vehicular plane of the VANETs, vehicles communicate with each other for various safety and non-safety applications. In future, the autonomous CAVs communication will not only be of type broadcast but also unicast in nature using multi-hop communication. Both broadcast and unicast multi-hop communication of VANETs are vulnerable to various types of attacks such as Denial of Service (DoS), message falsification, Sybil attack, Greyhole, Blackhole, and Wormhole attack. This paper aims to utilize the power of machine learning to detect wormhole attack in multi-hop communication of VANETs. Although various mechanisms have been proposed in the literature to detect this attack, the ML-based approach for wormhole has not been explored. To model the attack in VANET, we create a scenario of multi-hop communication using AODV routing protocol on NS3 simulator that uses the mobility traces generated by the SUMO traffic simulator. We run the simulation and collect the statistics generated using the flow monitor tool. These collected traces are preprocessed, and then k-NN and SVM are applied on this preprocessed file to make the model learn of wormhole attack. The performance of these two machine learning models is compared in terms of detection accuracy and four alarm types. Our study demonstrates that ML is a powerful tool, which can help deal with such attacks in a multi-hop communication of future generation CAVs.

[1]  N. Altman An Introduction to Kernel and Nearest-Neighbor Nonparametric Regression , 1992 .

[2]  Sukumar Nandi,et al.  Misbehavior Detection in C-ITS Using Deep Learning Approach , 2018, ISDA.

[3]  Vijay Laxmi,et al.  Machine Learning Approach for Multiple Misbehavior Detection in VANET , 2011, ACC.

[4]  Pascal Lorenz,et al.  An adaptive approach for information dissemination in Vehicular Ad hoc Networks , 2011, Journal of Network and Computer Applications.

[5]  Sukumar Nandi,et al.  Multipath TCP for V2I communication in SDN controlled small cell deployment of smart city , 2019, Veh. Commun..

[6]  Je-Won Kang,et al.  Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security , 2016, PloS one.

[7]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[8]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[9]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[10]  Daniel Krajzewicz,et al.  SUMO - Simulation of Urban MObility An Overview , 2011 .

[11]  Isabelle Guyon,et al.  An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..

[12]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[13]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[14]  Khattab M. Ali Alheeti,et al.  Intelligent Intrusion Detection of Grey Hole and Rushing Attacks in Self-Driving Vehicular Networks , 2016, Comput..

[15]  Nathalie Japkowicz,et al.  Anomaly Detection in Automobile Control Network Data with Long Short-Term Memory Networks , 2016, 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA).

[16]  Georgia Sakellari,et al.  Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning , 2018, IEEE Access.

[17]  Issa M. Khalil,et al.  LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks , 2007, Comput. Networks.

[18]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[19]  Corinna Cortes,et al.  Support-Vector Networks , 1995, Machine Learning.

[20]  Erik M. Fredericks,et al.  Detection and Avoidance of Wormhole Attacks in Connected Vehicles , 2017, DIVANet@MSWiM.