GDVAN: A New Greedy Behavior Attack Detection Algorithm for VANETs

Vehicular Ad hoc Networks (VANETs), whose main objective is to provide road safety and enhance the driving conditions, are exposed to several kinds of attacks such as Denial of Service (DoS) attacks which affect the availability of the underlying services for legitimate users. We focus especially on the greedy behavior which has been extensively addressed in the literature for Wireless LAN (WLAN) and for Mobile Ad hoc Networks (MANETs). However, this attack has been much less studied in the context of VANETs. This is mainly because the detection of a greedy behavior is much more difficult for high mobility networks such as VANETs. In this paper, we propose a new detection approach called GDVAN (Greedy Detection for VANETs) for greedy behavior attacks in VANETs. The process to conduct the proposed method mainly consists of two phases, which are namely the suspicion phase and the decision phase. The suspicion phase is based on the linear regression mathematical concept while decision phase is based on a fuzzy logic decision scheme. The proposed algorithm not only detects the existence of a greedy behavior but also establishes a list of the potentially compromised nodes using three newly defined metrics. In addition to being passive, one of the major advantages of our technique is that it can be executed by any node of the network and does not require any modification of the IEEE 802.11p standard. Moreover, the practical effectiveness and efficiency of the proposed approach are corroborated through simulations and experiments.

[1]  Juan-Carlos Cano,et al.  A survey and comparative study of simulators for vehicular ad hoc networks (VANETs) , 2011, Wirel. Commun. Mob. Comput..

[2]  Stephen B. Wicker,et al.  Stability of multipacket slotted Aloha with selfish users and perfect information , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[3]  Stephen Yurkovich,et al.  Fuzzy Control , 1997 .

[4]  Kun-Chan Lan,et al.  Rapid Generation of Realistic Mobility Models for VANET , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[5]  G. H. Raisoni,et al.  Survey on security challenges in VANET Survey on security challenges in VANET Survey on security challenges in VANET Survey on security challenges in VANET , 2013 .

[6]  Nitin H. Vaidya,et al.  Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..

[7]  John S. Baras,et al.  Evaluation of Detection Algorithms for MAC Layer Misbehavior: Theory and Experiments , 2009, IEEE/ACM Transactions on Networking.

[8]  Mohamed Hamdi,et al.  Recent advances in cryptographic solutions for vehicular networks , 2015, 2015 International Symposium on Networks, Computers and Communications (ISNCC).

[9]  Jerzy Konorski,et al.  Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations , 2002, NETWORKING.

[10]  Jalel Ben-Othman,et al.  Detecting greedy behavior by linear regression and watchdog in vehicular ad hoc networks , 2014, 2014 IEEE Global Communications Conference.

[11]  K. Psounis,et al.  IEEE 802.11p performance evaluation and protocol enhancement , 2008, 2008 IEEE International Conference on Vehicular Electronics and Safety.

[12]  Xiaodong Wang,et al.  Robust detection of selfish misbehavior in wireless networks , 2007, IEEE Journal on Selected Areas in Communications.

[13]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[14]  Robert LIN,et al.  NOTE ON FUZZY SETS , 2014 .

[15]  Jalel Ben-Othman,et al.  Detecting Greedy Behaviors by Linear Regression in Wireless Ad Hoc Networks , 2009, 2009 IEEE International Conference on Communications.

[16]  Yun-Pang Wang,et al.  Simulation of Urban Mobility , 2013, Lecture Notes in Computer Science.

[17]  G. H. Raisoni,et al.  Survey on security challenges in VANET Survey on security challenges in VANET Survey on security challenges in VANET Survey on security challenges in VANET , 2013 .

[18]  Maxim Raya,et al.  DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.

[19]  George J. Klir,et al.  Fuzzy sets and fuzzy logic - theory and applications , 1995 .

[20]  Soufiene Djahel,et al.  FLSAC: A new scheme to defend against greedy behavior in wireless mesh networks , 2009, Int. J. Commun. Syst..

[21]  Jelena V. Misic,et al.  DDoS attack on WAVE-enabled VANET through synchronization , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[22]  Sherali Zeadally,et al.  Vehicular ad hoc networks (VANETS): status, results, and challenges , 2010, Telecommunication Systems.

[23]  Dimitar P. Filev,et al.  Fuzzy SETS AND FUZZY LOGIC , 1996 .

[24]  John S. Baras,et al.  Detection and prevention of MAC layer misbehavior in ad hoc networks , 2004, SASN '04.

[25]  Jun Luo,et al.  A Survey of Inter-Vehicle Communication , 2004 .

[26]  Jalel Ben-Othman,et al.  Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..

[27]  Kartik Gopalan,et al.  Urban Mobility Models for VANETs , 2006 .

[28]  Amit Kumar Saha,et al.  Modeling mobility for vehicular ad-hoc networks , 2004, VANET '04.

[29]  Jean-Yves Le Boudec,et al.  A test-bed for misbehavior detection in mobile ad-hoc networks - how much can watchdogs really do? , 2004, Sixth IEEE Workshop on Mobile Computing Systems and Applications.