Variable control chart for detecting black hole attack in vehicular ad-hoc networks

The nature of VANET networks makes the network vulnerable to several attacks such as the black hole attack which is part of Denial of Service attacks (DOS). The aim of these attacks is to prohibit users from using one or more services by making the communication unavailable. In this sense and during the routing process, the malicious node tries to acquire the route by forging routing information in order to receive the data and then drops it without transferring it to its destination. In this paper, we propose a novel detection method of such attack during communication in a VANET network. This method is based on a variable control chart which is widely used in the industrial field to monitor the quality of a given process. This method can identify malicious nodes in real time by deploying the monitoring system in each receiving node within the network. Our method is easy to implement and does not require any modification to the 802.11p standard or the routing protocol as we will demonstrate by NS-2 simulations and SUMO microscopic and continuous road traffic simulator using a real map.

[1]  Mohammed Erritali,et al.  A Clustering Algorithm for Detecting and Handling Black Hole Attack in Vehicular Ad Hoc Networks , 2017 .

[2]  Sanjay Jasola,et al.  Mitigation and Performance Analysis of Routing Protocols Under Black-Hole Attack in Vehicular Ad-hoc Network (VANET) , 2017, Wirel. Pers. Commun..

[3]  Sevil Sen,et al.  A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV , 2017, Ad Hoc Networks.

[4]  Abderrahmane Baadache,et al.  Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks , 2014, Comput. Networks.

[5]  Sami Muhaidat,et al.  Novel cross layer detection schemes to detect blackhole attack against QoS-OLSR protocol in VANET , 2016, Veh. Commun..

[6]  Mohammad Ali Jabraeil Jamali,et al.  EAODV: detection and removal of multiple black hole attacks through sending forged packets in MANETs , 2019, J. Ambient Intell. Humaniz. Comput..

[7]  John S. Oakland,et al.  Statistical Process Control , 2018 .

[8]  L. H. C. Tippett,et al.  ON THE EXTREME INDIVIDUALS AND THE RANGE OF SAMPLES TAKEN FROM A NORMAL POPULATION , 1925 .

[9]  Byung kwan Lee,et al.  A Black Hole Detection Protocol Design based on a Mutual Authentication Scheme on VANET , 2016, KSII Trans. Internet Inf. Syst..

[10]  Moneeb Gohar,et al.  Cognitive radio assisted WSN with interference aware AODV routing protocol , 2019, J. Ambient Intell. Humaniz. Comput..

[11]  Yun-Pang Wang,et al.  Simulation of Urban Mobility , 2013, Lecture Notes in Computer Science.

[12]  Jingsha He,et al.  A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs , 2019, Future Internet.

[13]  Anis Laouiti,et al.  VANet security challenges and solutions: A survey , 2017, Veh. Commun..

[14]  Mohammed Erritali,et al.  Quality Control Chart for Detecting the Black Hole Attack in Vehicular Ad-hoc Networks , 2017, EUSPN/ICTH.

[15]  Hans Nørgaard Hansen,et al.  Tolerance analysis in manufacturing using process capability ratio with measurement uncertainty , 2017 .

[16]  Mohammed Erritali,et al.  Black Hole Attack Detection in Vehicular Ad Hoc Networks Using Statistical Process Control , 2017 .

[17]  Jalel Ben-Othman,et al.  Analysis and simulation of MAC layer misbehavior in mobile ad-hoc networks , 2014, 2014 5th Workshop on Codes, Cryptography and Communication Systems (WCCCS).

[18]  Winston Khoon Guan Seah,et al.  Security threats and solutions in MANETs: A case study using AODV and SAODV , 2012, J. Netw. Comput. Appl..

[19]  K. Saravanan,et al.  FD-AOMDV: fault-tolerant disjoint ad-hoc on-demand multipath distance vector routing algorithm in mobile ad-hoc networks , 2018, J. Ambient Intell. Humaniz. Comput..

[20]  P. U. Dere,et al.  Performance Analysis of AODV and DSDV Routing Protocol in MANET and Modifications in AODV against Black Hole Attack , 2016 .

[21]  C. N. Sminesh,et al.  A Novel Approach for Detection of Single and Collaborative Black Hole Attacks in MANET , 2016 .

[22]  G. Pfeiffer Analytical Quality Control , 1984 .

[23]  Mahamod Ismail,et al.  Vehicular communication ad hoc routing protocols: A survey , 2014, J. Netw. Comput. Appl..

[24]  Jalel Ben-Othman,et al.  Real-time detection of MAC layer misbehavior in mobile ad hoc networks , 2017 .