Lightweight Detection and Isolation of Black Hole Attacks in Connected Vehicles

Connected Vehicles (CVs) can be exposed to black hole attacks that deceive legitimate nodes by falsifying an attractive route to a destination node. This occurs when an attacker sends a packet to the source node confirming the existence of a fresh route. In this paper, we propose a Black Hole Detection Protocol (BlackDP) that works on a highway divided into clusters and monitored by Road Side Units (RSUs) to detect both single and cooperative black hole attacks. Every RSU is tasked with performing both detection and isolation of black hole attacks for their respective highway section after authentication violations and suspicious route establishment activities that have been reported by a legitimate node. The design goal of BlackDP is to decouple the detection process from mobile nodes and construct a trusted semi-centric detection process that can collect needed information for lightweight detection and reliable isolation of malicious nodes. We validate BlackDP in a simulated highway environment to demonstrate its effectiveness.

[1]  Keecheon Kim,et al.  Secure Route Discovery for Preventing Black Hole Attacks on AODV-Based MANETs , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[2]  Huirong Fu,et al.  Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.

[3]  Zdravko Karakehayov Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks , 2005 .

[4]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[5]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[6]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[7]  Santosh S. Sambare,et al.  Detecting and Overcoming Blackhole Attack in AODV Protocol , 2013, 2013 International Conference on Cloud & Ubiquitous Computing & Emerging Technologies.

[8]  Jaydip Sen Detection of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2013, ArXiv.

[9]  M. Gajera Prevention of Black Hole Attack in Secure Routing Protocol , 2013 .

[10]  Yan Zhang,et al.  Vehicular Networks: Techniques, Standards, and Applications , 2009 .

[11]  Pabitra Mohan Khilar,et al.  Securing AODV Routing Protocol in MANET Based on Cryptographic Authentication Mechanism , 2011 .

[12]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[13]  R. H. Jhaveri,et al.  A Novel Approach for GrayHole and BlackHole Attacks in Mobile Ad Hoc Networks , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[14]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[15]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[16]  Rakesh Kumar,et al.  Prevention of Black Hole Attacks in MANETs , 2018 .

[17]  Ming-Yang Su,et al.  Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..

[18]  Jérôme Haerri,et al.  Performance comparison of AODV and OLSR in VANETs urban environments under realistic mobility patterns , 2006 .

[19]  Kwok-Yan Lam,et al.  SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack , 2009, 2009 International Conference on Computational Intelligence and Security.

[20]  Sami Muhaidat,et al.  Cooperative cross layer detection for blackhole attack in VANET-OLSR , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).

[21]  Marcelo G. Rubinstein,et al.  Routing Metrics and Protocols for Wireless Mesh Networks , 2008, IEEE Network.

[22]  Kurnool,et al.  Prevention of Black Hole Attack in MANET , 2015 .

[23]  Al-Sakib Khan Pathan Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .