Dynamic Defense Strategy Against DoS Attacks Over Vehicular Ad Hoc Networks Based on Port Hopping

To fight against denial of services (DoS) attacks on vehicular ad hoc networks, which can cause congestion over networks and degrading the user’s experience, a lot of detective techniques and schemes have been proposed. However, the complex ones cannot keep pace with the growth of vehicle networks. In this paper, we propose a simple but effective defense strategy scheme inspired by the port-hopping mechanism, which advantage is manifested in that the detection and filtering off of malicious packets launched by attackers can be achieved without any change in existing protocol. First, we design a dynamic defense strategy scheme to puzzle a DoS attacker, where the specific defense strategy will change according to a scheme of time. To mitigate the losses caused by an attacker whose goal is to probe the vulnerable services’ ports contained in the UDP/TCP headers between vehicle-to-vehicle or vehicle-to-infrastructure, we add some security services’ ports that are valueless to attackers. Second, we give the specific construction of such a defense strategy scheme reflected as a matrix and a security analysis with respect to detecting the probed ports. At last, in comparison with the non-strategy defense scheme, simulations considering some parameters are conducted, which can show that our scheme is an effective defense scheme used for protecting VANETs.

[1]  Lei Guo,et al.  Temporal, Functional and Spatial Big Data Computing Framework for Large-Scale Smart Grid , 2019, IEEE Transactions on Emerging Topics in Computing.

[2]  Warnakulasuriya Anil Chandana Fernando,et al.  Prediction of DoS attacks in external communication for self-driving vehicles using a fuzzy petri net model , 2016, 2016 IEEE International Conference on Consumer Electronics (ICCE).

[3]  Emmanuel J. Candès,et al.  Decoding by linear programming , 2005, IEEE Transactions on Information Theory.

[4]  Hsiao-Hwa Chen,et al.  Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Vehicular Technology.

[5]  E. Candès The restricted isometry property and its implications for compressed sensing , 2008 .

[6]  Joel A. Tropp,et al.  Signal Recovery From Random Measurements Via Orthogonal Matching Pursuit , 2007, IEEE Transactions on Information Theory.

[7]  MengChu Zhou,et al.  A Privacy-Preserving Message Forwarding Framework for Opportunistic Cloud of Things , 2018, IEEE Internet of Things Journal.

[8]  Tarek Saadawi,et al.  DoS attack detection in Internet-connected vehicles , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).

[9]  Radhika M. Pai,et al.  Mitigation of insider and outsider DoS attack against signature based authentication in VANETs , 2014, 2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE).

[10]  Feng Xia,et al.  Green and Sustainable Cloud of Things: Enabling Collaborative Edge Computing , 2019, IEEE Communications Magazine.

[11]  Yue-Bin Luo,et al.  Effectiveness of Port Hopping as a Moving Target Defense , 2014, 2014 7th International Conference on Security Technology.

[12]  Balas K. Natarajan,et al.  Sparse Approximate Solutions to Linear Systems , 1995, SIAM J. Comput..

[13]  Kim-Kwang Raymond Choo,et al.  Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds , 2016, Journal of Medical Systems.

[14]  P. Vasudeva Reddy,et al.  Efficient Pairing-Free Certificateless Authentication Scheme With Batch Verification for Vehicular Ad-Hoc Networks , 2018, IEEE Access.

[15]  H.C.J. Lee,et al.  Port hopping for resilient networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[16]  Lei Guo,et al.  Quick Answer for Big Data in Sharing Economy: Innovative Computer Architecture Design Facilitating Optimal Service-Demand Matching , 2018, IEEE Transactions on Automation Science and Engineering.

[17]  Joel A. Tropp,et al.  Greed is good: algorithmic results for sparse approximation , 2004, IEEE Transactions on Information Theory.

[18]  Vijay Sivaraman,et al.  Smart IoT Devices in the Home: Security and Privacy Implications , 2018, IEEE Technology and Society Magazine.

[19]  Emmanuel J. Candès,et al.  Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.

[20]  Lei Wang,et al.  Offloading in Internet of Vehicles: A Fog-Enabled Real-Time Traffic Management System , 2018, IEEE Transactions on Industrial Informatics.

[21]  MengChu Zhou,et al.  A Cooperative Quality-Aware Service Access System for Social Internet of Vehicles , 2018, IEEE Internet of Things Journal.

[22]  Dong Hoon Lee,et al.  Reliable Cooperative Authentication for Vehicular Networks , 2018, IEEE Transactions on Intelligent Transportation Systems.

[23]  David L Donoho,et al.  Compressed sensing , 2006, IEEE Transactions on Information Theory.

[24]  Stefan Savage,et al.  Inferring Internet denial-of-service activity , 2001, TOCS.

[25]  Pierluigi Pisu,et al.  Resilient control strategy under Denial of Service in connected vehicles , 2017, 2017 American Control Conference (ACC).

[26]  Xue Chen,et al.  Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption , 2020, IEEE Transactions on Services Computing.

[27]  Jianfeng Ma,et al.  A Privacy-Preserving Mutual Authentication Resisting DoS Attacks in VANETs , 2017, IEEE Access.

[28]  Bogdan Groza,et al.  Security Solutions for the Controller Area Network: Bringing Authentication to In-Vehicle Networks , 2018, IEEE Vehicular Technology Magazine.

[29]  Simin Nadjm-Tehrani,et al.  Attitudes and Perceptions of IoT Security in Critical Societal Services , 2016, IEEE Access.

[30]  Jun Huang,et al.  Vehicular Fog Computing: Enabling Real-Time Traffic Management for Smart Cities , 2019, IEEE Wireless Communications.

[31]  Kaishun Wang,et al.  Singular linear space and its applications , 2011, Finite Fields Their Appl..

[32]  Kim-Kwang Raymond Choo,et al.  Secure Range Search Over Encrypted Uncertain IoT Outsourced Data , 2019, IEEE Internet of Things Journal.

[33]  Neera Batra,et al.  Prevention of denial of service attack over vehicle ad hoc networks using quick response table , 2017, 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC).

[34]  Cheng Guo,et al.  Key-Aggregate Authentication Cryptosystem for Data Sharing in Dynamic Cloud Storage , 2017, 2017 14th International Symposium on Pervasive Systems, Algorithms and Networks & 2017 11th International Conference on Frontier of Computer Science and Technology & 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC).

[35]  Xiangjie Kong,et al.  A Social-Aware Group Formation Framework for Information Diffusion in Narrowband Internet of Things , 2018, IEEE Internet of Things Journal.

[36]  Wei Hu,et al.  RPAH: A Moving Target Network Defense Mechanism Naturally Resists Reconnaissances and Attacks , 2017, IEICE Trans. Inf. Syst..

[37]  张连成,et al.  A Port Hopping Based DoS Mitigation Scheme in SDN Network , 2016 .

[38]  Stephen J. Dilworth,et al.  Explicit constructions of RIP matrices and related problems , 2010, ArXiv.