| Literature DB >> 35271043 |
Abdul Malik1, Muhammad Zahid Khan1, Mohammad Faisal1, Faheem Khan2, Jung-Taek Seo2.
Abstract
Rapid and tremendous advances in wireless technology, miniaturization, and Internet of things (IoT) technology have brought significant development to vehicular ad hoc networks (VANETs). VANETs and IoT together play a vital role in the current intelligent transport system (ITS). However, a VANET is highly vulnerable to various security attacks due to its highly dynamic, decentralized, open-access medium, and protocol-design-related concerns. Regarding security concerns, a black hole attack (BHA) is one such threat in which the control or data packets are dropped by the malicious vehicle, converting a safe path/link into a compromised one. Dropping data packets has a severe impact on a VANET's performance and security and may cause road fatalities, accidents, and traffic jams. In this study, a novel solution called detection and prevention of a BHA (DPBHA) is proposed to secure and improve the overall security and performance of the VANETs by detecting BHA at an early stage of the route discovery process. The proposed solution is based on calculating a dynamic threshold value and generating a forged route request (RREQ) packet. The solution is implemented and evaluated in the NS-2 simulator and its performance and efficacy are compared with the benchmark schemes. The results showed that the proposed DPBHA outperformed the benchmark schemes in terms of increasing the packet delivery ratio (PDR) by 3.0%, increasing throughput by 6.15%, reducing the routing overhead by 3.69%, decreasing the end-to-end delay by 6.13%, and achieving a maximum detection rate of 94.66%.Entities:
Keywords: AODV; BHA; IoT; VANET; network security
Year: 2022 PMID: 35271043 PMCID: PMC8915007 DOI: 10.3390/s22051897
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Generic architecture of a VANET.
Figure 2Black hole attack.
Figure 3A visual representation of the impact of a BHA on VANET.
Summarized literature review.
| Author (s) and Citation | Solutions/Schemes | Strengths | Performance Metrics | Limitations |
|---|---|---|---|---|
| Hortelano et al. [ | Watchdog-based IDS | Easy to implement and applicable in any routing protocol; | False positive and false negative | The technique fails when two malicious nodes work together; a high false detection rate in a short time; generates a huge routing overhead and end-to-end (E2E) delay |
| Daeinabi et al. [ | Detecting malicious vehicle (DMV) | Detect any kind of malicious node with high promptness | PDR and packets dropped | High jitter and high E2E delay; low throughput |
| Kadam et al. [ | Detection and prevention of malicious vehicles (D&PMV) | Provides lower jitter and higher throughput compared to DMV method | Packets dropped, E2E delay, throughput, and jitter | Requires more time for processing; results in high E2E delay |
| Dhaka et al. [ | Based on new control packets: Cseq and Rseq | Provides higher PDR and is applicable in other reactive routing protocols | PDR and E2E delay | Huge routing overhead due to use of additional control packets |
| Jahan and Suman [ | Acknowledgment-based model | The model is capable of detecting any kind of malicious node | Packets dropped, throughput, packets received, and PDR | Heavy routing overhead and E2E delay; low throughput and PDR |
| Li et al. [ | Attack-resistant trust (ART) management scheme based on evaluating trustworthiness | Accurately evaluates the trustworthiness of data and nodes in VANETs; capable of detecting various DoS attacks | Precision, recall, and communication overhead | High processing overhead when the number of malicious nodes increases; cannot detect a smart BHA |
| Purohit et al. [ | Secure vehicular on-demand routing (SVODR) | The modified AODV can mitigate the impact of BHAs in VANETs | PDR, throughput, normalized routing load (NRL), E2E delay, and average path length | It cannot be employed with other protocols; using extra fields for cryptographic functions leads to a heavy routing overhead and E2E delay |
| Tyagi et al. [ | Enhanced secure AODV (ES-AODV) based on asymmetric public-key cryptography | The algorithm is simple, fast, and has a lower storage cost | Packets dropped, packet collision, E2E delay, throughput, routing overhead, and PDR | Provides security against external attacks but internal attacks may inflict havoc on the network |
| Zardari et al. [ | Dual-attack detection for a BHA and GHA (DDBG) | Provides a fast propagation rate of data and only trustworthy nodes can interact across the network | Detection rate, PDR, throughput, routing overhead, and E2E delay | Generates a huge routing overhead, which affects the throughput and PDR |
| Cherkaoui et al. [ | Use of variable control chart to detect BHA | Easy to implement and does not need any modification in the routing protocols | Throughput and E2E delay | High processing overhead and may not apply in the VANET’s environment |
| Hassan et al. [ | Intelligent detection of a black hole attack (IDBA) | Capable of detecting a BHA and the results revealed better performance compared to benchmark schemes | PDR, throughput E2E delay, packet loss ratio, and routing overhead | Generates four thresholds, which causes a high processing and routing overhead |
| Kumar et al. [ | Secure AODV | Capable of detecting malicious nodes in VANETs | PDR, throughput, and E2E delay | High routing overhead and E2E delay, resulting in a decreased throughput and PDR |
| Proposed DPBHA | Use of dynamic threshold value and forged RREQ packet | Efficiently detects and prevents a BHA in terms of reduced routing overhead and E2E delay, increased throughput, and PDR; eliminates the false positive and false negative rates with 98% accuracy; no additional hardware and IDS/DPS nodes are required | PDR, throughput, E2E delay, packet loss ratio, routing overhead, and detection ratio | The proposed DPBHA addresses BHA only and it is incapable of addressing other DoS attacks, such as cooperative BHA and GHA, which will be addressed in future research work |
Figure 4The framework of DPBHA.
Figure 5The mobility model of vehicles.
Notations and their descriptions.
| Symbol | Description |
|---|---|
| N | Node: vehicle or RSU |
| S | Source node |
| D | Destination node |
| E | Edge |
| T | Timer |
| V | Vehicle |
|
| Neighboring node |
|
| Next-hop node |
|
| Routing table |
|
| Speed of neighboring node |
| ID | Identity of a node |
| G | Gray list |
| B | Black list |
| RREQ | Route request |
| RREP | Route reply |
|
| Transmission range |
|
| Standard deviation |
|
| Probability density function of a vehicle’s velocity |
|
|
|
|
| Mean value |
|
| The density of vehicles |
|
| Threshold value (sequence numbers) |
| Variables |
Figure 6A scenario demonstrating the detection phase.
RAT with the normal and malicious nodes’ RREPs.
|
|
|
|
|---|---|---|
| 1 | 400 | 1 |
| D | 95 | 1 |
| 8 | 80 | 4 |
| 5 | 75 | 2 |
The format of a forged RREQ packet.
| Packet Type | Flags | Reserved | Hop Count |
| RREQ (Broadcast) ID | |||
|
| |||
| Destination Sequence Number | |||
| Originator IP Address | |||
Figure 7A scenario demonstrating the prevention phase.
Figure 8Flowchart of the proposed DPBHA.
Simulation parameters.
| S. No. | Parameters | Values |
|---|---|---|
| 1. | Simulation tool | NS-2.35 |
| 2. | Simulation area | 1000 m × 1000 m |
| 3. | Number of nodes | 25, 50, 75, 100, 125, 150 |
| 4. | Simulation time | 900 s |
| 5. | Vehicle mobility | 1 km/h–100 km/h |
| 6. | Routing protocols | AODV |
| 7. | Standard protocol | 802.11p |
| 8. | Black hole nodes | 2, 4, 6, 8, 10, 12 |
| 9. | Transport protocol | UDP |
| 10. | Packet size (bytes) | 512 b/s |
| 11. | Type of traffic | CBR (1 Mbps) |
| 12. | Antenna | Omni-directional |
Figure 9Initial state of the first experiment.
Figure 10Graphical representation of routing overhead.
Figure 11Graphical representation of packet delivery ratio.
Figure 12Graphical representation of average throughput.
Figure 13Graphical representation of end-to-end delay.
Figure 14Graphical representation of packet loss rate.
Confusion matrix.
| Actual Reality Class | |||
|---|---|---|---|
|
| Class | Attack | Normal |
| Attack | True positive (TP) | False positive (FP) | |
| Normal | False negative (FN) | True negative (TN) | |
Detection ratio evaluation values.
| No. of Nodes | Malicious Nodes | TPR of AODV | TPR of SAODV | TPR of IDBA | TPR of DPBHA |
|---|---|---|---|---|---|
| 25 | 2 | 00.0% | 90.0% | 95.0% | 100% |
| 50 | 4 | 00.0% | 87.5% | 92.5% | 97.5% |
| 75 | 6 | 00.0% | 85.0% | 90.0% | 95.0% |
| 100 | 8 | 00.0% | 82.5% | 87.5% | 93.7% |
| 125 | 10 | 00.0% | 80.0% | 85.0% | 91.0% |
| 150 | 12 | 00.0% | 76.6% | 83.3% | 90.8% |
Figure 15Graphical representation of detection rate.
Example of an accuracy rate calculation.
| Total No. of Nodes = 75 | Real Class | Predictive Value | ||
|---|---|---|---|---|
| Attacker = 06 | Normal = 69 | |||
|
| Attacker = 5 | True Positive = 5 | False Positive = 0 | Positive Predictive Value |
| Normal = 70 | False Negative = 5 | True Negative = 69 | Negative Predictive Value | |
|
| Sensitivity | Specificity |
| |