Message Fabrication Detection Model based on Reactive Protocols in VANET

Fadlallah Chbib, W. Fahs, Jamal Haydar, L. Khoukhi, R. Khatoun
{"title":"Message Fabrication Detection Model based on Reactive Protocols in VANET","authors":"Fadlallah Chbib, W. Fahs, Jamal Haydar, L. Khoukhi, R. Khatoun","doi":"10.1109/CSNet50428.2020.9265458","DOIUrl":null,"url":null,"abstract":"The ever-increasing necessity to manage various issues in road mobility led to the growth of Vehicular Ad hoc Networks (VANETs). Nowadays, VANETs has the potential to improve vehicle and road safety, traffic efficiency, convenience, as well as comfort to both drivers and passengers. Vehicular communication is exposed to several vulnerabilities such as Denial of Service attacks (DOS), Blackhole, Grey hole and fabrication attacks. Among the most known attacks are the fabrication attacks. Fabrication attack consists of a malicious node that modifies information in the packet that causes critical damage in the network like congestion and high delay. In this paper, we propose a new fabrication model which consist of two algorithms attack and anti-attack. In this attack, the malicious node fabricates the content of the message; in other words, the destination address of the input packet is replaced by another one. In the antiattack, our new proposed algorithm has the role to detect the fabrication attack during the communication. It continuously checks the buffer of each node so that the input destination address must be the same as the output destination address; otherwise, the node is identified as malicious and a message is sent to other nodes to remove it from their routing table. The proposed algorithm aims to minimize the delay of packets. We use Network Simulator NS-2.35 to implement and evaluate the performance of the proposed algorithms. The results show good improvements in terms of packet delivery ratio and the end to end delay.","PeriodicalId":234911,"journal":{"name":"2020 4th Cyber Security in Networking Conference (CSNet)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 4th Cyber Security in Networking Conference (CSNet)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSNet50428.2020.9265458","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

The ever-increasing necessity to manage various issues in road mobility led to the growth of Vehicular Ad hoc Networks (VANETs). Nowadays, VANETs has the potential to improve vehicle and road safety, traffic efficiency, convenience, as well as comfort to both drivers and passengers. Vehicular communication is exposed to several vulnerabilities such as Denial of Service attacks (DOS), Blackhole, Grey hole and fabrication attacks. Among the most known attacks are the fabrication attacks. Fabrication attack consists of a malicious node that modifies information in the packet that causes critical damage in the network like congestion and high delay. In this paper, we propose a new fabrication model which consist of two algorithms attack and anti-attack. In this attack, the malicious node fabricates the content of the message; in other words, the destination address of the input packet is replaced by another one. In the antiattack, our new proposed algorithm has the role to detect the fabrication attack during the communication. It continuously checks the buffer of each node so that the input destination address must be the same as the output destination address; otherwise, the node is identified as malicious and a message is sent to other nodes to remove it from their routing table. The proposed algorithm aims to minimize the delay of packets. We use Network Simulator NS-2.35 to implement and evaluate the performance of the proposed algorithms. The results show good improvements in terms of packet delivery ratio and the end to end delay.
基于响应式协议的VANET消息伪造检测模型
管理道路移动中各种问题的必要性日益增加,导致了车辆自组织网络(vanet)的增长。如今,VANETs有潜力改善车辆和道路安全、交通效率、便利性以及驾驶员和乘客的舒适度。车辆通信暴露在拒绝服务攻击(DOS)、黑洞攻击、灰洞攻击和伪造攻击等漏洞中。最著名的攻击是伪造攻击。伪造攻击由一个恶意节点组成,它修改数据包中的信息,从而对网络造成严重损害,如拥塞和高延迟。本文提出了一种由攻击和反攻击两种算法组成的新型制作模型。在这种攻击中,恶意节点伪造消息的内容;换句话说,输入数据包的目的地址被另一个地址替换。在反攻击方面,我们提出的算法具有检测通信过程中伪造攻击的作用。它连续检查每个节点的缓冲区,使输入目的地址必须与输出目的地址相同;否则,该节点将被识别为恶意节点,并向其他节点发送消息,将其从路由表中删除。该算法的目标是最小化数据包的延迟。我们使用网络模拟器NS-2.35来实现和评估所提出算法的性能。结果表明,该方法在分组传送率和端到端延迟方面都有较好的改善。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信