Open Access Open Access  Restricted Access Subscription or Fee Access

Black Hole Attack Detection in Vehicular Ad Hoc Networks Using Statistical Process Control

Badreddine Cherkaoui(1*), Abderrahim Beni-hssane(2), Mohammed Erritali(3)

(1) LAROSERI Laboratory, Computer Science Department, Sciences Faculty, Chouaïb Doukkali University, Morocco
(2) LAROSERI Laboratory, Computer Science Department, Sciences Faculty, Chouaïb Doukkali University, Morocco
(3) TIAD Laboratory, Computer Science Department, Sciences and Technics Faculty, University of Sultan Moulay Slimane, Morocco
(*) Corresponding author


DOI: https://doi.org/10.15866/irecap.v7i3.12259

Abstract


A vehicular ad-hoc network (VANET) is a communication network designed to make vehicles communicate with each other in order to exchange useful information that makes driving easier. This communication is exposed to several vulnerabilities such as Denial of Service attacks (DOS). Among the most known attacks are the Black Hole attacks. A malicious user who performs the attack can intercept the data and destroys it without forwarding it to their destination. This can cause a serious damage when the information concerns a serious incident. In this paper, we propose a new method to detect the black hole attack during communication in a VANET environment using a statistical process control (SPC). The proposed method operates in real time by monitoring network activity with graphical representations to detect abnormal deviations.
Copyright © 2017 Praise Worthy Prize - All rights reserved.

Keywords


VANET; Black Hole Attack; NS2; Statistical Process Control

Full Text:

PDF


References


H. Hasrouny, A.Samhat, C.Bassil, A.Laouiti, VANET security challenges and solutions: A survey, Vehicular Communications, Volume 7, January 2017, Pages 7-20.
http://dx.doi.org/10.1016/j.vehcom.2017.01.002

The Association for Safe International Road Travel, www.asirt.org
http://dx.doi.org/10.1787/9789264175518-sum-pt

S. S. Manvi, S.Tangade, A survey on authentication schemes in VANETs for secured communication, Vehicular Communications, Volume 9, July 2017, Pages 19-30.
http://dx.doi.org/10.1016/j.vehcom.2017.02.001

Jaradat, Y., Masoud, M., Jannoud, I., Azzawi, H., Basic Review of Low Rate Denial of Service Attack on Wired and Wireless Networks, (2016) International Journal on Communications Antenna and Propagation (IRECAP), 6 (6), pp. 390-399.
http://dx.doi.org/10.15866/irecap.v6i6.10932

F.Sakiz, S. Sen, A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV, Ad Hoc Networks, Volume 61, June 2017, Pages 33-50.
http://dx.doi.org/10.1016/j.adhoc.2017.03.006

X. Liu, Z. Li, P. Yang, Y. Dong, Information-centric mobile ad hoc networks and content routing: A survey, Ad Hoc Networks, Volume 58, April 2017, Pages 255-268.
http://dx.doi.org/10.1016/j.adhoc.2016.04.005

J.M. García-Campos, J. Sánchez-García, D.G. Reina, S.L. Toral, F. Barrero, An evaluation methodology for reliable simulation based studies of routing protocols in VANETs, Simulation Modelling Practice and Theory, Volume 66, August 2016, Pages 139-165.
http://dx.doi.org/10.1016/j.simpat.2016.04.002

M. Omar, S. Hedjaz, S.Rebouh, K.Aouchar, B.Abbache, A. Tari, On-demand source routing with reduced packets protocol in mobile ad-hoc networks, AEU - International Journal of Electronics and Communications, Volume 69, Issue 10, October 2015, Pages 1429-1436.
http://dx.doi.org/10.1016/j.aeue.2015.06.009

S.A. Abid and al., A Survey on DHT-Based Routing for Large-Scale Mobile Ad Hoc Networks, ACM Computing Surveys, Vol. 47, No. 2, Article 20, 2014.
http://dx.doi.org/10.1145/2632296

A.A.A. Radwan, T.M. Mahmoud, E.H. Houssein, Evaluation comparison of some ad hoc networks routing protocols, Egyptian Informatics Journal, Volume 12, Issue 2, July 2011, Pages 95-106.
http://dx.doi.org/10.1016/j.eij.2011.04.001

B. Cherkaoui, A. Beni-hssane, M. Erritali, A clustering algorithm for detecting and handling black hole attack in vehicular ad hoc networks, Europe and MENA Cooperation Advances in Information and Communication Technologies, January 2017, Pages 481-490.
http://dx.doi.org/10.1007/978-3-319-46568-5_49

K.S. Praveen, H.L. Gururaj, B. Ramesh, Comparative Analysis of Black Hole Attack in Ad Hoc Network Using AODV and OLSR Protocols, Procedia Computer Science, Volume 85, 2016, Pages 325-330.
http://dx.doi.org/10.1016/j.procs.2016.05.240

Zougagh, H., Toumanari, A., Latif, R., Idboufker, N., A New Solution to Defend Against Cooperative Black Hole Attack in Optimized Link State Routing Protocol, (2013) International Review on Computers and Software (IRECOS), 8 (2), pp. 519-526.

Su M.-Y, Prevention of selective black hole attacks on mobile ad hoc networks throughintrusion detection systems. Computer Communication 34, Pages 107–117 (2011).
http://dx.doi.org/10.1016/j.comcom.2010.08.007

S. Tan and K. Kim, Secure Route Discovery for Preventing Black Hole Attacks on AODV-based MANETs, International Conference on ICT Convergence 2013, Pages 1027- 1032.
http://dx.doi.org/10.1109/ictc.2013.6675546

R. Khatoun, P. Gu, R. Doulami, L. Khoukhi and A. Serhrouchni, A Reputation System for Detection of Black HoleAttack in Vehicular Networking, International Conference on Cyber Security of Smart cities, Industrial Control System and Communications 2015.
http://dx.doi.org/10.1109/ssic.2015.7245328

C.Panos, C.Ntantogian, S.Malliaros, C.Xenakis, Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks, Computer Networks, Volume 113, 11 February 2017, Pages 94-110.
http://dx.doi.org/10.1016/j.comnet.2016.12.006

D. Dave, P. Dave, An Effective Black Hole Attack Detection Mechanism using Permutation Based Acknowledgement in MANET, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Pages: 1690 – 1696.
http://dx.doi.org/10.1109/icacci.2014.6968417

SUMO http://sumo.sourceforge.net/

The Network Simulator NS-2 version 2.35 http://www.isi.edu/nsnam/ns/index.html

S. R. Afzal, S.Stuijk, M.Nabi, T.Basten, Effective link quality estimation as a means to improved end-to-end packet delivery in high traffic mobile ad hoc networks, Digital Communications and Networks 2016.
http://dx.doi.org/10.1016/j.dcan.2016.12.001

M. El Houssaini, A. Aaroud, A. El Hore, J. Ben-Othman, Detection of Jamming Attacks in Mobile Ad Hoc Networks usingStatistical Process Control, The 7th International Conference on Ambient Systems, Networks and Technologies (ANT 2016), Procedia Computer Science Volume 83 ( 2016 ) Pages 26 – 33.
http://dx.doi.org/10.1016/j.procs.2016.04.095

William H. Woodall, The Statistical Design of Quality Control Charts, Journal of the Royal Statistical Society. Series D (The Statistician) Vol. 34, No. 2 (1985),Pages 155-160.
http://dx.doi.org/10.2307/2988154

Shewhart, W. A. 1926, Quality control charts,Bell Systems Technical Journal, Pages 593–603. [Google Scholar]
http://dx.doi.org/10.1002/j.1538-7305.1926.tb00125.x

Davida M. Amsden, Howard E. Butler, Robert T. Amsden, Chapter: SPC Simplified for Services, Variables Control Charts, Pages 99-136 (1991).
http://dx.doi.org/10.1007/978-94-011-3070-7_5

Woodall, William H., Control charts based on attribute data: Bibliography and review, Journal of Quality Technology, Milwaukee29.2 (Apr 1997), Pages 172-183.
http://dx.doi.org/10.1007/978-3-642-59239-3_7

Douglas Montgomery, C. 2008. Introduction to Statistical Quality Control, 6th ed. United States of America: John Wiley & Sons, Inc.
http://dx.doi.org/10.1002/pst.22


Refbacks




Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2020 Praise Worthy Prize