Abstract
As a key component of the future Vehicle-to-anything (V2X) communication technology, Vehicular Ad hoc Network (VANET) has a great potential of enabling real-time traffic safety and efficiency applications for people on roads. Therefore, attacking and misusing such network could cause destructive consequences. Wireless communication in VANET is based on IEEE 802.11p-based DSRC standard. Due to its inherited distributed contention resolution mechanism, the MAC protocol in IEEE 802.11p is more susceptible to jamming attacks. While preventing jamming attacks in VANET is not feasible, due to its unbounded scalability, detecting such attacks is primordial. First we develop optimization methodology for IEEE 802.11p MAC which defines its stability region under normal network conditions, this will allow us to determine detection threshold value to distinguish normal operation and attacks. Second, we implement the sequential detection of change method along with the developed methodology and we propose QoS-based Sequential Detection Algorithm (QoS-SDA). The important performance characteristics of QoS-SDA are accuracy and speed, while jamming attacks are detected with low probability of false alarms. Finally, we provide comprehensive analytical and simulation analyses to prove the validity of the develop methodology and the efficiency of the proposed algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
3GPP. Study on LTE-Based V2X Services (Release 14), Technical Specification Group Services and System Aspects (TSG SA), 3GPP TR (2016)
Vehicle safety communications-applications (VSC-A). Final report CAMP Vehicle Safety Communications 2 Consortium, Washington, D.C., USA (2011)
IEEE: IEEE Standard for Wireless Access in Vehicular Environments (WAVE)-Multi-Channel Operation. IEEE Std 1609.4, pp. 1–94 (2016)
Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: 6th ACM MobiHoc, pp. 4657, USA (2005)
Bayraktaroglu, E., et al.: On the performance of IEEE 802.11 under jamming. In: IEEE INFOCOM, Phoenix, AZ, USA, pp. 1265–1273, April 2008
Li, M., Koutsopoulos, I., Poovendran, R.: Optimal jamming attacks and network defense policies in wireless sensor networks. In: IEEE INFOCOM (2007)
Wood, A., Stankovic, J., Son, S.: JAM: a jammed-area mapping service for sensor networks. In: 24th IEEE Real-Time Systems Symposium (2003)
Punal, O., Pereira, C., Aguiar, A., Gross, J.: Experimental characterization and modeling of RF jamming attacks on vanets. IEEE Trans. Veh. Technol. 64(2), 524540 (2015)
Benslimane, A., Nguyen-Minh, H.: Jamming attack model and detection method for beacons under multichannel operation in vehicular networks. IEEE Trans. Veh. Technol. 66(7), 6475–6488 (2017)
Singh, A., Sharma, P.: A novel mechanism for detecting DOS attack in VANET using enhanced attacked packet detection algorithm (EAPDA). In: 2nd International Conference on Recent Advances in Engineering and Computational Sciences (RAECS), Chandigarh, pp. 1–5 (2015)
Sufyan, N., Saqib, N., Zia, M.: Detection of jamming attacks in 802.11b wireless networks. EURASIP J. Wirel. Commun. Netw. 1, 118 (2013)
Roess, R., Prassas, E., McShane, W.: Traffic Engineering. Prentice-Hall, Englewood Cliffs (2004)
Mak, T., Laberteaux K., Sengupta, R.: A multi-channel VANET providing concurrent safety and commercial services. In: 2nd ACM International Workshop on Vehicular Ad Hoc Networks, pp. 1–9. ACM Press, New York (2005)
Bansal, R., Papantoni-Kazakos, P.: An algorithm for detecting a change in a stochastic process. IEEE Trans. Inf. Theory 32, 227235 (1986)
Salem F., Elhillali, Y., Niar, S.: Efficient modeling of IEEE 802.11p MAC output process for V2X interworking enhancement. IET Netw. (2018). https://doi.org/10.1049/iet-net.2017.0228
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix: Proof of Lemma 1
Appendix: Proof of Lemma 1
Let us define
-
CW: The contention window size.
-
\(P_m (\mu ,\sigma ^{2})\): The distribution of the traffic with mean \(\mu \) and variance \(\sigma ^{2}\).
-
P: The probability of successful transmission.
-
\(\lambda \): Poisson arrival rate.
-
k: The expected number of packets that are successfully transmitted during a time interval l given that it started with the transmission of m packets.
When no constraints (i.e., delay or successful transmission bounds) on the transmitted traffic are imposed, the following definition of throughput is meaningful to capture IEEE 802.11p MAC algorithm stability
Let us define the output rate \(\alpha \) such that \(\alpha =\frac{1}{n}\sum _{i=1}^{n} \beta _i \), in [15] it has been proven that the output process of IEEE 802.11p under stable conditions tends to follow a Bernoulli distribution. Hence
The only parameter of the Bernoulli output in (8) is P. To define P let us consider the following scenario: Let m represents the total number of arrivals (packets) in a time interval l with rate \(\mu \). If the contention resolution in IEEE 802.11p, induced only a single successful transmission, then the probability of this event is \(P=CW/l\). However, under stable operation of the algorithm this value approaches the input rate i.e., \(P = \mu \) and consequently (7) holds.
Now let m to increase and the quantities \(\mu \) and \(\sigma ^{2}\) in the arrivals’ distribution \(P_m\) simultaneously to decreases so that
the latter expression is the Poisson theorem, then \(P_m\) converges in distribution to Poisson process, i.e., \(P_m\longrightarrow Pois(\lambda )\). Give Poisson rate \(\lambda \) and in the presence of constraints, the expected number of packets transmitted in the first slot of a time interval l is \(\lambda CW\) and therefore the fraction of packets that are successfully transmitted S during l is \(S = k/\lambda CW\). In [15], recursions for computing the quantity k have been found. In Poisson process, the arrival points in an interval are uniformly distributed. Hence, if a fraction S of the packets are successfully transmitted it means that S is also the fraction of the interval resolved. Therefore, \((k/\lambda CW)CW= k/\lambda \) represents the average portion of the resolved interval, which takes on the average N slots to be resolved. Thus, the algorithm remains stable, even under congestion conditions, whenever it is able to resolve collisions at the rate in which the arrival process progresses in time, that is
(10) defines the maximum value on the input rate \(\lambda \) at this specific CW value so that IEEE 802.11p throughput is maximized while the successfully transmuted packets are bounded by S; thus, the statement in Lemma 1 is a consequence of this.
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Salem, F., Elhillali, Y., Niar, S. (2018). QoS-Based Sequential Detection Algorithm for Jamming Attacks in VANET. In: Doss, R., Piramuthu, S., Zhou, W. (eds) Future Network Systems and Security. FNSS 2018. Communications in Computer and Information Science, vol 878. Springer, Cham. https://doi.org/10.1007/978-3-319-94421-0_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-94421-0_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-94420-3
Online ISBN: 978-3-319-94421-0
eBook Packages: Computer ScienceComputer Science (R0)