Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3132340.3132346acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Detection and Avoidance of Wormhole Attacks in Connected Vehicles

Published: 21 November 2017 Publication History

Abstract

The routing protocol in connected vehicles (CVs) is vulnerable to wormhole attacks where attackers can deceive legitimate nodes and purport them as if they are immediate or close neighbors. The Ad hoc On-Demand Distance Vector (AODV) protocol is a routing packet protocol designed for mobile nodes. However, AODV may not have been explicitly developed with security issues, specifically wormhole attacks, in mind, thereby requiring a detection algorithm to secure route establishment. This paper introduces the Wormhole-Protocol-Detector ( WPD ), a lightweight protocol for detecting and mitigating wormhole attacks. WPD is designed to work on a highway that is clustered into equal segments and equipped with road side units (RSUs) in predefined locations to monitor each segment. WPD consists of three phases: monitoring and detection of out-of-range packets, estimating the hop count between source and destination nodes, and identification of nodes participating in a wormhole connection. Together, these phases enable legitimate nodes to avoid the wormhole link and obtain secure routing paths between CVs. To validate our approach, we apply WPD to a CVs simulation where different types and lengths of wormhole, including a new wormhole attack method, can be applied to the CV network. Our experimental results suggest that WPD can detect wormhole attacks with a high detection rate and minimum false positives.

References

[1]
2008. New Jersey traffic and revenue study. State of New Jersey Department of Treasury State House.
[2]
Mohammed Saeed Al-Kahtani. 2012. Survey on security attacks in Vehicular Ad hoc Networks (VANETs). In 2012 6th International Conference on Signal Processing and Communication Systems. IEEE, 1--9.
[3]
Saif Al-Sultan, Moath M Al-Doori, Ali H Al-Bayatti, and Hussien Zedan. 2014. A comprehensive survey on vehicular Ad Hoc network. Journal of network and computer applications 37 (2014), 380--392.
[4]
Sami. S. Albouq and E. M. Fredericks. 2017. Lightweight Detection and Isolation of Black Hole Attacks in Connected Vehicles. In 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW). 97--104.
[5]
Juhi Biswas, Ajay Gupta, and Dayashankar Singh. 2014. WADP: A wormhole attack detection and prevention technique in MANET using modified AODV routing protocol. In 9th International Conference on Industrial and Information Systems. IEEE, 1--6.
[6]
Srdjanäpkun, Levente Buttyán, and Jean-Pierre Hubaux. 2003. SECTOR: secure tracking of node encounters in multi-hop wireless networks. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. ACM, 21--32.
[7]
Thaier Hayajneh, Prashant Krishnamurthy, David Tipper, and Anh Le. 2012. Secure neighborhood creation in wireless ad hoc networks using hop count discrepancies. Mobile Networks and Applications 17, 3 (2012), 415--430.
[8]
Will Hedgecock, Miklos Maroti, Janos Sallai, Peter Volgyesi, and Akos Ledeczi. 2013. High-accuracy differential tracking of low-cost GPS receivers. In Proceeding of the 11th annual international conference on Mobile systems, applications, and services. ACM, 221--234.
[9]
Lingxuan Hu and David Evans. 2004. Using Directional Antennas to Prevent Wormhole Attacks. In In Network and Distributed System Security Symposium.
[10]
Yih-Chun Hu, Perrig, and Adrian. 2006. Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications 24, 2 (2006), 370--380.
[11]
Yih-Chun Hu, Adrian Perrig, and David B Johnson. 2003. Packet leashes: a defense against wormhole attacks in wireless networks. In INFOCOM. TwentySecond Annual Joint Conference of the IEEE Computer and Communications, Vol. 3. IEEE, 1976--1986.
[12]
A. S. T. M. Intl. 2003. Standard specification for telecommunications and information exchange between roadside and vehicle systems-5 GHz band Dedicated Short Range Communications. ASTM International (2003).
[13]
Shalabh Jain and John S Baras. 2012. Preventing wormhole attacks using physical layer authentication. In Wireless Communications and Networking Conference. IEEE, 2712--2717.
[14]
David B Johnson and David A Maltz. 1996. Dynamic source routing in ad hoc wireless networks. In Mobile computing. Springer, 153--181.
[15]
Issa Khalil, Saurabh Bagchi, and Ness B Shroff. 2005. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks. In International Conference on Dependable Systems and Networks. DSN 2005. Proceedings. IEEE, 612--621.
[16]
Dong-uk Kim, Hyo-won Kim, Gisung Kim, and Sehun Kim. 2013. A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods. International Journal of Distributed Sensor Networks 2013 (2013).
[17]
Loukas Lazos, Radha Poovendran, Catherine Meadows, Paul Syverson, and LiWu Chang. 2005. Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach. In Wireless Communications and Networking Conference, Vol. 2. IEEE, 1193--1199.
[18]
Ritesh Maheshwari, Jie Gao, and Samir R Das. 2007. Detecting wormhole attacks in wireless networks using connectivity information. In 26th IEEE International Conference on Computer Communications. IEEE, 107--115.
[19]
Sherif El-Kassas Marianne Azer and Magdy El-Soudani. 2009. Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks "A Full Image of the Wormhole Attacks". International Journal of Computer Science and Information Security 1 (2009).
[20]
Ali Modirkhazeni, Norafida Ithnin, Mohammed M Kadhum, and Teddy Mantoro. 2012. Mitigation of Wormhole Attack in Wireless Sensor Networks. In Trustworthy Ubiquitous Computing. Springer, 109--147.
[21]
Lionel M Ni and Philip K McKinley. 1993. A survey of wormhole routing techniques in direct networks. Computer 26 (1993), 62--76.
[22]
Panos Papadimitratos and Zygmunt J Haas. 2002. Secure routing for mobile ad hoc networks. In the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference. 193--204.
[23]
Al-Sakib Khan Pathan. 2010. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press.
[24]
Adrian Perrig, Ran Canetti, Dawn Song, and J Doug Tygar. 2001. Efficient and secure source authentication for multicast. In Proceedings of the Internet Society Network and Distributed System Security Symposium. 35--46.
[25]
V Karthik Raju and K Vinay Kumar. 2012. A simple and efficient mechanism to detect and avoid wormhole attacks in mobile ad hoc networks. In 2012 International Conference on Computing Sciences. IEEE, 271--275.
[26]
Kasper Bonne Rasmussen and Srdjan Capkun. 2007. Implications of radio fingerprinting on the security of sensor networks. In Third International Conference on Security and Privacy in Communications Networks and the Workshops. IEEE, 331--340.
[27]
S. M. Safi, A. Movaghar, and M. Mohammadizadeh. 2009. A Novel Approach for Avoiding Wormhole Attacks in VANET. In Second International Workshop on Computer Science and Engineering, Vol. 2. 160--165.
[28]
Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, and Elizabeth M Belding Royer. 2002. A secure routing protocol for ad hoc networks. In Proceedings 10th IEEE International Conference on Network Protocols. IEEE, 78--87.
[29]
Sejun Song, Haijie Wu, and Baek-Young Choi. 2012. Statistical wormhole detection for mobile sensor networks. In Fourth International Conference on Ubiquitous and Future Networks (ICUFN),. IEEE, 322--327.
[30]
Xia Wang and Johnny Wong. 2007. An end-to-end detection of wormhole attack in wireless ad-hoc networks. In Computer Software and Applications Conference 31st Annual International, Vol. 1. IEEE, 39--48.

Cited By

View all
  • (2024)Detecting and Mitigating Colluding Attacks in Connected Vehicles using Reinforcement Learning2024 IEEE International Conference on Consumer Electronics (ICCE)10.1109/ICCE59016.2024.10444185(1-6)Online publication date: 6-Jan-2024
  • (2023)Securing the Electric Vehicle Charging Infrastructure: An In-Depth Analysis of Vulnerabilities and CountermeasuresProceedings of the Int'l ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications10.1145/3616392.3623424(31-38)Online publication date: 30-Oct-2023
  • (2022)A Classification of Misbehavior Detection Schemes for VANETs: A SurveyWireless Personal Communications10.1007/s11277-022-10098-1129:1(285-322)Online publication date: 30-Oct-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
DIVANet '17: Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications
November 2017
160 pages
ISBN:9781450351645
DOI:10.1145/3132340
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 November 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. connected vehicle
  2. routing
  3. security
  4. wormhole attacks

Qualifiers

  • Research-article

Conference

MSWiM '17
Sponsor:

Acceptance Rates

Overall Acceptance Rate 70 of 308 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Detecting and Mitigating Colluding Attacks in Connected Vehicles using Reinforcement Learning2024 IEEE International Conference on Consumer Electronics (ICCE)10.1109/ICCE59016.2024.10444185(1-6)Online publication date: 6-Jan-2024
  • (2023)Securing the Electric Vehicle Charging Infrastructure: An In-Depth Analysis of Vulnerabilities and CountermeasuresProceedings of the Int'l ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications10.1145/3616392.3623424(31-38)Online publication date: 30-Oct-2023
  • (2022)A Classification of Misbehavior Detection Schemes for VANETs: A SurveyWireless Personal Communications10.1007/s11277-022-10098-1129:1(285-322)Online publication date: 30-Oct-2022
  • (2021)A Survey on the Current Security Landscape of Intelligent Transportation SystemsIEEE Access10.1109/ACCESS.2021.30500389(9180-9208)Online publication date: 2021
  • (2019)A survey on internet of vehicles: Applications, security issues & solutionsVehicular Communications10.1016/j.vehcom.2019.100182(100182)Online publication date: Oct-2019
  • (2019)Machine Learning Based Approach to Detect Wormhole Attack in VANETsPrimate Life Histories, Sex Roles, and Adaptability10.1007/978-3-030-15035-8_63(651-661)Online publication date: 15-Mar-2019
  • (2018)A Deep Reinforcement Learning-based Trust Management Scheme for Software-defined Vehicular NetworksProceedings of the 8th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications10.1145/3272036.3272037(1-7)Online publication date: 25-Oct-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media