Abstract
One of the network performance challenges of Vehicular Ad Hoc Networks (VANET) is the Black Hole attack. This destructive attack severely damages the network performance if succeeded. By replying to a route request with the minimum routing cost and the maximum sequence number (SN) value, the malicious vehicle can fool the source vehicle that it has the “freshest” and best cost-effective route to the destination vehicle. As a result, all data packets intended to a legitimate destination are caught and destroyed by the malicious vehicle. This may also cause a serious risk for autonomous vehicle control system or traffic warning applications. Previous published malicious detection algorithms suffer high error rates when the malicious node uses a “close-to-legitimate” SN value to attack or actively change the information in the route reply packet. This paper proposes a Black Hole Attack Detection Algorithm (BADA) based on a machine learning approach. In VANETs, it is a challenge to differentiate the behavior of malicious vehicles as they try to avoid detection by imitating that of the normal vehicles. The BADA classification algorithm outperforms existing solutions because it relies on the history of each vehicle’s route request and response behavior, and it deploys the k-Nearest Neighbors machine learning algorithm to identify malicious vehicles. The paper also proposes a Black hole Attack Detection Routing Protocol which utilizes the proposed BADA solution to realize a more secured and improved AODV-based protocol. Using the NS2 simulation system, the paper evaluates the performance of the proposed protocol and compares it with related solutions on the traffic network model in Ho Chi Minh city, Vietnam under black hole attacks using minimum SN values. Simulation results have shown that the proposed algorithm can correctly detect the malicious node higher than 99.0%, outperforming previously published algorithms.
Similar content being viewed by others
Data availability
The underlying data come from simulation results.
References
Liu, H., Li, Y., Fu, Y., et al.: Polestar++: an intelligent routing engine for national-wide public transportation. IEEE Trans. Knowl. Data Eng. 35, 6194–6208 (2023). https://doi.org/10.1109/TKDE.2022.3153711
Liu, H., Han, J., Fu, Y., et al.: Unified route representation learning for multi-modal transportation recommendation with spatiotemporal pre-training. VLDB J. 32, 325–342 (2022). https://doi.org/10.1007/s00778-022-00748-y
Nassar, L., Jundi, A., Golestan, K., et al.: Vehicular Ad-hoc Networks(VANETs): Capabilities, Challenges in Context-Aware Processing and Communication Gateway. Autonomous and Intelligent Systems (AIS 2012). Lecture Notes in Computer Science, Springer, Berlin, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31368-4_6
Jeroen, H., Ingrid, M., Bart, D., Piet, D.: An overview of Mobile Ad hoc Networks: applications and challenges. J. Commun. Netw. 3(3), 60–66 (2004). https://doi.org/10.1109/MPRV.2009.2
Amani A.S., Shcherbakov, M.: A survey on routing protocols in Vehicular Ad hoc Networks. In: 9th International Conference on Information, Intelligence, Systems and Applications (IISA), pp. 1–8. IEEE, Zakynthos, Greece (2018). https://doi.org/10.1109/IISA.2018.8633700
Bilgin, B.E., Gungor, C.V.: Performance comparison of IEEE 802.11p and IEEE 802.11b for vehicle-to-vehicle communications in highway, rural, and urban areas. Int. J. Veh. Technol 2013, 1–10 (2013). https://doi.org/10.1155/2013/971684
Alotaibi, E., Mukherjee, B.: A survey on routing algorithms for Wireless Ad-hoc and Mesh networks. Comput. Netw. 56(2), 940–965 (2012). https://doi.org/10.1016/j.comnet.2011.10.011
Sakiz, F., Sen, S.: A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Netw. 61, 33–50 (2017). https://doi.org/10.1016/j.adhoc.2017.03.006
Tseng, F.H., Chou, L., Chao, H.C.: A survey of black hole attacks in wireless mobile ad hoc networks. HCIS 1(4), 1–16 (2011). https://doi.org/10.1186/2192-1962-1-4
Casado, L.S., Fernández, G.M., et al.: Identification of contamination zones for Sinkhole detection in MANETs. J. Netw. Comput. Appl. 54, 62–77 (2015). https://doi.org/10.1016/j.jnca.2015.04.008
Gao, X., Chen, W.: A novel Gray hole attack detection scheme for Mobile Ad-hoc Networks. In: IFIP International Conference on Network and Parallel Computing Workshops, pp. 209–214. IEEE, Dalian, China (2007). https://doi.org/10.1109/NPC.2007.88
Vo, T.T., Luong, N.T., Hoang, D.: MLAMAN: a novel multi-level authentication model and protocol for preventing wormhole attack in mobile ad hoc network. Wirel. Netw. 25(7), 4115–4132 (2019). https://doi.org/10.1007/s11276-018-1734-z
Luong, N.T., Vo, T.T.: Whirlwind: A new method to attack Routing Protocol in Mobile Ad hoc Network. Int. J. Netw. Secur. 19(5), 832–838 (2017). https://doi.org/10.6633/IJNS.201709.19(5).21
Andrew, F., Yudha, T.A., Ahmad, S., et al.: Performance analysis of black hole attack and flooding attack AODV routing protocol on VANET (Vehicular Ad-Hoc Network). In: 8th International Conference on Cyber and IT Service Management (CITSM), pp. 1–5. IEEE, Pangkal, Indonesia (2020). https://doi.org/10.1109/CITSM50537.2020.9268789
Hassan, Z., Mehmood, A., et al.: Intelligent detection of black hole attacks for secure communication in autonomous and connected vehicles. IEEE Access 8, 199618–199628 (2020). https://doi.org/10.1109/ACCESS.2020.3034327
Hortelano, J., Ruiz J.C., Manzoni, P.: Evaluating the usefulness of watchdogs for intrusion detection in VANETs. In: 2010 IEEE International Conference on Communications Workshops, pp. 1–5. IEEE, Cape Town, South Africa (2010). https://doi.org/10.1109/ICCW.2010.5503946
Cai, J., Yi, P., et al.: An adaptive approach to detecting black and gray hole attacks in Ad Hoc network. In: 24th IEEE International Conference on Advanced Information Networking and Applications, pp. 775–780. IEEE, Perth, WA, Australia (2010). https://doi.org/10.1109/AINA.2010.143
Daeinabi, A., Rahbar, A.G.: Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks. Multimed. Tools Appl. 66(2), 325–338 (2013). https://doi.org/10.1007/s11042-011-0789-y
Kadam, M., Limkar, S.: Performance investigation of DMV (Detecting Malicious Vehicle) and D &PMV (Detection and prevention of misbehave/malicious vehicles): future road map. In: International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013. Advances in Intelligent Systems and Computing, Vol 247. Springer, Cham (2013). https://doi.org/10.1007/978-3-319-02931-3_43
Wahab, O.A., Otrok, H., Mourad, A.: A dempster-shafer based tit-for-tat strategy to regulate the cooperation in VANET using QoS-OLSR protocol. Wirel. Pers. Commun. Vol. 75(3), 1635–1667 (2014). https://doi.org/10.1007/s11277-013-1443-y
Baiad, R., Otrok, H., et al.: Cooperative cross layer detection for blackhole attack in VANET-OLSR. In: International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 863–868. IEEE, Nicosia, Cyprus (2014). https://doi.org/10.1109/IWCMC.2014.6906469
Gruebler, A., Maier, K.D.M., Alheeti, K.M.A.: An intrusion detection system against black hole attacks on the communication network of self-driving cars. In: Sixth International Conference on Emerging Security Technologies (EST), pp. 86–91. IEEE, Braunschweig, Germany (2015). https://doi.org/10.1109/EST.2015.10
Kumar, V., Kumar, R.: An adaptive approach for detection of blackhole attack in mobile Ad hoc network. Procedia Comput. Sci. 48, 472–479 (2015). https://doi.org/10.1016/j.procs.2015.04.122
Dhaka, A., Nandal, A., Dhaka, R.S.: Gray and black hole attack identification using control packets in MANETs. Procedia Comput. Sci. 54, 83–91 (2015). https://doi.org/10.1016/j.procs.2015.06.010
Ndajah, P., Matine, A.O., Hounkonnou, M.N.: Black hole attack prevention in wireless peer-to-peer networks: a new strategy. Int. J. Wirel. Inf. Netw. 26(1), 48–60 (2019). https://doi.org/10.1007/s10776-018-0418-z
Delkesh, T., Jabraeil Jamali, M.A.: EAODV: detection and removal of multiple black hole attacks through sending forged packets in MANETs. J. Ambient. Intell. Humaniz. Comput. 10(5), 1897–1914 (2019). https://doi.org/10.1007/s12652-018-0782-7
Sivanesh, S., Dhulipala, V.R.S.: Accurate and cognitive intrusion detection system (ACIDS): A novel black hole detection mechanism in Mobile Ad Hoc Networks. Mob. Netw. Appl. 26, 1696–1704 (2021). https://doi.org/10.1007/s11036-019-01505-2
Perkins, C.E., Park, M., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: Proceedings of Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pp. 90–100 (1999). https://doi.org/10.1145/581291.581306
Su, M.Y.: Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comput. Commun. 34(1), 107–117 (2011). https://doi.org/10.1016/j.comcom.2010.08.007
Jaiswal, R., Sharma, S.: A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in Ad hoc Network. In: Advance Computing Conference (IACC), 2013 IEEE 3rd International, pp. 499–504. IEEE, Ghaziabad, India (2013). https://doi.org/10.1109/IAdCC.2013.6514276
Li, W., Song, H.: ART: an attack-resistant trust management scheme for securing vehicular Ad Hoc networks. IEEE Trans. Intell. Transp. Syst. 17(4), 960–969 (2016). https://doi.org/10.1109/TITS.2015.2494017
Alheeti, K.M.A., Gruebler, A., Maier, K.M.: Using discriminant analysis to detect intrusions in external communication for self-driving vehicles. Digit. Commun. Netw. 3(3), 180–187 (2017). https://doi.org/10.1016/j.dcan.2017.03.001
Arulkumaran, G., Gnanamurthy, R.K.: Fuzzy trust approach for detecting black hole attack in mobile Adhoc network. Mob. Netw. Appl. 24, 386–393 (2019). https://doi.org/10.1007/s11036-017-0912-z
Tyagi, P., Dembla, D.: Advanced secured routing algorithm of vehicular Ad-Hoc network. Wirel. Pers. Commun. 102(1), 41–60 (2018). https://doi.org/10.1007/s11277-018-5824-0
Farahani, G.: Black hole attack detection using K-nearest neighbor algorithm and reputation calculation in Mobile Ad Hoc Networks. Secur. Commun. Netw. 2021, 1–15 (2021). https://doi.org/10.1155/2021/8814141
Mota, V.F.S., Cunha, F.D., et al.: Protocols, mobility models and tools in opportunistic networks: a survey. Comput. Commun. 48(15), 5–19 (2014). https://doi.org/10.1016/j.comcom.2014.03.019
Teerawat, I., Ekram, H.: Introduction to Network Simulator NS2, p. 535. Springer (2009). https://doi.org/10.1007/978-1-4614-1406-3. NS2 source code: http://www.isi.edu/nsnam/ns/
Sanjib, K.S., Pankaj, K.A., Singh, P.: Modified k-NN algorithm for classification problems with improved accuracy. Int. J. Inf. Technol. 10(1), 65–70 (2018). https://doi.org/10.1007/s41870-017-0058-z
Luong, N.T., Vo, T.T., Hoang, D.: FAPRP: a machine learning approach to flooding attacks prevention routing protocol in Mobile Ad Hoc Networks. Wirel. Commun. Mob. Comput. 2019, 1–17 (2019). https://doi.org/10.1155/2019/6869307
Luong, N.T., Nguyen, A.Q., Hoang, D.: FAPDRP: a flooding attacks prevention and detection routing protocol in vehicular ad hoc network using behavior history and nonlinear median filter transformation. Wirel. Netw. (2022). https://doi.org/10.1007/s11276-022-03174-8
Acknowledgements
This research is supported by the project B2021.SPD.07, The Dong Thap University, Vietnam.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest
The authors declare that there are no conflicts of interest regarding the publication of this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Luong, N.T., Hoang, D. BAPRP: a machine learning approach to blackhole attacks prevention routing protocol in vehicular Ad Hoc networks. Int. J. Inf. Secur. 22, 1547–1566 (2023). https://doi.org/10.1007/s10207-023-00705-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-023-00705-y