An Efficient Dynamic Solution for the Detection and Prevention of Black Hole Attack in VANETs
<p>Generic architecture of a VANET.</p> "> Figure 2
<p>Black hole attack.</p> "> Figure 3
<p>A visual representation of the impact of a BHA on VANET.</p> "> Figure 4
<p>The framework of DPBHA.</p> "> Figure 5
<p>The mobility model of vehicles.</p> "> Figure 6
<p>A scenario demonstrating the detection phase.</p> "> Figure 7
<p>A scenario demonstrating the prevention phase.</p> "> Figure 8
<p>Flowchart of the proposed DPBHA.</p> "> Figure 9
<p>Initial state of the first experiment.</p> "> Figure 10
<p>Graphical representation of routing overhead.</p> "> Figure 11
<p>Graphical representation of packet delivery ratio.</p> "> Figure 12
<p>Graphical representation of average throughput.</p> "> Figure 13
<p>Graphical representation of end-to-end delay.</p> "> Figure 14
<p>Graphical representation of packet loss rate.</p> "> Figure 15
<p>Graphical representation of detection rate.</p> ">
Abstract
:1. Introduction
2. Black Hole Attacks (BHAs) in VANETs
3. Related Work
4. Proposed Work
4.1. Connectivity Phase
- (1)
- If vehicles and are connected, the value of the link connectivity is added to the position of the adjacency matrix Adj.
- (2)
- If a link has the same connectivity in both directions , 1 is added to the connectivity. However, a node can be connected to itself through other nodes in a multi-hop manner, for instance, V1→V3→V4→V1.
- (3)
- When the above two conditions fail, the term “otherwise” is evaluated in Equation (1). When two vehicles are not connected, we add zero. The adjacency matrix Adj, which represents vehicle interconnectivity, is given by Equation (2).
- (1)
- We assumed that the black hole node is a malicious node that always exploits its harmful properties to each requesting node and that all other nodes are genuine nodes that act normally.
- (2)
- All the network nodes should be uniquely identifiable, and only BHA will exist in the network. Other network attacks, such as a GHA, Sybil attack, or impersonation attack, will not exist.
- (3)
- The solution assumed that multiple RREPs will arrive at the source node during the route discovery process and they will be stored in an additional response analysis table (RAT).
- (4)
- All the network nodes have the same features, and it was assumed that if node A is lying in the transmission range of node B, then node B will also lie in the transmission range of node A.
- (5)
- All the nodes were assumed to be healthy and they must participate in the route discovery process according to assumption (1).
4.2. Detection Phase
4.3. Prevention Phase
Algorithm 1: Black Hole Attack Detection and Prevention | |||
Input: RREQ, RREP, G, B, Forged-RREQ | |||
Output: BHA Detection and Prevention, Best and Secure Path Selection | |||
1. | Initialization: | ||
2. | |||
3. | |||
4. | |||
5. | |||
6. | |||
7. | |||
8. | |||
9. | |||
10. | |||
11. | |||
12. | |||
13. | |||
14. | |||
15. | |||
16. | |||
17. | |||
18. | |||
19. | |||
20. | |||
21. | |||
22. | |||
23. | |||
24. | |||
25. | |||
26. | |||
27. | |||
28. | |||
29. | |||
30. | |||
31. |
5. Implementation and Result Evaluation
- Routing overhead;
- Packet delivery ratio (PDR);
- End-to-end delay;
- Throughput;
- Packet loss ratio;
- Confusion metrics.
5.1. Routing Overhead
5.2. Packet Delivery Ratio
5.3. Throughput
5.4. End-To-End Delay
5.5. Packet Loss Rate (PLR)
5.6. Confusion Matrix
5.6.1. True Positive Rate (TPR)
5.6.2. False Positive Rate (FPR)
5.6.3. False Negative Rate (FNR)
5.6.4. True Negative Rate (TNR)
5.6.5. Detection Rate
5.6.6. Accuracy Rate
6. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Ahmed, Z.; Naz, S.; Ahmed, J. Minimizing transmission delays in vehicular ad hoc networks by optimized placement of road-side unit. Wirel. Netw. 2020, 26, 2905–2914. [Google Scholar] [CrossRef]
- Arif, M.; Wang, G.; Bhuiyan, M.Z.A.; Wang, T.; Chen, J. A survey on security attacks in VANETs: Communication, applications and challenges. Veh. Commun. 2019, 19, 100179. [Google Scholar] [CrossRef]
- Hasrouny, H.; Samhat, A.E.; Bassil, C.; Laouiti, A. VANet security challenges and solutions: A survey. Veh. Commun. 2017, 7, 7–20. [Google Scholar] [CrossRef]
- Cherkaoui, B.; Beni-hssane, A.; Erritali, M. Variable control chart for detecting black hole attack in vehicular ad-hoc networks. J. Ambient Intell. Humaniz. Comput. 2020, 11, 5129–5138. [Google Scholar] [CrossRef]
- Fan, N.; Wu, C.Q. On trust models for communication security in vehicular ad-hoc networks. Ad Hoc Netw. 2019, 90, 101740. [Google Scholar] [CrossRef]
- Khan, M.N.; Rahman, H.U.; Faisal, M.; Khan, F.; Ahmad , S. An IoT-Enabled Information System for Smart Navigation in Museums. Sensors 2022, 22, 312. [Google Scholar]
- Abbas, S.; Talib, M.A.; Ahmed, A.; Khan, F.; Ahmad, S.; Kim, D.H. Blockchain-based authentication in internet of vehicles: A survey. Sensors 2021, 21, 7927. [Google Scholar] [CrossRef] [PubMed]
- Al-Heety, O.S.; Zakaria, Z.; Ismail, M.; Shakir, M.M.; Alani, S.; Alsariera, H. A comprehensive survey: Benefits, services, recent works, challenges, security, and use cases for sdn-vanet. IEEE Access 2020, 8, 91028–91047. [Google Scholar] [CrossRef]
- Hatim, S.M.; Elias, S.J.; Awang, N.; Darus, M.Y. VANETS and Internet of Things (IoT): A discussion. Indones. J. Electr. Eng. Comput. Sci. 2018, 12, 218–224. [Google Scholar] [CrossRef]
- Kumar, A.; Varadarajan, V.; Kumar, A.; Dadheech, P.; Choudhary, S.S.; Kumar, V.A.; Panigrahi, B.; Veluvolu, K.C. Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm. Microprocess. Microsyst. 2021, 80, 103352. [Google Scholar] [CrossRef]
- Lee, M.; Atkison, T. Vanet applications: Past, present, and future. Veh. Commun. 2021, 28, 100310. [Google Scholar] [CrossRef]
- Huang, L.; Jiang, H.; Zhang, Z.; Yan, Z.; Guo, H. Efficient data traffic forwarding for infrastructure-to-infrastructure communications in VANETs. IEEE Trans. Intell. Transp. Syst. 2017, 19, 839–853. [Google Scholar] [CrossRef]
- Ouazine, K.; Slimani, H.; Nacer, H.; Bermad, N.; Zemmoudj, S. Reducing saturation and congestion in VANET networks: Alliance-based approach and comparisons. Int. J. Commun. Syst. 2020, 33, e4245. [Google Scholar] [CrossRef]
- Zekri, A.; Jia, W. Heterogeneous vehicular communications: A comprehensive study. Ad Hoc Netw. 2018, 75, 52–79. [Google Scholar] [CrossRef]
- Zhang, J.; Zheng, K.; Zhang, D.; Yan, B. AATMS: An Anti-Attack Trust Management Scheme in VANET. IEEE Access 2020, 8, 21077–21090. [Google Scholar] [CrossRef]
- Sheikh, M.S.; Liang, J. A comprehensive survey on VANET security services in traffic management system. Wirel. Commun. Mob. Comput. 2019, 2019, 2423915. [Google Scholar] [CrossRef] [Green Version]
- Khan, S.; Sharma, I.; Aslam, M.; Khan, M.Z.; Khan, S. Security Challenges of Location Privacy in VANETs and State-of-The Art Solutions: A Survey. Future Internet 2021, 13, 96. [Google Scholar] [CrossRef]
- Nazib, R.A.; Moh, S. Routing Protocols for Unmanned Aerial Vehicle-Aided Vehicular Ad Hoc Networks: A Survey. IEEE Access 2020, 8, 77535–77560. [Google Scholar] [CrossRef]
- Perkins, C.E.; Royer, E.M. Ad-hoc on-demand distance vector routing. In Proceedings of the WMCSA’99. Second IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, USA, 25–26 February 1999; pp. 90–100. [Google Scholar]
- Hassan, Z.; Mehmood, A.; Maple, C.; Khan, M.A.; Aldegheishem, A. Intelligent Detection of Black Hole Attacks for Secure Communication in Autonomous and Connected Vehicles. IEEE Access 2020, 8, 199618–199628. [Google Scholar] [CrossRef]
- Gautham, P.S.; Shanmughasundaram, R. Detection and isolation of Black Hole in VANET. In Proceedings of the 2017 International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), Kerala, India, 6–7 July 2017; pp. 1534–1539. [Google Scholar]
- Su, M.-Y. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comput. Commun. 2011, 34, 107–117. [Google Scholar] [CrossRef]
- Kudva, S.; Badsha, S.; Sengupta, S.; La, H.; Khalil, I.; Atiquzzaman, M. A scalable blockchain based trust management in VANET routing protocol. J. Parallel Distrib. Comput. 2021, 152, 144–156. [Google Scholar] [CrossRef]
- Malhi, A.K.; Batra, S.; Pannu, H.S. Security of vehicular ad-hoc networks: A comprehensive survey. Comput. Secur. 2020, 89, 101664. [Google Scholar] [CrossRef]
- Sleem, L.; Noura, H.N.; Couturier, R. Towards a secure ITS: Overview, challenges and solutions. J. Inf. Secur. Appl. 2020, 55, 102637. [Google Scholar] [CrossRef]
- Gurung, S.; Chauhan, S. Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET. Wirel. Netw. 2019, 25, 975–988. [Google Scholar] [CrossRef]
- Panos, C.; Ntantogian, C.; Malliaros, S.; Xenakis, C. Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks. Comput. Netw. 2017, 113, 94–110. [Google Scholar] [CrossRef]
- Hortelano, J.; Ruiz, J.C.; Manzoni, P. Evaluating the usefulness of watchdogs for intrusion detection in VANETs. In Proceedings of the 2010 IEEE International Conference on Communications Workshops, Cape Town, South Africa, 23–37 May 2010; pp. 1–5. [Google Scholar]
- Daeinabi, A.; Rahbar, A.G. Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks. Multimed. Tools Appl. 2013, 66, 325–338. [Google Scholar] [CrossRef]
- Kadam, M.; Limkar, S. Performance Investigation of DMV (Detecting Malicious Vehicle) and D & PMV (Detection and Prevention of Misbehave/Malicious Vehicles): Future Road Map. In Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013, Odissa, India, 22–23 December 2013; pp. 379–387. [Google Scholar]
- Dhaka, A.; Nandal, A.; Dhaka, R.S. Gray and black hole attack identification using control packets in MANETs. Procedia Comput. Sci. 2015, 54, 83–91. [Google Scholar] [CrossRef] [Green Version]
- Jahan, R.; Suman, P. Detection of malicious node and development of routing strategy in VANET. In Proceedings of the 2016 3rd International Conference on Signal Processing and Integrated Networks (SPIN), Noida, India, 11–12 February 2016; pp. 472–476. [Google Scholar]
- Li, W.; Song, H. ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 2016, 17, 960–969. [Google Scholar] [CrossRef]
- Purohit, K.C.; Dimri, S.C.; Jasola, S. Mitigation and performance analysis of routing protocols under black-hole attack in vehicular ad-hoc network (VANET). Wirel. Pers. Commun. 2017, 97, 5099–5114. [Google Scholar] [CrossRef]
- Tyagi, P.; Dembla, D. Advanced secured routing algorithm of vehicular ad-hoc network. Wirel. Pers. Commun. 2018, 102, 41–60. [Google Scholar] [CrossRef]
- Ali Zardari, Z.; He, J.; Zhu, N.; Mohammadani, K.H.; Pathan, M.S.; Hussain, M.I.; Memon, M.Q. A dual attack detection technique to identify black and gray hole attacks using an intrusion detection system and a connected dominating set in MANETs. Future Internet 2019, 11, 61. [Google Scholar] [CrossRef] [Green Version]
- Roess, R.P.; Prassas, E.S.; McShane, W.R. Traffic Engineering; Pearson/Prentice Hall: London, UK, 2004. [Google Scholar]
- Khan, Z.; Fan, P.; Fang, S. On the connectivity of vehicular ad hoc network under various mobility scenarios. IEEE Access 2017, 5, 22559–22565. [Google Scholar] [CrossRef]
- Yousefi, S.; Altman, E.; El-Azouzi, R.; Fathy, M. Analytical model for connectivity in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 2008, 57, 3341–3356. [Google Scholar] [CrossRef]
- Khan, Z.; Fan, P.; Fang, S.; Abbas, F. An unsupervised cluster-based VANET-oriented evolving graph (CVoEG) model and associated reliable routing scheme. IEEE Trans. Intell. Transp. Syst. 2019, 20, 3844–3859. [Google Scholar] [CrossRef]
- Eiza, M.H.; Ni, Q. An evolving graph-based reliable routing scheme for VANETs. IEEE Trans. Veh. Technol. 2013, 62, 1493–1504. [Google Scholar] [CrossRef]
- Elaraby, S.; Abuelenin, S.M. Connectivity analysis of directed highway vehicular ad hoc networks using graph theory. Int. J. Commun. Syst. 2021, 34, e4745. [Google Scholar] [CrossRef]
- Khan, F.; Khan, W.; Shah, K.; Qasim, I.; Habib, A. An algorithmic approach for core election in mobile ad-hoc network. J. Internet Technol. 2019, 20, 1099–1111. [Google Scholar]
- Rashid, A.; Khan, F.; Gul, T.; Khan, S.; Khan, F. Improving energy conservation in wireless sensor networks using energy harvesting system. Int. J. Adv. Comput. Sci. Appl. 2018, 9, 354–363. [Google Scholar] [CrossRef] [Green Version]
- Khan, F.; Khan, W.; Khan, S.; Qasim, I.; Habib, A. A secure core-assisted multicast routing protocol in mobile ad-hoc network. J. Internet Technol. 2020, 21, 375–383. [Google Scholar]
- Hussain, S.M.; Abdul, W.; Munam, A.S.; Akhunzada, A.; Khan, F.; Amin, N.A.; Arshad, S.; Ali, I. Seven pillars to achieve energy efficiency in high-performance computing data centers. In Recent Trends and Advances in Wireless and IoT-enabled Networks; Jan, M., Khan, F., Alam, M., Eds.; Springer: Cham, Switzerland, 2019; pp. 93–105. [Google Scholar]
- Khan, F.; Ahmad, S.; Gürüler, H.; Cetin, G.; Whangbo, T.; Kim, C. An Efficient and Reliable Algorithm for Wireless Sensor Network. Sensors 2021, 21, 8355. [Google Scholar] [CrossRef]
- Kenniche, H.; Ravelomananana, V. Random geometric graphs as model of wireless sensor networks. In Proceedings of the 2010 The 2nd international conference on computer and automation engineering (ICCAE), Singapore, 26–28 February 2010; pp. 103–107. [Google Scholar]
- Zhang, Y.; Zhang, H.; Sun, W.; Pan, C. Connectivity analysis for vehicular ad hoc network based on the exponential random geometric graphs. In Proceedings of the 2014 IEEE Intelligent Vehicles Symposium Proceedings, Ypsilanti, MI, USA, 8–11 June 2014; pp. 993–998. [Google Scholar]
- Gutiérrez-Reina, D.; Sharma, V.; You, I.; Toral, S. Dissimilarity metric based on local neighboring information and genetic programming for data dissemination in vehicular ad hoc networks (VANETs). Sensors 2018, 18, 2320. [Google Scholar] [CrossRef] [PubMed]
Author (s) and Citation | Solutions/Schemes | Strengths | Performance Metrics | Limitations |
---|---|---|---|---|
Hortelano et al. [28] | Watchdog-based IDS | Easy to implement and applicable in any routing protocol; detects selfish and greedy nodes efficiently | False positive and false negative | The technique fails when two malicious nodes work together; a high false detection rate in a short time; generates a huge routing overhead and end-to-end (E2E) delay |
Daeinabi et al. [29] | Detecting malicious vehicle (DMV) | Detect any kind of malicious node with high promptness | PDR and packets dropped | High jitter and high E2E delay; low throughput |
Kadam et al. [30] | Detection and prevention of malicious vehicles (D&PMV) | Provides lower jitter and higher throughput compared to DMV method | Packets dropped, E2E delay, throughput, and jitter | Requires more time for processing; results in high E2E delay |
Dhaka et al. [31] | Based on new control packets: Cseq and Rseq | Provides higher PDR and is applicable in other reactive routing protocols | PDR and E2E delay | Huge routing overhead due to use of additional control packets |
Jahan and Suman [32] | Acknowledgment-based model | The model is capable of detecting any kind of malicious node | Packets dropped, throughput, packets received, and PDR | Heavy routing overhead and E2E delay; low throughput and PDR |
Li et al. [33] | Attack-resistant trust (ART) management scheme based on evaluating trustworthiness | Accurately evaluates the trustworthiness of data and nodes in VANETs; capable of detecting various DoS attacks | Precision, recall, and communication overhead | High processing overhead when the number of malicious nodes increases; cannot detect a smart BHA |
Purohit et al. [34] | Secure vehicular on-demand routing (SVODR) | The modified AODV can mitigate the impact of BHAs in VANETs | PDR, throughput, normalized routing load (NRL), E2E delay, and average path length | It cannot be employed with other protocols; using extra fields for cryptographic functions leads to a heavy routing overhead and E2E delay |
Tyagi et al. [35] | Enhanced secure AODV (ES-AODV) based on asymmetric public-key cryptography | The algorithm is simple, fast, and has a lower storage cost | Packets dropped, packet collision, E2E delay, throughput, routing overhead, and PDR | Provides security against external attacks but internal attacks may inflict havoc on the network |
Zardari et al. [36] | Dual-attack detection for a BHA and GHA (DDBG) | Provides a fast propagation rate of data and only trustworthy nodes can interact across the network | Detection rate, PDR, throughput, routing overhead, and E2E delay | Generates a huge routing overhead, which affects the throughput and PDR |
Cherkaoui et al. [4] | Use of variable control chart to detect BHA | Easy to implement and does not need any modification in the routing protocols | Throughput and E2E delay | High processing overhead and may not apply in the VANET’s environment |
Hassan et al. [20] | Intelligent detection of a black hole attack (IDBA) | Capable of detecting a BHA and the results revealed better performance compared to benchmark schemes | PDR, throughput E2E delay, packet loss ratio, and routing overhead | Generates four thresholds, which causes a high processing and routing overhead |
Kumar et al. [10] | Secure AODV | Capable of detecting malicious nodes in VANETs | PDR, throughput, and E2E delay | High routing overhead and E2E delay, resulting in a decreased throughput and PDR |
Proposed DPBHA | Use of dynamic threshold value and forged RREQ packet | Efficiently detects and prevents a BHA in terms of reduced routing overhead and E2E delay, increased throughput, and PDR; eliminates the false positive and false negative rates with 98% accuracy; no additional hardware and IDS/DPS nodes are required | PDR, throughput, E2E delay, packet loss ratio, routing overhead, and detection ratio | The proposed DPBHA addresses BHA only and it is incapable of addressing other DoS attacks, such as cooperative BHA and GHA, which will be addressed in future research work |
Symbol | Description |
---|---|
N | Node: vehicle or RSU |
S | Source node |
D | Destination node |
E | Edge |
T | Timer |
V | Vehicle |
Neighboring node | |
Next-hop node | |
Routing table | |
Speed of neighboring node | |
ID | Identity of a node |
G | Gray list |
B | Black list |
RREQ | Route request |
RREP | Route reply |
Transmission range | |
Standard deviation | |
Probability density function of a vehicle’s velocity | |
Mean value | |
The density of vehicles | |
Threshold value (sequence numbers) | |
and | Variables and range from 1, 2, 3, …, n |
1 | 400 | 1 |
D | 95 | 1 |
8 | 80 | 4 |
5 | 75 | 2 |
Packet Type | Flags | Reserved | Hop Count |
RREQ (Broadcast) ID | |||
(Non-existing Destination IP Address) | |||
Destination Sequence Number | |||
Originator IP Address |
S. No. | Parameters | Values |
---|---|---|
1. | Simulation tool | NS-2.35 |
2. | Simulation area | 1000 m × 1000 m |
3. | Number of nodes | 25, 50, 75, 100, 125, 150 |
4. | Simulation time | 900 s |
5. | Vehicle mobility | 1 km/h–100 km/h |
6. | Routing protocols | AODV |
7. | Standard protocol | 802.11p |
8. | Black hole nodes | 2, 4, 6, 8, 10, 12 |
9. | Transport protocol | UDP |
10. | Packet size (bytes) | 512 b/s |
11. | Type of traffic | CBR (1 Mbps) |
12. | Antenna | Omni-directional |
Actual Reality Class | |||
---|---|---|---|
Test Result Class | Class | Attack | Normal |
Attack | True positive (TP) | False positive (FP) | |
Normal | False negative (FN) | True negative (TN) |
No. of Nodes | Malicious Nodes | TPR of AODV | TPR of SAODV | TPR of IDBA | TPR of DPBHA |
---|---|---|---|---|---|
25 | 2 | 00.0% | 90.0% | 95.0% | 100% |
50 | 4 | 00.0% | 87.5% | 92.5% | 97.5% |
75 | 6 | 00.0% | 85.0% | 90.0% | 95.0% |
100 | 8 | 00.0% | 82.5% | 87.5% | 93.7% |
125 | 10 | 00.0% | 80.0% | 85.0% | 91.0% |
150 | 12 | 00.0% | 76.6% | 83.3% | 90.8% |
Total No. of Nodes = 75 | Real Class | Predictive Value | ||
---|---|---|---|---|
Attacker = 06 | Normal = 69 | |||
Test Results Class | Attacker = 5 | True Positive = 5 | False Positive = 0 | Positive Predictive Value (5/5) = 100% |
Normal = 70 | False Negative = 5 | True Negative = 69 | Negative Predictive Value (69/70) = 98.5% | |
Results | Sensitivity (5/6) = 83.3% | Specificity (69/69) = 100% |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Malik, A.; Khan, M.Z.; Faisal, M.; Khan, F.; Seo, J.-T. An Efficient Dynamic Solution for the Detection and Prevention of Black Hole Attack in VANETs. Sensors 2022, 22, 1897. https://doi.org/10.3390/s22051897
Malik A, Khan MZ, Faisal M, Khan F, Seo J-T. An Efficient Dynamic Solution for the Detection and Prevention of Black Hole Attack in VANETs. Sensors. 2022; 22(5):1897. https://doi.org/10.3390/s22051897
Chicago/Turabian StyleMalik, Abdul, Muhammad Zahid Khan, Mohammad Faisal, Faheem Khan, and Jung-Taek Seo. 2022. "An Efficient Dynamic Solution for the Detection and Prevention of Black Hole Attack in VANETs" Sensors 22, no. 5: 1897. https://doi.org/10.3390/s22051897
APA StyleMalik, A., Khan, M. Z., Faisal, M., Khan, F., & Seo, J. -T. (2022). An Efficient Dynamic Solution for the Detection and Prevention of Black Hole Attack in VANETs. Sensors, 22(5), 1897. https://doi.org/10.3390/s22051897