Skip to main content
Log in

Classification of Distributed Denial of Service Attacks in VANET: A Survey

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Vehicular ad hoc network (VANET) is a self-organizing network established to provide wireless communication between vehicles where information plays an important role in aspects such as collision detection, re-routing, traffic monitoring, information related to gas stations, hospitals, hotels, entertainment, and more. The main challenges that VANET faces are security and privacy of information, which lead to a variety of attacks. Numerous types of attacks can be carried out on VANET, with distributed denial of service (DDOS) being one of the most common and dangerous. DDOS attacks on VANET result in the lack of availability of information for vehicles to communicate. Many methods were developed to counteract DDOS, however the efficacy of most of these existing systems was limited to some degree, and attackers exploited these weaknesses to conduct network attacks. Here we provide a full explanation of numerous DDOS attacks as well as a layer-by-layer classification of DDOS attacks that are specialized to specific layers or multi-layers. The goal of this survey is to provide useful information to fellow researchers on VANET attacks, in particular DDOS attacks, their layer-wise classification, the impact DDOS has on the network, and existing DDOS countermeasures, their limitations, and how they can be improved. We have referred to various journal papers to gather the information that can be helpful to researchers working in the field of VANET attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Availability of Data and Materials

None.

Code Availability

It’s a Review paper, so no code is implemented or available.

Data Availability

There is no dataset(s) available for my research work as it is a review paper.

References

  1. Kaur, R., & Jagdev, G. (2018). A study on working of prominent routing protocols in WANETs. International Journal of Research Studies in Computer Science and Engineering (IJRSCSE), 5(1), 26–33. ISSN 2349-4859 (online). ISSN 2349–4840 (Print). https://doi.org/10.20431/2349-4859.0501004

  2. Li, H., Xu, Z. (2018). Routing protocol in VANETs equipped with directional antennas: Topology-based neighbor discovery and routing analysis. Wireless Communications and MobileComputing, vol. 2018, ArticleD 7635143, 13 pages, https://doi.org/10.1155/2018/7635143

  3. Poongothai, M., & Sathyakala, M. (2012). Simulation and analysis of DDoS attacks. In International conference on emerging trends in science, engineering, and technology (INCOSET), pp. 78–85. https://doi.org/10.1109/INCOSET.2012.6513885.

  4. Kumar, G. (2016). Denial of service attacks: An updated perspective. Systems Science & Control Engineering. https://doi.org/10.1080/21642583.2016.1241193

    Article  Google Scholar 

  5. Zeebaree, S. R. M., Sharif, K. H., Mohammed Amin, R. M. (2018). Application layer distributed denial of service attacks defense techniques: A review. Academic Journal of Nawroz University, 7(4), 113–117. https://doi.org/10.25007/ajnu.v7n4a279

  6. Lo, N., & Tsai, H. (2007). Illusion attack on VANET applications: A message plausibility problem. IEEE Globecom Workshops, 2007, 1–8. https://doi.org/10.1109/GLOCOMW.2007.4437823

    Article  Google Scholar 

  7. Malhi, A., & Batra, S. (2019). Security of vehicular ad-hoc networks: A comprehensive survey. Computers & Security 89(1):101664. https://doi.org/10.1016/j.cose.2019.101664

  8. Edemacu, K., et al. (2014). Packet drop attack detection techniques in wireless ad hoc networks: A review. 6(5).

  9. Rathod, A., Patel, S. (2017). A survey on black hole & gray hole attacks detection scheme for vehicular ad-hoc network. International Research Journal of Engineering and Technology (IRJET), 04(11).

  10. Suresh Babu, G. N. K., Srivatsa, S. K. (2013). Distributed denial of service: attack at application and transport layers and precautions. IJERTV2IS2462, 02(02).

  11. Gupta, C., Singh, P., Tiwari, R. (2017). Network and transport layer attacks in ad-hoc network. International Journal of Advanced Research in Computer and Communication Engineering, 6(2), ISSN (Online) 2278-1021 ISSN (Print) 2319-5940.

  12. Rahbari, M., & Jamali, M. A. J. (2011) Efficient detection of Sybil attack based on cryptography in VANET. International Journal of Network Security & Its Applications (IJNSA), 3(6).

  13. Durda, E., & Ali Buldub, A. (2000). IPV4/IPV6 security and threat comparisons. Procedia - Social and Behavioral, Sciences, 2(2), 5285–5291. https://doi.org/10.1016/j.sbspro.2010.03.862

  14. Al Shahrani, A. S. (2011). Rushing attack in mobile ad hoc networks. In Third international conference on intelligent networking and collaborative systems, pp. 752–758. https://doi.org/10.1109/INCoS.2011.145.

  15. Kaur, J. (2016). Mac layer management frame denial of service attacks. In International conference on micro-electronics and telecommunication engineering (ICMETE), Ghaziabad, India, pp. 155–160. https://doi.org/10.1109/ICMETE.2016.83.

  16. Xu, R., Zhao, Z., He, F. (2010). DDoS attacks at MAC layer in tactical mobile ad hoc networks. In International conference on communications and intelligence information security, pp. 100–104. https://doi.org/10.1109/ICCIIS.2010.11.

  17. Kiran Varma, K. S., & Satyanarayana, B. P. (2014). Jamming attacks: An approach for prevention. International Journal of Computer Science And Technology (IJCST).

  18. Pawar, P. M., Nielsen, R. H., Prasad, N. R., Ohmori, S., Prasad, R. (2012). Behavioural modelling of WSN MAC layer security attacks: A sequential UML approach. Journal of Cyber Security and Mobility, pp. 65–82.

  19. Baccari, S., Touati, H., Haddad, M., Muhlethaler, P. (2020). Performance impact analysis of security attacks on cross-layer routing protocols in vehicular ad hoc networks. In SoftCom - international conference on software, telecommunications and computer networks, Hvar / Virtual, Croatia. final-02996797.

  20. Kumar, G. (2104). Understanding denial of service (Dos) attacks using OSI reference model. International Journal of Education and Science Research Review, 1(5). ISSN 2348–6457.

  21. Obaid, H. S., & Abeed, E. H. (2020). DoS and DDoS attacks at OSI layers. International Journal of Multidisciplinary Research and Publications (IJMRAP), 2(8).

  22. Yılmaz, M. H., & Arslan, H. (2105). A survey: Spoofing attacks in physical layer security. In IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops), pp. 812–817. https://doi.org/10.1109/LCNW.2015.7365932.

  23. Aydos, M., Vural, Y., & Tekerek, A. (2019). Assessing risks and threats with layered approach to Internet of Things security. Measurement and Control. https://doi.org/10.1177/0020294019837991

    Article  Google Scholar 

  24. Lei, H., Gao, C., Ansari, I. S., Guo, Y., Pan, G., & Qaraqe, K. A. (2016). On physical-layer security over SIMO generalized-KK fading channels. IEEE Transactions on Vehicular Technology, 65(9), 7780–7785. https://doi.org/10.1109/TVT.2015.2496353

    Article  Google Scholar 

  25. Farooq, T., Llewellyn-Jones, D., & Merabti, M. (2010). Mac layer dos attacks in IEEE 802.11 networks. In The 11th annual conference on the convergence of telecommunications, networking, and broadcasting (PGNet 2010), Liverpool, UK.

  26. Martínez, A., & Zurutuza, U. (2008). Beacon frame spoofing attack detection in IEEE 802.11 networks. In Third international conference on availability, reliability, and security.

  27. Zhou, Y., Wu, D., Nettles, S. M. (2004). Analyzing and preventing MAClayer denial of service attacks for stock 802.11 systems. In Workshop on broadband wireless services and applications (BROADNETS).

  28. Vasserman, E. Y., & Hopper, N. (2013). Vampire attacks: Draining life from wireless ad hoc sensor networks. IEEE Transactions on Mobile Computing, 12(2), 318–332. https://doi.org/10.1109/TMC.2011.274.

  29. Singh, R., Kaur, A., Sethi, S. (2015). Attacks at data link layer of OSI model: An overview. International Journal of Advanced Technology in Engineering and Science, Volume No.03, Special Issue No. 02.

  30. Karthikeyan, H., & Usha, G. (2022). Real-time DDoS flooding attack detection in intelligent transportation systems. Computers and Electrical Engineering. https://doi.org/10.1016/j.compeleceng.2022.107995

    Article  Google Scholar 

  31. Poongodi, M., Bourouis, S., Ahmed, A. N., Vijayaragavan, M., Venkatesan, K. G. S., Alhakami, W., Hamdi, M. (2022). A novel secured multi-access edge computing based VANET with neuro-fuzzy systems based blockchain framework. Computer Communications https://doi.org/10.1016/j.comcom.2022.05.014.

  32. Fan, Q. G., Wang, L., Cai, Y. N., Li, Y. Q., Chen, J. (2006). VANET routing replay attack detection research based on SVM. In MATEC Web Conf. Volume 63, international conference on mechatronics, manufacturing and materials engineering (MMME).

  33. Kim, H., & Chung, J. M. (2022). VANET jamming and adversarial attack defense for autonomous vehicle safety. Computers, Materials, and Continua.

  34. Sefati, S. S., & Tabrizi, S. G. (2022). Detecting sybil attack in vehicular ad-hoc networks (VANETs) by using fitness function, signal strength index and throughput. Wireless Personal Communications, 123, 2699–2719. https://doi.org/10.1007/s11277-021-09261-x

    Article  Google Scholar 

  35. Malik, A., Khan, M. Z., Faisal, M., Khan, F., Seo, J.-T.. (2022). An efficient dynamic solution for the detection and prevention of black hole attack in VANETs. Sensors, 22(5), 1897. https://doi.org/10.3390/s22051897.

  36. Remya Krishnan, P., Arun Raj Kumar, P. (2022). Detection and mitigation of smart blackhole and gray hole attacks in VANET using dynamic time warping. Wireless Personal Communications, 124, 931–966 (2022). https://doi.org/10.1007/s11277-021-09390-3.

  37. Sangaiah, A. K., & Javadpour, A., Ja’fari, F., Pinto, P., Ahmadi, H. R., Zhang, W. (2022). CL-MLSP: The design of a detection mechanism for sinkhole attacks in smart cities. In 2022 Microprocessors and microsystems, https://doi.org/10.1016/j.micpro.2022.104504.

  38. Kim, C., Chang, S.-Y., Lee, D., Kim, J., Park, K., & Kim, J. (2023). Reliable detection of location spoofing and variation attacks. IEEE Access, 11, 10813–10825. https://doi.org/10.1109/ACCESS.2023.3241236

    Article  Google Scholar 

  39. Mughaid, A., AlZu’bi, S., Alnajjar, A. et al. (2022). Improved dropping attacks detecting system in 5G networks using machine learning and deep learning approaches. Multimedia Tools. https://doi.org/10.1007/s11042-022-13914-9.

  40. Bahramnejad, S., Movahhedinia, N., Naseri, A., et al. (2023). A deep learning method for automatic reliability prediction of CR-VANETs, PREPRINT (Version 1) available at Research Square, https://doi.org/10.21203/rs.3.rs-2604220/v1.

  41. Kaushik, K., Singh, V., Manikandan, V. P. (2022). a novel approach for an automated advanced MITM attack on IoT networks. In Sugumaran, V., Upadhyay, D., Sharma, S. (Eds) Advancements in Interdisciplinary Research. AIR 2022. Communications in Computer and Information Science, vol 1738. Springer, Cham. https://doi.org/10.1007/978-3-031-23724-9_6.

  42. Soni, G., Chandravanshi, K., Jhariya, M. K., Rajput, A. (2022). An IPS approach to secure V-RSU communication from Blackhole and wormhole attacks in VANET. In: H. K. D. Sarma, V. E. Balas, B. Bhuyan, N. Dutta (Eds) Contemporary issues in communication, cloud and big data analytics. Lecture notes in networks and systems, vol. 281. Springer, Singapore. https://doi.org/10.1007/978-981-16-4244-9_5.

  43. Verma, A., & Saha, R. (2022). Analysis of BayesNet classifier for DDoS detection in vehicular networks. In International conference on augmented intelligence and sustainable systems (ICAISS), Trichy, India, 2022, pp. 980–987. https://doi.org/10.1109/ICAISS55157.2022.10011115.

  44. Manale, B., & Mazri, T. (2022). Intrusion detection method for GPS based on deep learning for autonomous vehicle. International Journal of Electronic Security and Digital Forensics, 14(1), 37–52.

    Article  Google Scholar 

  45. Babaghayou, M., Labraoui, N., Ari, A. A. A., Lagraa, N., Ferrag, M. A., & Maglaras, L. (2022). SAMA: Security-aware monitoring approach for location abusing and UAV GPS-spoofing attacks on Internet of Vehicles. In CROWNCOM 2021, WiCON 2021: Cognitive radio oriented wireless networks and wireless internet (343–360). https://doi.org/10.1007/978-3-030-98002-3_25.

  46. Pedroso, C., Gomides, T. S., Guidoni, D. L., Nogueira, M., Santos, A. L. (2022). A robust traffic information management system against data poisoning in vehicular networks. In IEEE Latin America Transactions, 20(12), 2421–2428. https://doi.org/10.1109/TLA.9905610.

  47. Ben Rabah, N., & Idoudi, H. (2023). A machine learning framework for intrusion detection in VANET communications. In K. Daimi, A. Alsadoon, C. Peoples, N. El Madhoun (Eds) Emerging trends in cybersecurity applications. Springer, Cham. https://doi.org/10.1007/978-3-031-09640-2_10.

  48. Mahajan, N., Chauhan, A., Kumar, H., et al. (2022). A deep learning approach to detection and mitigation of distributed denial of service attacks in high availability intelligent transport systems. Mobile Networks, pp. 1423–1443.

  49. Grigoriou, E., et al. (2022). Protecting IEC 60870-5-104 ICS/SCADA systems with honeypots. In 2022 IEEE international conference on cyber security and resilience (CSR), Rhodes, Greece, pp. 345–350, https://doi.org/10.1109/CSR54599.2022.9850329.

  50. Ghaleb, F. A., Saeed, F., Alkhammash, E. H., Alghamdi, N. S., & Al-rimy, B. A. S. (2022). A fuzzy-based context-aware misbehavior detecting scheme for detecting rogue nodes in vehicular ad hoc network. Sensors. https://doi.org/10.3390/s22072810

    Article  Google Scholar 

  51. Byrenheid, M., Strufe, T., Roos, S. (2020). Secure embedding of rooted spanning trees for scalable routing in topology-restricted networks. In International symposium on reliable distributed systems (SRDS), Shanghai, China, 2020, pp. 175–184. https://doi.org/10.1109/SRDS51746.2020.00025.

  52. Dridi, L., & Zhani, M. F. (2018). A holistic approach to mitigating DoS attacks in SDN networks. International Journal of Network Management. https://doi.org/10.1002/nem.1996

    Article  Google Scholar 

  53. Yaibuates, M., & Chaisricharoen, R. (2020). A combination of ICMP and ARP for DHCP malicious attack identification. In Joint international conference on digital arts, media and technology with ECTI Northern Section conference on electrical, electronics, computer and telecommunications engineering (ECTI DAMT & NCON), Pattaya, Thailand, , pp. 15–19, https://doi.org/10.1109/ECTIDAMTNCON48261.2020.9090760.

  54. Yang, K., Lin, W.-Y., Barman, M., Condessa, F., Kolter, Z. (2021). Defending multimodal fusion models against single-source adversaries. In IEEE/CVF conference on computer vision and pattern recognition (CVPR), Nashville, TN, USA, 2021, pp. 3339–3348, https://doi.org/10.1109/CVPR46437.2021.00335.

  55. Jagnade, G. A., Saudagar, S. I., Chorey, S. A. (2016). Secure VANET from vampire attack using LEACH protocol. In International conference on signal processing, communication, power and embedded system (SCOPES), Paralakhemundi, India, pp. 2001–2005, https://doi.org/10.1109/SCOPES.2016.7955799.

  56. Hemamalini, V., Zayaraz, G., Susmitha, V., Saranya, V. (2017). An efficient probabilistic authentication scheme for converging VANETs. In Second international conference on recent trends and challenges in computational models (ICRTCCM), Tindivanam, India, pp. 147–152, https://doi.org/10.1109/ICRTCCM.2017.40.

  57. Zhang, T., & Zhu, Q. (2018). Distributed privacy-preserving collaborative intrusion detection systems for VANETs. IEEE Transactions on Signal and Information Processing over Networks, 4(1), 148–161. https://doi.org/10.1109/TSIPN.2018.2801622

    Article  MathSciNet  Google Scholar 

  58. Bangui, H., Ge, M., Buhnova, B. (2021). A hybrid data-driven model for intrusion detection in VANET. In The 12th international conference on ambient systems, networks, and technologies (ANT)/the 4th international conference on emerging data and industry 4.0 (EDI40)/affiliated workshops, https://doi.org/10.1016/j.procs.2021.03.065.

Download references

Funding

My research is non-funding, no organization, person(s) or any others are funding.

Author information

Authors and Affiliations

Authors

Contributions

Self.

Corresponding author

Correspondence to K. Vamshi Krishna.

Ethics declarations

Conflict of interest

None.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vamshi Krishna, K., Ganesh Reddy, K. Classification of Distributed Denial of Service Attacks in VANET: A Survey. Wireless Pers Commun 132, 933–964 (2023). https://doi.org/10.1007/s11277-023-10643-6

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-023-10643-6

Keywords

Navigation