Skip to main content
Log in

Security upgrade against RREQ flooding attack by using balance index on vehicular ad hoc network

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

VANET is an ad hoc network that formed between vehicles. Security in VANET plays vital role. AODV routing protocol is a reactive or on-demand routing protocol which means if there is data to be send then the path will create. AODV is the most commonly used topology based routing protocol for VANET. Using of broadcast packets in the AODV route discovery phase caused it is extremely vulnerable against DOS and DDOS flooding attacks. Flooding attack is type of a denial of service attack that causes loss of network bandwidth and imposes high overhead to the network. The method proposed in this paper called Balanced AODV (B-AODV) because it expects all network node behave normally. If network nodes are out of the normal behavior (too much route request) then they identified as malicious node. B-AODV is designed with following feature: (1) The use of adaptive threshold according to network conditions and nodes behavior (balance index) (2) Not using additional routing packets to detect malicious nodes (3) Perform detection and prevention operations independently on each node (4) Perform detection and prevention operations in real time (5) No need for promiscuous mode. This method for detection and prevention flooding attack uses average and standard deviation. In this method each node is employing balance index for acceptation or rejection RREQ packets. The results of the simulation in NS2 indicates B-AODV is resilience against flooding attack and prevent loss of network bandwidth. Comparing between AODV with B-AODV in normal state (non-attacker) shows B-AODV is exactly match with AODV in network performance, this means that the B-AODV algorithm does not impose any overhead and false positive to AODV.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Vasilakos, A. V., Li, Z., Simon, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.

    Article  Google Scholar 

  2. Zhou, L., Naixue, X., Shu, L., Vasilakos, A., Yeo, S. S. (2010). Context-aware middleware for multimedia services in heterogeneous networks. IEEE Intelligent Systems, 25, 40–47. doi:10.1109/MIS.2010.48.

    Article  Google Scholar 

  3. Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In INFOCOM, 2012 Proceedings IEEE, 2012 (pp. 100–108).

  4. Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25, 3264–3273.

    Article  Google Scholar 

  5. Meng, T., Wu, F., Chen, G., & Vasilakos, A. V. (2014). Revisiting routing in multi-hop wireless networks: Spatial reusability-aware routing. In Global communications conference (GLOBECOM), 2014 IEEE, 2014 (pp. 88–93).

  6. Meng, T., Wu, F., Yang, Z., Chen, G., & Vasilakos, A. V. (2016). Spatial reusability-aware routing in multi-hop wireless networks. IEEE Transactions on Computers, 65, 244–255.

    Article  MathSciNet  MATH  Google Scholar 

  7. Blum, J., & Eskandarian, A. (2004). The threat of intelligent collisions. IT Professional, 6, 24–29.

    Article  Google Scholar 

  8. Zeng, Y., Xiang, K., Li, D., & Vasilakos, A. V. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19, 161–173.

    Article  Google Scholar 

  9. Yang, M., Li, Y., Jin, D., Zeng, L., Wu, X., & Vasilakos, A. V. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. Mobile Networks and Applications, 20, 4–18.

    Article  Google Scholar 

  10. Dvir, A., & Vasilakos, A. V. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41, 405–406.

    Google Scholar 

  11. Moustafa, H., Senouci, S. M., & Jerbi, M. (2008). Introduction to vehicular networks. 10th November.

  12. van der Heijden, R. W. & Kargl, F. (2014). Open issues in differentiating misbehavior and anomalies for VANETs.

  13. Simaremare, H., Abouaissa, A., Sari, R. F., & Lorenz, P. (2015). Security and performance enhancement of AODV routing protocol. International Journal of Communication Systems, 28, 2003–2019. doi:10.1002/dac.2837.

    Article  Google Scholar 

  14. Wang, T., Liu, Y., & Vasilakos, A. V. (2015). Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Networks, 21, 1835–1846.

    Article  Google Scholar 

  15. Canavan, J. E. (2001). Fundamentals of network security. Norwood: Artech House.

    MATH  Google Scholar 

  16. Yeh, L.-Y., Chen, Y.-C., & Huang, J.-L. (2011). PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. Computer Communications, 34, 447–456.

    Article  Google Scholar 

  17. Mejri, M. N., Ben-Othman, J., & Hamdi, M. (2014). Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communications, 1, 53–66.

    Article  Google Scholar 

  18. Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on demand distance vector (AODV) routing (RFC 3561), IETF MANET Working Group.

  19. Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in mobile ad hoc networks: challenges and solutions. Wireless Communications, IEEE, 11, 38–47.

    Article  Google Scholar 

  20. Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for Internet of Things. Journal of network and computer applications, 42, 120–134.

    Article  Google Scholar 

  21. Feng, Z., Zhu, Y., Zhang, Q., Ni, L. M., & Vasilakos, A. V. (2014). TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing. In INFOCOM, 2014 Proceedings IEEE, 2014 (pp. 1231–1239).

  22. Song, Y., Liu, L., Ma, H., & Vasilakos, A. V. (2014). A biology-based algorithm to minimal exposure problem of wireless sensor networks. IEEE Transactions on Network and Service Management, 11, 417–430.

    Article  Google Scholar 

  23. Youssef, M., Ibrahim, M., Abdelatif, M., Chen, L., & Vasilakos, A. V. (2014). Routing metrics of cognitive radio networks: A survey. IEEE Communications Surveys & Tutorials, 16, 92–109.

    Article  Google Scholar 

  24. Fadlullah, Z. M., Taleb, T., Vasilakos, A. V., Guizani, M., & Kato, N. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking (TON), 18, 1234–1247.

    Article  Google Scholar 

  25. Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.

    Article  Google Scholar 

  26. Zhou, J., Cao, Z., Dong, X., Xiong, N., & Vasilakos, A. V. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Sciences, 314, 255–276.

    Article  Google Scholar 

  27. Zhou, J., Cao, Z., Dong, X., Lin, X., & Vasilakos, A. V. (2013). Securing m-healthcare social networks: Challenges, countermeasures and future directions. IEEE Wireless Communications, 20, 12–21.

    Article  Google Scholar 

  28. Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100, 3172–3186.

    Article  Google Scholar 

  29. Gunasekaran, M., Premalatha, K., & Gopalakrishnan, B. (2010). A survey on DoS attacks and countermeasures in mobile Ad Hoc networks. International Journal of Advanced Research in Computer Science, 1(4), 156–164.

    Google Scholar 

  30. Sawant, K., & Rawat, D. M. Survey of DOS flooding attacks over MANET environment. International Journal of Engineering Research and Applications, 4(5), 110–115.

    Google Scholar 

  31. Von Mulert, J., Welch, I., & Seah, W. K. (2012). Security threats and solutions in MANETs: A case study using AODV and SAODV. Journal of network and computer Applications, 35, 1249–1259.

    Article  Google Scholar 

  32. Jiang, T., Wang, H., & Vasilakos, A. V. (2012). QoE-driven channel allocation schemes for multimedia transmission of priority-based secondary users over cognitive radio networks. IEEE Journal on Selected Areas in Communications, 30, 1215–1224.

    Article  Google Scholar 

  33. Liu, B., Bi, J., & Vasilakos, A. V. (2014). Toward incentivizing anti-spoofing deployment. IEEE Transactions on Information Forensics and Security, 9, 436–450.

    Article  Google Scholar 

  34. Yao, G., Bi, J., & Vasilakos, A. V. (2015). Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter. IEEE Transactions on Information Forensics and Security, 10, 471–484.

    Article  Google Scholar 

  35. Shandilya, S. K., & Sahu, S. (2010). A trust based security scheme for RREQ flooding attack in MANET. International Journal of Computer Applications, 5, 0975–8887.

    Article  Google Scholar 

  36. Bhargava, S. & Agrawal, D. P. (2001). Security enhancements in AODV protocol for wireless ad hoc networks. In Vehicular technology conference, 2001. VTC 2001 Fall. IEEE VTS 54th, 2001 (pp. 2143–2147).

  37. Golle, P., Greene, D., & Staddon, J. (2004). Detecting and correcting malicious data in VANETs. In Proceedings of the 1st ACM international workshop on vehicular ad hoc networks, 2004 (pp. 29–37).

  38. Yi, P., Dai, Z., Zhong, Y., & Zhang, S. (2005). Resisting flooding attacks in ad hoc networks. In Information technology: Coding and computing, 2005. ITCC 2005. International conference on, 2005 (pp. 657–662).

  39. Song, J.-H., Hong, F., & Zhang, Y. (2006). Effective filtering scheme against RREQ flooding attack in mobile ad hoc networks. In PDCAT, 2006 (pp. 497–502).

  40. Eu, Z. A., & Seah, W. K. G. (2006). Mitigating route request flooding attacks in mobile ad hoc networks. In I. Chong & K. Kawahara (Eds.), Information networking. Advances in data communications and wireless networks (pp. 327–336). Verlag Berlin Hiedelberg: Springer.

  41. Nakayama, H., Kurosawa, S., Jamalipour, A., Nemoto, Y., & Kato, N. (2009). A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 58, 2471–2481.

    Article  Google Scholar 

  42. Nadeem, A. & Howarth, M. (2009). Adaptive intrusion detection and prevention of denial of service attacks in MANETs. In Proceedings of the 2009 international conference on wireless communications and mobile computing: Connecting the world wirelessly, 2009 (pp. 926–930).

  43. Venkataraman, R., Pushpalatha, M., Khemka, R. & Rao, T. R. (2009). Prevention of flooding attacks in mobile ad hoc networks. In Proceedings of the international conference on advances in computing, communication and control, 2009 (pp. 525–529).

  44. Yen, Y.-S., Chao, H.-C., Chang, R.-S., & Vasilakos, A. (2011). Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Mathematical and Computer Modelling, 53, 2238–2250.

    Article  Google Scholar 

  45. Malekzadeh, M., Ghani, A. A. A., & Subramaniam, S. (2012). A new security model to prevent denial-of-service attacks and violation of availability in wireless networks. International Journal of Communication Systems, 25, 903–925.

    Article  Google Scholar 

  46. Choudhury, P., Nandi, S., Pal, A., & Debnath, N. C. (2012). Mitigating route request flooding attack in MANET using node reputation. In Industrial informatics (INDIN), 2012 10th IEEE international conference on, 2012 (pp. 1010–1015).

  47. Yao, Y., Cao, Q., & Vasilakos, A. V. (2015). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for heterogeneous wireless sensor networks. IEEE/ACM Transactions on Networking, 23, 810–823.

    Article  Google Scholar 

  48. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20, 2481–2501.

    Article  Google Scholar 

  49. Ahir, S. A., Marathe, N., & Padiya, P. (2014). IAMTT-new method for resisting network layer denial of service attack on MANET. In Communication systems and network technologies (CSNT), 2014 fourth international conference on, 2014 (pp. 762–766).

  50. Li, S., Liu, Q., Chen, H., & Tan, M. (2006). A new method to resist flooding attacks in ad hoc networks. In Wireless communications, networking and mobile computing, 2006. WiCOM 2006. International conference on, 2006 (pp. 1–4).

  51. Rajaram, A., & Palaniswami, D. S. (2009). A trust based cross layer security protocol for mobile ad hoc networks. arXiv preprint arXiv:0911.0503.

  52. Zhou, J., Dong, X., Cao, Z., & Vasilakos, A. V. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on, Information Forensics and Security, 10, 1299–1314.

    Article  Google Scholar 

  53. Liu, J., Li, Y., Wang, H., Jin, D., Su, L., Zeng, L., et al. (2016). Leveraging software-defined networking for security policy enforcement. Information Sciences, 327, 288–299.

    Article  Google Scholar 

  54. Busch, C., Kannan, R., & Vasilakos, A. V. (2012). “Approximating congestion + dilation in networks via” Quality of routing games. IEEE Transactions on Computers, 61, 1270–1283.

    Article  MathSciNet  Google Scholar 

  55. Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V. (2015). Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. IEEE Transactions on Mobile Computing, 14, 742–754.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad Javad Faghihniya.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Faghihniya, M.J., Hosseini, S.M. & Tahmasebi, M. Security upgrade against RREQ flooding attack by using balance index on vehicular ad hoc network. Wireless Netw 23, 1863–1874 (2017). https://doi.org/10.1007/s11276-016-1259-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-016-1259-2

Keywords

Navigation