Advertisement

Machine Learning Based Approach to Detect Wormhole Attack in VANETs

  • Pranav Kumar Singh
  • Rahul Raj Gupta
  • Sunit Kumar Nandi
  • Sukumar NandiEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 927)

Abstract

VANET is one of the key enabling technologies for connected and autonomous vehicles (CAVs). In a vehicular plane of the VANETs, vehicles communicate with each other for various safety and non-safety applications. In future, the autonomous CAVs communication will not only be of type broadcast but also unicast in nature using multi-hop communication. Both broadcast and unicast multi-hop communication of VANETs are vulnerable to various types of attacks such as Denial of Service (DoS), message falsification, Sybil attack, Greyhole, Blackhole, and Wormhole attack. This paper aims to utilize the power of machine learning to detect wormhole attack in multi-hop communication of VANETs. Although various mechanisms have been proposed in the literature to detect this attack, the ML-based approach for wormhole has not been explored. To model the attack in VANET, we create a scenario of multi-hop communication using AODV routing protocol on NS3 simulator that uses the mobility traces generated by the SUMO traffic simulator. We run the simulation and collect the statistics generated using the flow monitor tool. These collected traces are preprocessed, and then k-NN and SVM are applied on this preprocessed file to make the model learn of wormhole attack. The performance of these two machine learning models is compared in terms of detection accuracy and four alarm types. Our study demonstrates that ML is a powerful tool, which can help deal with such attacks in a multi-hop communication of future generation CAVs.

Keywords

Wormhole SVM k-NN SUMO VANETs 

References

  1. 1.
    Albouq, S.S., Fredericks, E.M.: Detection and avoidance of wormhole attacks in connected vehicles. In: Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications, pp. 107–116. ACM (2017)Google Scholar
  2. 2.
    Ali Alheeti, K.M., Gruebler, A., McDonald-Maier, K.: Intelligent intrusion detection of grey hole and rushing attacks in self-driving vehicular networks. Computers 5(3), 16 (2016)CrossRefGoogle Scholar
  3. 3.
    Altman, N.S.: An introduction to kernel and nearest-neighbor nonparametric regression. Am. Stat. 46(3), 175–185 (1992)MathSciNetGoogle Scholar
  4. 4.
    Argyroudis, P.G., O’mahony, D.: Secure routing for mobile ad hoc networks. IEEE Commun. Surv. Tutor. 7(1–4), 2–21 (2005)CrossRefGoogle Scholar
  5. 5.
    Bakhouya, M., Gaber, J., Lorenz, P.: An adaptive approach for information dissemination in vehicular ad hoc networks. J. Netw. Comput. Appl. 34(6), 1971–1978 (2011)CrossRefGoogle Scholar
  6. 6.
    Behrisch, M., Bieker, L., Erdmann, J., Krajzewicz, D.: SUMO–simulation of urban mobility. In: The Third International Conference on Advances in System Simulation (SIMUL 2011), Barcelona, Spain, vol. 42 (2011)Google Scholar
  7. 7.
    Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273–297 (1995)zbMATHGoogle Scholar
  8. 8.
    Grover, J., Prajapati, N.K., Laxmi, V., Gaur, M.S.: Machine learning approach for multiple misbehavior detection in VANET. In: International Conference on Advances in Computing and Communications, pp. 644–653. Springer (2011)Google Scholar
  9. 9.
    Guyon, I., Elisseeff, A.: An introduction to variable and feature selection. J. Mach. Learn. Res. 3(Mar), 1157–1182 (2003)zbMATHGoogle Scholar
  10. 10.
    Henderson, T.R., Lacage, M., Riley, G.F., Dowell, C., Kopena, J.: Network simulations with the ns-3 simulator. SIGCOMM Demonstr. 14(14), 527 (2008)Google Scholar
  11. 11.
    Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, INFOCOM 2003. IEEE Societies, vol. 3, pp. 1976–1986 IEEE (2003)Google Scholar
  12. 12.
    Hu, Y.C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)CrossRefGoogle Scholar
  13. 13.
    IEEE Std.: IEEE standard for information technology– local and metropolitan area networks – specific requirements– Part 11: wireless LAN medium access control (MAC) and physical layer (PHY) specifications amendment 6: wireless access in vehicular environments, pp. 1–51, July 2010Google Scholar
  14. 14.
    Johnson, D.B., Maltz, D.A., Broch, J., et al.: DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks. Ad Hoc Netw. 5, 139–172 (2001)Google Scholar
  15. 15.
    Kang, M.J., Kang, J.W.: Intrusion detection system using deep neural network for in-vehicle network security. PloS One 11(6), e0155781 (2016)CrossRefGoogle Scholar
  16. 16.
    Khalil, I., Bagchi, S., Shroff, N.B.: Liteworp: detection and isolation of the wormhole attack in static multihop wireless networks. Comput. Netw. 51(13), 3750–3772 (2007)CrossRefGoogle Scholar
  17. 17.
    Loukas, G., Vuong, T., Heartfield, R., Sakellari, G., Yoon, Y., Gan, D.: Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access 6, 3491–3508 (2018)CrossRefGoogle Scholar
  18. 18.
    Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (AODV) routing. Technical report (2003)Google Scholar
  19. 19.
    Singh, P.K., Dash, M.K., Mittal, P., Nandi, S.K., Nandi, S.: Misbehavior detection in C-ITS using deep learning approach. In: 18th International Conference on Intelligent Systems Design and Applications (ISDA). Springer (2018)Google Scholar
  20. 20.
    Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for ad hoc networks. In: 10th IEEE International Conference on Network Protocols, pp. 78–87. IEEE (2002)Google Scholar
  21. 21.
    Singh, P.K., Sharma, S., Nandi, S.K., Nandi, S.: Multipath TCP for V2I communication in SDN controlled small cell deployment of smart city. Veh. Commun. 15, 1–15 (2018)Google Scholar
  22. 22.
    Taylor, A., Leblanc, S., Japkowicz, N.: Anomaly detection in automobile control network data with long short-term memory networks. In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), pp. 130–139. IEEE (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Pranav Kumar Singh
    • 1
    • 2
  • Rahul Raj Gupta
    • 1
  • Sunit Kumar Nandi
    • 1
    • 3
  • Sukumar Nandi
    • 1
    Email author
  1. 1.Department of CSEIndian Institute of Technology GuwahatiGuwahatiIndia
  2. 2.Department of CSECentral Institute of Technology KokrajharKokrajharIndia
  3. 3.Department of CSENational Institute of Technology, Arunachal PradeshYupiaIndia

Personalised recommendations