Skip to main content
Log in

FAPDRP: a flooding attacks prevention and detection routing protocol in vehicular ad hoc network using behavior history and nonlinear median filter transformation

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Vehicular ad hoc network (VANET) is one of the challenging research areas in recent times with applications to intelligent traffic systems. In VANET, the link between vehicles going in opposite directions only lasts for a very short time when they are within range of each other, otherwise lost, hindering the complete exchange of meaningful information. Most valuable applications on VANET are related to safety-related applications that require real-time response. If the safety and the real-time requirements are not met, serious consequences may result in the form of traffic accidents or failed rescue operations. Flooding attacks on route request packet (RREQ) disrupt the communication between parties, reduce the successful packet delivery rate, and introduce excessive packet transmission delays. This type of attacks, when executed over VANET, may result in disastrous consequences for critical applications such as collision warning or autonomous vehicle assistance. Many security solutions have been proposed; however, they all have several limitations: either they fail to recognise malicious nodes when they attack with low frequency rates, or they suffer performance degradation because of the burden of add-on security measures by the solutions even when malicious nodes are not present in the environment. This paper proposes a Median Filter based flooding attacks detection algorithm (MFFDA) that enables efficient and reliable operation on VANET. The MFFDA solution is novel in three aspects: (1) it uses a route discovery frequency vector (V) to capture a node’s behavioral history; (2) it uses a nonlinear mapping to transform the representational space V into a new space VMF through the use of a Median Filter; (3) it utilises a robust statistic-the median value (mv)—of the data sample V and a suitable separating hyperplane to detect malicious nodes. The paper also proposes the Flooding Attacks Prevention and Detection Routing Protocol (FAPDRP), that incorporates the proposed MFFDA for routing protection. Using NS2, the paper simulated the FAPDRP and related protocols in both attacked and normal network scenarios. The results show that the proposed solution has an accuracy over 98.5% under the minimal flooding attacks 10 pkt/s, outperforms those of previous studies. In addition, the performance of FAPDRP approaches that of the AODV in both attacked and normal network scenarios. This confirms that the proposed MFFDA satisfies the delay, efficiency, and reliability constraints for VANET environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Rehman, S. U., Khan, M. A., Zia, T. A., & Zheng, L. (2013). Vehicular ad-hoc networks (VANETs)-an overview and challenges. Journal of Wireless Networking and Communications, 3(3), 29–38.

    Google Scholar 

  2. Hoebeke, J., Moerman, I., Dhoedt, B., & Demeester, P. (2004). An overview of mobile ad hoc networks: Applications and challenges. Journal-Communications Network, 3(3), 60–66.

    Google Scholar 

  3. Ahmad, S. A., & Shcherbakov, M. (2018). A survey on routing protocols in vehicular ad hoc networks. In 2018 9th International conference on information, intelligence, systems and applications (IISA) (pp. 1–8). IEEE.

  4. Bilgin, B. E., & Gungor, V. C. (2013). Performance comparison of IEEE 802.11 p and IEEE 802.11 b for vehicle-to-vehicle communications in highway, rural, and urban areas. International Journal of Vehicular Technology.

  5. Alotaibi, E., & Mukherjee, B. (2012). A survey on routing algorithms for wireless ad-hoc and mesh networks. Computer Networks, 56(2), 940–965.

    Article  Google Scholar 

  6. Sakiz, F., & Sen, S. (2017). A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Networks, 61, 33–50.

    Article  Google Scholar 

  7. Tseng, F. H., Chou, L. D., & Chao, H. C. (2011). A survey of black hole attacks in wireless mobile ad hoc networks. Human-centric Computing and Information Sciences, 1(1), 1–16.

    Article  Google Scholar 

  8. Sánchez-Casado, L., Macia-Fernandez, G., Garcia-Teodoro, P., & Aschenbruck, N. (2015). Identification of contamination zones for sinkhole detection in MANETs. Journal of Network and Computer Applications, 54, 62–77.

    Article  Google Scholar 

  9. Xiaopeng, G., & Wei, C. (2007). A novel gray hole attack detection scheme for mobile ad-hoc networks. In 2007 IFIP international conference on network and parallel computing workshops (NPC 2007) (pp. 209–214). IEEE.

  10. Vo, T. T., Luong, N. T., & Hoang, D. (2019). MLAMAN: a novel multi-level authentication model and protocol for preventing wormhole attack in mobile ad hoc network. Wireless Networks, 25(7), 4115–4132.

    Article  Google Scholar 

  11. Luong, N. T., & Vo, T. T. (2017). Whirlwind: A new method to attack routing protocol in mobile ad hoc network. International Journal of Network Security, 19(5), 832–838.

    Google Scholar 

  12. Fiade, A., Triadi, A. Y., Sulhi, A., Masruroh, S. U., Handayani, V., & Suseno, H. B. (2020). Performance analysis of black hole attack and flooding attack AODV routing protocol on VANET (vehicular ad-hoc network). In 2020 8th International conference on cyber and IT service management (CITSM) (pp. 1–5). IEEE.

  13. McCanne, S., Floyd, S., Fall, K., & Varadhan, K. (1995). The network simulator ns2 (1995) The VINT project. http://www.isi.edu/nsnam/ns.

  14. Le, H. D., Luong, N. T., & Nguyen, T. V. (2021). AOMDV-OAM: A security routing protocol using OAM on mobile ad hoc network. Journal of Communications, 16(3), 104–110.

    Google Scholar 

  15. Yi, P., Fei Hou, Y., Zhong, Y., Zhang, S., & Dai, Z. (2006). Flooding attack and defence in ad hoc networks. Journal of Systems Engineering and Electronics, 17(2), 410–416.

  16. Song, J. H., Hong, F., & Zhang, Y. (2006). Effective filtering scheme against RREQ flooding attack in mobile ad hoc networks. In Proceedings of the seventh international conference on parallel and distributed computing, applications and technologies (pp. 497–502).

  17. Li, S., Liu, Q., Chen, H., & Tan, M. (2006). A new method to resist flooding attacks in ad hoc networks. In 2006 International conference on wireless communications, networking and mobile computing (pp. 1–4). IEEE.

  18. Jiang, F. C., Lin, C. H., & Wu, H. W. (2014). Lifetime elongation of ad hoc networks under flooding attack using power-saving technique. Ad Hoc Networks, 21, 84–96.

    Article  Google Scholar 

  19. Faghihniya, M. J., Hosseini, S. M., & Tahmasebi, M. (2017). Security upgrade against RREQ flooding attack by using balance index on vehicular ad hoc network. Wireless Networks, 23(6), 1863–1874.

    Article  Google Scholar 

  20. Gurung, S., & Chauhan, S. (2018). A novel approach for mitigating route request flooding attack in MANET. Wireless Networks, 24(8), 2899–2914.

    Article  Google Scholar 

  21. Vimal, V., & Nigam, M. J. (2017). Plummeting flood based distributed-DoS attack to upsurge networks performance in ad-hoc networks using neighborhood table technique. In TENCON 2017—2017 IEEE region 10 conference (pp. 139–144). IEEE.

  22. Vo, T. T., & Luong, N. T. (2017). \(\text{ SMA}_2\)AODV: Routing protocol reduces the harm of flooding attacks in mobile ad hoc network. Journal of Communications, 12(7), 371–378.

    Google Scholar 

  23. Abu Zant, M., & Yasin, A. (2019). Avoiding and isolating flooding attack by enhancing AODV MANET protocol (AIF_AODV). Security and Communication Networks.

  24. Mohammadi, P., & Ghaffari, A. (2019). Defending against flooding attacks in mobile ad-hoc networks based on statistical analysis. Wireless Personal Communications, 106(2).

  25. Patel, M., Sharma, S., & Sharan, D. (2013). Detection and prevention of flooding attack using SVM. In 2013 International conference on communication systems and network technologies (pp. 533–537). IEEE.

  26. Li, W., Yi, P., Wu, Y., Pan, L., & Li, J. (2014). A new intrusion detection system based on KNN classification algorithm in wireless sensor network. Journal of Electrical and Computer Engineering.

  27. Luong, N. T., Vo, T. T., & Hoang, D. (2019). FAPRP: A machine learning approach to flooding attacks prevention routing protocol in mobile ad hoc networks. Wireless Communications and Mobile Computing.

  28. Gareth, J., Daniela, W., Trevor, H., & Robert, T. (2013). An introduction to statistical learning: With applications in R. Springer.

    MATH  Google Scholar 

  29. Aizerman, M. A. (1964). Theoretical foundations of the potential function method in pattern recognition learning. Automation and Remote Control, 25, 821–837.

    MATH  Google Scholar 

  30. Jayaraj, V., & Ebenezer, D. (2010). A new switching-based median filtering scheme and algorithm for removal of high-density salt and pepper noise in images. EURASIP Journal on Advances in Signal Processing, 2010, 1–11.

    Article  Google Scholar 

  31. Rahim, M., & Maitheen, R. (2018). Error detection technique for a median filter using denoising algorithm. In International conference on ISMAC in computational vision and bio-engineering (pp. 1261–1270). Springer.

  32. Villar, S. A., Torcida, S., & Acosta, G. G. (2017). Median filtering: A new insight. Journal of Mathematical Imaging and Vision, 58(1), 130–146.

    Article  MATH  Google Scholar 

  33. Gupta, S. N. (2011). Mean, median, mode: An introduction. In M. Lovric (Ed.), International encyclopedia of statistical science (pp. 788–791). Springer.

    Chapter  Google Scholar 

  34. Pitas, I., & Venetsanopoulos, A. N. (1990). Median filters. In Nonlinear digital filters (pp. 63–116). Springer.

Download references

Acknowledgements

This research is supported by the project B2021.SPD.07, The Dong Thap University, Vietnam.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ngoc T. Luong.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Luong, N.T., Nguyen, A.Q. & Hoang, D. FAPDRP: a flooding attacks prevention and detection routing protocol in vehicular ad hoc network using behavior history and nonlinear median filter transformation. Wireless Netw (2022). https://doi.org/10.1007/s11276-022-03174-8

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11276-022-03174-8

Keywords

Navigation