Abstract
VANET is one of the key enabling technologies for connected and autonomous vehicles (CAVs). In a vehicular plane of the VANETs, vehicles communicate with each other for various safety and non-safety applications. In future, the autonomous CAVs communication will not only be of type broadcast but also unicast in nature using multi-hop communication. Both broadcast and unicast multi-hop communication of VANETs are vulnerable to various types of attacks such as Denial of Service (DoS), message falsification, Sybil attack, Greyhole, Blackhole, and Wormhole attack. This paper aims to utilize the power of machine learning to detect wormhole attack in multi-hop communication of VANETs. Although various mechanisms have been proposed in the literature to detect this attack, the ML-based approach for wormhole has not been explored. To model the attack in VANET, we create a scenario of multi-hop communication using AODV routing protocol on NS3 simulator that uses the mobility traces generated by the SUMO traffic simulator. We run the simulation and collect the statistics generated using the flow monitor tool. These collected traces are preprocessed, and then k-NN and SVM are applied on this preprocessed file to make the model learn of wormhole attack. The performance of these two machine learning models is compared in terms of detection accuracy and four alarm types. Our study demonstrates that ML is a powerful tool, which can help deal with such attacks in a multi-hop communication of future generation CAVs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Albouq, S.S., Fredericks, E.M.: Detection and avoidance of wormhole attacks in connected vehicles. In: Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications, pp. 107–116. ACM (2017)
Ali Alheeti, K.M., Gruebler, A., McDonald-Maier, K.: Intelligent intrusion detection of grey hole and rushing attacks in self-driving vehicular networks. Computers 5(3), 16 (2016)
Altman, N.S.: An introduction to kernel and nearest-neighbor nonparametric regression. Am. Stat. 46(3), 175–185 (1992)
Argyroudis, P.G., O’mahony, D.: Secure routing for mobile ad hoc networks. IEEE Commun. Surv. Tutor. 7(1–4), 2–21 (2005)
Bakhouya, M., Gaber, J., Lorenz, P.: An adaptive approach for information dissemination in vehicular ad hoc networks. J. Netw. Comput. Appl. 34(6), 1971–1978 (2011)
Behrisch, M., Bieker, L., Erdmann, J., Krajzewicz, D.: SUMO–simulation of urban mobility. In: The Third International Conference on Advances in System Simulation (SIMUL 2011), Barcelona, Spain, vol. 42 (2011)
Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273–297 (1995)
Grover, J., Prajapati, N.K., Laxmi, V., Gaur, M.S.: Machine learning approach for multiple misbehavior detection in VANET. In: International Conference on Advances in Computing and Communications, pp. 644–653. Springer (2011)
Guyon, I., Elisseeff, A.: An introduction to variable and feature selection. J. Mach. Learn. Res. 3(Mar), 1157–1182 (2003)
Henderson, T.R., Lacage, M., Riley, G.F., Dowell, C., Kopena, J.: Network simulations with the ns-3 simulator. SIGCOMM Demonstr. 14(14), 527 (2008)
Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, INFOCOM 2003. IEEE Societies, vol. 3, pp. 1976–1986 IEEE (2003)
Hu, Y.C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)
IEEE Std.: IEEE standard for information technology– local and metropolitan area networks – specific requirements– Part 11: wireless LAN medium access control (MAC) and physical layer (PHY) specifications amendment 6: wireless access in vehicular environments, pp. 1–51, July 2010
Johnson, D.B., Maltz, D.A., Broch, J., et al.: DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks. Ad Hoc Netw. 5, 139–172 (2001)
Kang, M.J., Kang, J.W.: Intrusion detection system using deep neural network for in-vehicle network security. PloS One 11(6), e0155781 (2016)
Khalil, I., Bagchi, S., Shroff, N.B.: Liteworp: detection and isolation of the wormhole attack in static multihop wireless networks. Comput. Netw. 51(13), 3750–3772 (2007)
Loukas, G., Vuong, T., Heartfield, R., Sakellari, G., Yoon, Y., Gan, D.: Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access 6, 3491–3508 (2018)
Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (AODV) routing. Technical report (2003)
Singh, P.K., Dash, M.K., Mittal, P., Nandi, S.K., Nandi, S.: Misbehavior detection in C-ITS using deep learning approach. In: 18th International Conference on Intelligent Systems Design and Applications (ISDA). Springer (2018)
Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for ad hoc networks. In: 10th IEEE International Conference on Network Protocols, pp. 78–87. IEEE (2002)
Singh, P.K., Sharma, S., Nandi, S.K., Nandi, S.: Multipath TCP for V2I communication in SDN controlled small cell deployment of smart city. Veh. Commun. 15, 1–15 (2018)
Taylor, A., Leblanc, S., Japkowicz, N.: Anomaly detection in automobile control network data with long short-term memory networks. In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), pp. 130–139. IEEE (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Singh, P.K., Gupta, R.R., Nandi, S.K., Nandi, S. (2019). Machine Learning Based Approach to Detect Wormhole Attack in VANETs. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds) Web, Artificial Intelligence and Network Applications. WAINA 2019. Advances in Intelligent Systems and Computing, vol 927. Springer, Cham. https://doi.org/10.1007/978-3-030-15035-8_63
Download citation
DOI: https://doi.org/10.1007/978-3-030-15035-8_63
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-15034-1
Online ISBN: 978-3-030-15035-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)