Skip to main content

Machine Learning Based Approach to Detect Wormhole Attack in VANETs

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 927))

Abstract

VANET is one of the key enabling technologies for connected and autonomous vehicles (CAVs). In a vehicular plane of the VANETs, vehicles communicate with each other for various safety and non-safety applications. In future, the autonomous CAVs communication will not only be of type broadcast but also unicast in nature using multi-hop communication. Both broadcast and unicast multi-hop communication of VANETs are vulnerable to various types of attacks such as Denial of Service (DoS), message falsification, Sybil attack, Greyhole, Blackhole, and Wormhole attack. This paper aims to utilize the power of machine learning to detect wormhole attack in multi-hop communication of VANETs. Although various mechanisms have been proposed in the literature to detect this attack, the ML-based approach for wormhole has not been explored. To model the attack in VANET, we create a scenario of multi-hop communication using AODV routing protocol on NS3 simulator that uses the mobility traces generated by the SUMO traffic simulator. We run the simulation and collect the statistics generated using the flow monitor tool. These collected traces are preprocessed, and then k-NN and SVM are applied on this preprocessed file to make the model learn of wormhole attack. The performance of these two machine learning models is compared in terms of detection accuracy and four alarm types. Our study demonstrates that ML is a powerful tool, which can help deal with such attacks in a multi-hop communication of future generation CAVs.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Albouq, S.S., Fredericks, E.M.: Detection and avoidance of wormhole attacks in connected vehicles. In: Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications, pp. 107–116. ACM (2017)

    Google Scholar 

  2. Ali Alheeti, K.M., Gruebler, A., McDonald-Maier, K.: Intelligent intrusion detection of grey hole and rushing attacks in self-driving vehicular networks. Computers 5(3), 16 (2016)

    Article  Google Scholar 

  3. Altman, N.S.: An introduction to kernel and nearest-neighbor nonparametric regression. Am. Stat. 46(3), 175–185 (1992)

    MathSciNet  Google Scholar 

  4. Argyroudis, P.G., O’mahony, D.: Secure routing for mobile ad hoc networks. IEEE Commun. Surv. Tutor. 7(1–4), 2–21 (2005)

    Article  Google Scholar 

  5. Bakhouya, M., Gaber, J., Lorenz, P.: An adaptive approach for information dissemination in vehicular ad hoc networks. J. Netw. Comput. Appl. 34(6), 1971–1978 (2011)

    Article  Google Scholar 

  6. Behrisch, M., Bieker, L., Erdmann, J., Krajzewicz, D.: SUMO–simulation of urban mobility. In: The Third International Conference on Advances in System Simulation (SIMUL 2011), Barcelona, Spain, vol. 42 (2011)

    Google Scholar 

  7. Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273–297 (1995)

    MATH  Google Scholar 

  8. Grover, J., Prajapati, N.K., Laxmi, V., Gaur, M.S.: Machine learning approach for multiple misbehavior detection in VANET. In: International Conference on Advances in Computing and Communications, pp. 644–653. Springer (2011)

    Google Scholar 

  9. Guyon, I., Elisseeff, A.: An introduction to variable and feature selection. J. Mach. Learn. Res. 3(Mar), 1157–1182 (2003)

    MATH  Google Scholar 

  10. Henderson, T.R., Lacage, M., Riley, G.F., Dowell, C., Kopena, J.: Network simulations with the ns-3 simulator. SIGCOMM Demonstr. 14(14), 527 (2008)

    Google Scholar 

  11. Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, INFOCOM 2003. IEEE Societies, vol. 3, pp. 1976–1986 IEEE (2003)

    Google Scholar 

  12. Hu, Y.C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)

    Article  Google Scholar 

  13. IEEE Std.: IEEE standard for information technology– local and metropolitan area networks – specific requirements– Part 11: wireless LAN medium access control (MAC) and physical layer (PHY) specifications amendment 6: wireless access in vehicular environments, pp. 1–51, July 2010

    Google Scholar 

  14. Johnson, D.B., Maltz, D.A., Broch, J., et al.: DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks. Ad Hoc Netw. 5, 139–172 (2001)

    Google Scholar 

  15. Kang, M.J., Kang, J.W.: Intrusion detection system using deep neural network for in-vehicle network security. PloS One 11(6), e0155781 (2016)

    Article  Google Scholar 

  16. Khalil, I., Bagchi, S., Shroff, N.B.: Liteworp: detection and isolation of the wormhole attack in static multihop wireless networks. Comput. Netw. 51(13), 3750–3772 (2007)

    Article  Google Scholar 

  17. Loukas, G., Vuong, T., Heartfield, R., Sakellari, G., Yoon, Y., Gan, D.: Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access 6, 3491–3508 (2018)

    Article  Google Scholar 

  18. Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (AODV) routing. Technical report (2003)

    Google Scholar 

  19. Singh, P.K., Dash, M.K., Mittal, P., Nandi, S.K., Nandi, S.: Misbehavior detection in C-ITS using deep learning approach. In: 18th International Conference on Intelligent Systems Design and Applications (ISDA). Springer (2018)

    Google Scholar 

  20. Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for ad hoc networks. In: 10th IEEE International Conference on Network Protocols, pp. 78–87. IEEE (2002)

    Google Scholar 

  21. Singh, P.K., Sharma, S., Nandi, S.K., Nandi, S.: Multipath TCP for V2I communication in SDN controlled small cell deployment of smart city. Veh. Commun. 15, 1–15 (2018)

    Google Scholar 

  22. Taylor, A., Leblanc, S., Japkowicz, N.: Anomaly detection in automobile control network data with long short-term memory networks. In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), pp. 130–139. IEEE (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sukumar Nandi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singh, P.K., Gupta, R.R., Nandi, S.K., Nandi, S. (2019). Machine Learning Based Approach to Detect Wormhole Attack in VANETs. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds) Web, Artificial Intelligence and Network Applications. WAINA 2019. Advances in Intelligent Systems and Computing, vol 927. Springer, Cham. https://doi.org/10.1007/978-3-030-15035-8_63

Download citation

Publish with us

Policies and ethics