Skip to main content

QoS-Based Sequential Detection Algorithm for Jamming Attacks in VANET

  • Conference paper
  • First Online:
Future Network Systems and Security (FNSS 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 878))

Included in the following conference series:

  • 933 Accesses

Abstract

As a key component of the future Vehicle-to-anything (V2X) communication technology, Vehicular Ad hoc Network (VANET) has a great potential of enabling real-time traffic safety and efficiency applications for people on roads. Therefore, attacking and misusing such network could cause destructive consequences. Wireless communication in VANET is based on IEEE 802.11p-based DSRC standard. Due to its inherited distributed contention resolution mechanism, the MAC protocol in IEEE 802.11p is more susceptible to jamming attacks. While preventing jamming attacks in VANET is not feasible, due to its unbounded scalability, detecting such attacks is primordial. First we develop optimization methodology for IEEE 802.11p MAC which defines its stability region under normal network conditions, this will allow us to determine detection threshold value to distinguish normal operation and attacks. Second, we implement the sequential detection of change method along with the developed methodology and we propose QoS-based Sequential Detection Algorithm (QoS-SDA). The important performance characteristics of QoS-SDA are accuracy and speed, while jamming attacks are detected with low probability of false alarms. Finally, we provide comprehensive analytical and simulation analyses to prove the validity of the develop methodology and the efficiency of the proposed algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. 3GPP. Study on LTE-Based V2X Services (Release 14), Technical Specification Group Services and System Aspects (TSG SA), 3GPP TR (2016)

    Google Scholar 

  2. Vehicle safety communications-applications (VSC-A). Final report CAMP Vehicle Safety Communications 2 Consortium, Washington, D.C., USA (2011)

    Google Scholar 

  3. IEEE: IEEE Standard for Wireless Access in Vehicular Environments (WAVE)-Multi-Channel Operation. IEEE Std 1609.4, pp. 1–94 (2016)

    Google Scholar 

  4. Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: 6th ACM MobiHoc, pp. 4657, USA (2005)

    Google Scholar 

  5. Bayraktaroglu, E., et al.: On the performance of IEEE 802.11 under jamming. In: IEEE INFOCOM, Phoenix, AZ, USA, pp. 1265–1273, April 2008

    Google Scholar 

  6. Li, M., Koutsopoulos, I., Poovendran, R.: Optimal jamming attacks and network defense policies in wireless sensor networks. In: IEEE INFOCOM (2007)

    Google Scholar 

  7. Wood, A., Stankovic, J., Son, S.: JAM: a jammed-area mapping service for sensor networks. In: 24th IEEE Real-Time Systems Symposium (2003)

    Google Scholar 

  8. Punal, O., Pereira, C., Aguiar, A., Gross, J.: Experimental characterization and modeling of RF jamming attacks on vanets. IEEE Trans. Veh. Technol. 64(2), 524540 (2015)

    Article  Google Scholar 

  9. Benslimane, A., Nguyen-Minh, H.: Jamming attack model and detection method for beacons under multichannel operation in vehicular networks. IEEE Trans. Veh. Technol. 66(7), 6475–6488 (2017)

    Article  Google Scholar 

  10. Singh, A., Sharma, P.: A novel mechanism for detecting DOS attack in VANET using enhanced attacked packet detection algorithm (EAPDA). In: 2nd International Conference on Recent Advances in Engineering and Computational Sciences (RAECS), Chandigarh, pp. 1–5 (2015)

    Google Scholar 

  11. Sufyan, N., Saqib, N., Zia, M.: Detection of jamming attacks in 802.11b wireless networks. EURASIP J. Wirel. Commun. Netw. 1, 118 (2013)

    Google Scholar 

  12. Roess, R., Prassas, E., McShane, W.: Traffic Engineering. Prentice-Hall, Englewood Cliffs (2004)

    Google Scholar 

  13. Mak, T., Laberteaux K., Sengupta, R.: A multi-channel VANET providing concurrent safety and commercial services. In: 2nd ACM International Workshop on Vehicular Ad Hoc Networks, pp. 1–9. ACM Press, New York (2005)

    Google Scholar 

  14. Bansal, R., Papantoni-Kazakos, P.: An algorithm for detecting a change in a stochastic process. IEEE Trans. Inf. Theory 32, 227235 (1986)

    Article  MathSciNet  Google Scholar 

  15. Salem F., Elhillali, Y., Niar, S.: Efficient modeling of IEEE 802.11p MAC output process for V2X interworking enhancement. IET Netw. (2018). https://doi.org/10.1049/iet-net.2017.0228

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fatma Salem .

Editor information

Editors and Affiliations

Appendix: Proof of Lemma 1

Appendix: Proof of Lemma 1

Let us define

  • CW: The contention window size.

  • \(P_m (\mu ,\sigma ^{2})\): The distribution of the traffic with mean \(\mu \) and variance \(\sigma ^{2}\).

  • P: The probability of successful transmission.

  • \(\lambda \): Poisson arrival rate.

  • k: The expected number of packets that are successfully transmitted during a time interval l given that it started with the transmission of m packets.

When no constraints (i.e., delay or successful transmission bounds) on the transmitted traffic are imposed, the following definition of throughput is meaningful to capture IEEE 802.11p MAC algorithm stability

$$\begin{aligned} \lambda ^* = \sup \big (\mu :\mu =\alpha \big ) \end{aligned}$$
(7)

Let us define the output rate \(\alpha \) such that \(\alpha =\frac{1}{n}\sum _{i=1}^{n} \beta _i \), in [15] it has been proven that the output process of IEEE 802.11p under stable conditions tends to follow a Bernoulli distribution. Hence

$$\begin{aligned} \{\beta _i\}_{1}^{n}\sim \text {Brn} = \left\{ \begin{array}{ll} P(\beta _i=1)=P &{} \text {if the } i^{th} \text { slot is a success slot} \\ P(\beta _i=0)=1-P &{} \text {otherwise} \end{array}\right. \end{aligned}$$
(8)

The only parameter of the Bernoulli output in (8) is P. To define P let us consider the following scenario: Let m represents the total number of arrivals (packets) in a time interval l with rate \(\mu \). If the contention resolution in IEEE 802.11p, induced only a single successful transmission, then the probability of this event is \(P=CW/l\). However, under stable operation of the algorithm this value approaches the input rate i.e., \(P = \mu \) and consequently (7) holds.

Now let m to increase and the quantities \(\mu \) and \(\sigma ^{2}\) in the arrivals’ distribution \(P_m\) simultaneously to decreases so that

$$\begin{aligned} m\mu = \lambda \quad \text {for } \lambda >0, m\gg 1 \end{aligned}$$
(9)

the latter expression is the Poisson theorem, then \(P_m\) converges in distribution to Poisson process, i.e., \(P_m\longrightarrow Pois(\lambda )\). Give Poisson rate \(\lambda \) and in the presence of constraints, the expected number of packets transmitted in the first slot of a time interval l is \(\lambda CW\) and therefore the fraction of packets that are successfully transmitted S during l is \(S = k/\lambda CW\). In [15], recursions for computing the quantity k have been found. In Poisson process, the arrival points in an interval are uniformly distributed. Hence, if a fraction S of the packets are successfully transmitted it means that S is also the fraction of the interval resolved. Therefore, \((k/\lambda CW)CW= k/\lambda \) represents the average portion of the resolved interval, which takes on the average N slots to be resolved. Thus, the algorithm remains stable, even under congestion conditions, whenever it is able to resolve collisions at the rate in which the arrival process progresses in time, that is

$$\begin{aligned} N \leqslant \frac{k}{\lambda } \end{aligned}$$
(10)

(10) defines the maximum value on the input rate \(\lambda \) at this specific CW value so that IEEE 802.11p throughput is maximized while the successfully transmuted packets are bounded by S; thus, the statement in Lemma 1 is a consequence of this.

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Salem, F., Elhillali, Y., Niar, S. (2018). QoS-Based Sequential Detection Algorithm for Jamming Attacks in VANET. In: Doss, R., Piramuthu, S., Zhou, W. (eds) Future Network Systems and Security. FNSS 2018. Communications in Computer and Information Science, vol 878. Springer, Cham. https://doi.org/10.1007/978-3-319-94421-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-94421-0_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-94420-3

  • Online ISBN: 978-3-319-94421-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics