Abstract
The nature of VANET networks makes the network vulnerable to several attacks such as the black hole attack which is part of Denial of Service attacks (DOS). The aim of these attacks is to prohibit users from using one or more services by making the communication unavailable. In this sense and during the routing process, the malicious node tries to acquire the route by forging routing information in order to receive the data and then drops it without transferring it to its destination. In this paper, we propose a novel detection method of such attack during communication in a VANET network. This method is based on a variable control chart which is widely used in the industrial field to monitor the quality of a given process. This method can identify malicious nodes in real time by deploying the monitoring system in each receiving node within the network. Our method is easy to implement and does not require any modification to the 802.11p standard or the routing protocol as we will demonstrate by NS-2 simulations and SUMO microscopic and continuous road traffic simulator using a real map.







Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Aaroud A, El Houssaini MA, El Hore A, Ben-Othman J (2017) Real-time detection of mac layer misbehavior in mobile ad hoc networks. Appl Comput Inf 13(1):1–9. https://doi.org/10.1016/j.aci.2015.11.001
Arathy K, Sminesh CN (2016) A novel approach for detection of single and collaborative black hole attacks in MANET. Proc Technol 25:264–271. https://doi.org/10.1016/j.protcy.2016.08.106
Baadache A, Belmehdi A (2014) Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks. Comput Netw 73:173–184. https://doi.org/10.1016/j.comnet.2014.07.016
Baiad R, Alhussein O, Otrok H, Muhaidat S (2016) Novel cross layer detection schemes to detect blackhole attack against QoS-OLSR protocol in VANET. Veh Commun 5:9–17. https://doi.org/10.1016/j.vehcom.2016.09.001
Carie A et al (2019) Cognitive radio assisted WSN with interference aware AODV routing protocol. J Ambient Intell Hum Comput. https://doi.org/10.1007/s12652-019-01282-6
Chavan AA, Kurule DS, Dere PU (2016) Performance analysis of AODV and DSDV routing protocol in MANET and modifications in AODV against black hole attack. Procedia Comput Sci 79:835–844. https://doi.org/10.1016/j.procs.2016.03.108
Cherkaoui B, Beni-Hssane A, Erritali M (2017a) A clustering algorithm for detecting and handling black hole attack in vehicular ad hoc networks. In: Kacprzyk J (ed) Advances in intelligent systems and computing. Springer, Cham
Cherkaoui B, Beni-Hssane A, Erritali M (2017b) Black hole attack detection in vehicular ad hoc networks using statistical process control. Int J Commun Antenna Propag 7(3):208
Cherkaoui B, Beni-Hssane A, Erritali M (2017c) Quality control chart for detecting the black hole attack in vehicular ad-hoc networks. Procedia Comput Sci 113:170–177
Delkesh T, Jamali MAJ (2019) EAODV: detection and removal of multiple black hole attacks through sending forged packets in MANETs. J Ambient Intell Hum Comput 10(5):1897–1914. https://doi.org/10.1007/s12652-018-0782-7
El Houssaini MA, Aaroud A, El Hore A, et al (2014) Analysis and simulation of MAC layer misbehavior in mobile ad-hoc networks. In: WCCCS 2014 - proceedings; 2014 5th workshop on codes, cryptography and communication systems pp 50–54
Hasrouny H, Samhat AE, Bassil C, Laouiti A (2017) VANet security challenges and solutions: a survey. Veh Commun 7(January):7–20. https://doi.org/10.1016/j.vehcom.2017.01.002
Lee BK, Jeong EH (2016) A black hole detection protocol design based on a mutual authentication scheme on VANET. KSII Trans Internet Inf Syst 10(3):1467–1480
Mahshid R, Mansourvar Z, Hansen HN (2018) Tolerance analysis in manufacturing using process capability ratio with measurement uncertainty. Precision Eng 52:201–210. https://doi.org/10.1016/j.precisioneng.2017.12.008
Montgomery DC (2005) Stastical quality control. Wiley, Hoboken
Von Mulert J, Welch I, Seah WKG (2012) Security threats and solutions in MANETs: a case study using AODV and SAODV. J Netw Comput Appl 35(4):1249–1259. https://doi.org/10.1016/j.jnca.2012.01.019
Oakland JS (2008) Statistical process control, 6th edn. Elsevier, Amsterdam
Purohit KC, Dimri SC, Jasola S (2017) Mitigation and performance analysis of routing protocols under black-hole attack in vehicular ad-hoc network (VANET). Wireless Pers Commun 97(4):5099–5114
Robinson YH et al (2018) FD-AOMDV: fault-tolerant disjoint ad-hoc on-demand multipath distance vector routing algorithm in mobile ad-hoc networks. J Ambient Intell Hum Comput. https://doi.org/10.1007/s12652-018-1126-3
Sakiz F, Sen S (2017) A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Netw 61:33–50. https://doi.org/10.1016/j.adhoc.2017.03.006
Sharef BT, Alsaqour RA, Ismail M (2014) Vehicular communication ad hoc routing protocols: a survey. J Netw Comput Appl 40(1):363–396
Simulation of Urban MObility. https://sumo.sourceforge.net/
The Network Simulator NS-2 Version 2.35. The Network Simulator NS-2 version 2.35. https://www.isi.edu/nsnam/ns/
Tippett LHC (2006) On the extreme individuals and the range of samples taken from a normal population. Biometrika 17(3/4):364
Zardari ZA et al (2019) A dual attack detection technique to identify black and gray hole attacks using an intrusion detection system and a connected dominating set in MANETs. Future Internet 11(3):61
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Cherkaoui, B., Beni-hssane, A. & Erritali, M. Variable control chart for detecting black hole attack in vehicular ad-hoc networks. J Ambient Intell Human Comput 11, 5129–5138 (2020). https://doi.org/10.1007/s12652-020-01825-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-01825-2