Skip to main content
Log in

SE-AOMDV: secure and efficient AOMDV routing protocol for vehicular communications

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

The Vehicular Ad hoc Networks (VANETs) are emerging networks that provide essential services to drivers on the road. To exchange data, vehicles as network nodes route information between source and destination using the V-to-V infrastructure. To retrieve the best path, routing algorithms are used. We focus in this paper on the Ad hoc On-demand Multipath Distance Vector (AOMDV) routing algorithm, which is able to retrieve at least three paths. Despite, its efficiency for VANET, the AOMDV protocol still faces big challenges in terms of security. Because of the lack of security mechanisms, such as cryptography and intrusion detection, the AOMDV protocol is vulnerable to attacks such as the blackhole and the man in the middle attacks. For this purpose, we propose in this work a secure and efficient AOMDV routing protocol for vehicular communications. The security consists of detecting malicious vehicles that are not authenticated and have malicious behavior. Moreover, to guarantee integrity and authentication of Route REPlay packets that are used to retrieve the best and secure paths. The efficiency consists of node disjuncture for RREP packets. Our algorithm is specific to vehicular networks, because it deploys specific vehicle-based authentication. The performance of the proposed protocol is evaluated using the NS2 and compared to AOMDV and then to SAODV and TS-AOMDV. The results prove that our algorithm is more secure and efficient than AOMDV, especially in terms of average end-to-end delay, for high-speed vehicles. The delay reduction is estimated to 1.5 ms for a speed of 108 km/h, which is promising for vehicular communications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Guizani, M., He, D., Ren, K., Rodrigues, J.J., Chan, S., Zhang, Y.: Security and privacy in emerging networks: part II [Guest Editorial]. IEEE Commun. Mag. 53(8), 40–41 (2015)

    Article  Google Scholar 

  2. Zhang, Y., Chen, M., Guizani, N., Wu, D., Leung, V.C.: Sovcan: safety-oriented vehicular controller area network. IEEE Commun. Mag. 55(8), 94–99 (2017)

    Article  Google Scholar 

  3. National Highway Traffic Safety Administration(NHTSA): Cybersecurity best practices for modern vehicles, available at: https://www.nhtsa.gov/technology-innovation/vehicle-cybersecurity (2019). Accessed Feb 2019

  4. Murshedi, T.A., Wang, X., Cheng, H.: On-demand multipath routing protocols for mobile ad-hoc networks: a comparative survey. Int. J. Future Comput. Commun. 5(3), 148 (2016)

    Article  Google Scholar 

  5. Sun, Y., Wu, L., Wu, S., Li, S., Zhang, T., Zhang, L., Cui, X.: Attacks and countermeasures in the internet of vehicles. Ann. Telecommun. 72(5–6), 283–295 (2017)

    Article  Google Scholar 

  6. Jadoon, A.K., Khan, Q., Ilahi, A.T., Iqbal, W.: A survey on security challenges in VANET. Int. J. Comput. Sci. Inf. Secur. 14(9), 217 (2016)

    Google Scholar 

  7. Hasrouny, H., Samhat, A.E., Bassil, C., Laouiti, A.: VANet security challenges and solutions: a survey. Veh. Commun. 7, 7–20 (2017)

    Google Scholar 

  8. La Vinh, H., Cavalli, A.R.: Security attacks and solutions in vehicular ad hoc networks: a survey. Int. J. AdHoc Netw. Syst. (IJANS) 4(2), 1–20 (2014)

    Article  Google Scholar 

  9. Shukla, D., Vaibhav, A., Das, S., Johri, P.: Security and attack analysis for vehicular ad hoc network: a survey. In: 2016 International Conference on Computing, Communication and Automation (ICCCA), pp. 625–630 (2016)

  10. Lyamin, N., Vinel, A., Jonsson, M., Loo, J.: Real-time detection of denial-of-service attacks in IEEE 802.11 p vehicular networks. IEEE Commun. Lett. 18(1), 110–113 (2014)

    Article  Google Scholar 

  11. Saad, A., Abdalrazak, T.R., Hussein, A.J., Abdullah, A.M.: Vehicular ad hoc networks: growth and survey for three layers. Int. J. Electr. Comput. Eng. 7(1), 271 (2017)

    Google Scholar 

  12. Tyagi, P., Dembla, D.: Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET). Egypt. Inform. J. 18(2), 133–139 (2017)

    Article  Google Scholar 

  13. Dhyani, I., Goel, N., Sharma, G., Mallick, B.: A Reliable Tactic for Detecting Black Hole Attack in Vehicular Ad Hoc Networks, Advances in Computer and Computational Sciences, pp. 333–343. Springer, Singapore (2017)

    Google Scholar 

  14. Sultana, J., and Ahmed, T. : Securing AOMDV protocol in mobile adhoc network with elliptic curve cryptography. In: International Conference on Electrical, Computer and Communication Engineering (ECCE), pp. 539–543 (2017)

  15. Borkar, G.M., Mahajan, A.R.: A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks. Wirel. Netw. 23(8), 2455–2472 (2017)

    Article  Google Scholar 

  16. Gurung, S., Siddhartha, S.: A review of black-hole attack mitigation techniques and its drawbacks in mobile ad-hoc network. In: Proceedings of the 2nd IEEE international conference on WiSPNET, pp. 2409–2415 (2017)

  17. Alkhamisi, A. O., Buhari, S. M.: Trusted secure adhoc on-demand multipath distance vector routing in MANET. In: 2016 IEEE 30th international conference on advanced information networking and applications (AINA), Crans-Montana, pp. 212–219 (2016)

  18. Pathan, M.S., Zhu, N., He, J., Zardari, Z.A., Memon, M.Q., Hussain, M.I.: An efficient trust-based scheme for secure and quality of service routing in MANETs. Future Internet 10(2), 16 (2018)

    Article  Google Scholar 

  19. Kukreja, D., Dhurandher, S.K., Reddy, B.V.R.: Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack. J. Ambient Intell. Human Comput. 9(4), 941–956 (2018). https://doi.org/10.1007/s12652-017-0496-2

    Article  Google Scholar 

  20. Vedhavathy, T.R., Manikandan, M.S.K.: Triple referee incentive mechanism for secure mobile adhoc networks. Cluster Comput. (2018). https://doi.org/10.1007/s10586-017-1631-8

  21. Maxim, R., Papadimitratos, P., Hubaux, J.P.: Securing vehicular communications. IEEE Wirel. Commun. 13, 8–15 (2006)

    Google Scholar 

  22. Shen, A. N., Guo, S., Zeng, D., Guizani, M.: A lightweight privacy-preserving protocol using chameleon hashing for secure vehicular communications. In: 2012 IEEE Wireless Communications and Networking Conference (WCNC), pp. 2543–2548 (2012)

  23. Li, J., Lu, H., Guizani, M.: ACPN: a novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Trans. Parallel Distrib. Syst. 26(4), 938–948 (2015)

    Article  Google Scholar 

  24. Jiang, S., Zhu, X., Wang, L.: An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Trans. Intell. Transp. Syst. 17(8), 2193–2204 (2016)

    Article  Google Scholar 

  25. Rekik, M., Obaidat. M.S., Meddeb-Makhlouf, A., Zarai, F.: An optimized and secure authentication scheme for vehicular ad hoc networks. In: 2018 IEEE International Conference on Communications (ICC), Kansas City (2018)

  26. Khan, U., Agrawal, S., Silakari, S.: Detection of malicious nodes (DMN) in vehicular ad-hoc networks. Proc. Comput. Sci. 46, 965–972 (2015)

    Article  Google Scholar 

  27. Souza, A.M., Brennand, C.A., Yokoyama, R.S., Donato, E.A., Madeira, E.R., Villas, L.A.: Traffic management systems: a classification, review, challenges, and future perspectives. Int. J. Distrib. Sensor Netw. 13(4), 1550147716683612 (2017)

    Article  Google Scholar 

  28. Raw, R.S., Kumar, M., Singh, N.: Security challenges, issues and their solutions for VANET. Int. J. Netw. Secur. Appl. 5(5), 95 (2013)

    Google Scholar 

  29. NS-2 (Wireless and Mobility Extensions). https://www.isi.edu/nsnam/ns/doc/node169.html (2018). Accessed 13 Dec 2018

  30. VANET simulations. http://neo.lcc.uma.es/staff/jamal/vanet/?q=node/11 (2018). Accessed 13 Dec 2018

  31. Periyasamy, P., Karthikeyan, E.: Performance evaluation of AOMDV protocol based on various scenario and traffic patterns. Int. J. Comput. Sci. Eng. Appl. 1(6), 33 (2011)

    Google Scholar 

  32. Arulkumar, N., Raj, E.G.D.P.: A simulation based study to implement intelligent transport systems concepts in VANETs using AODV routing protocol in NS2. In: International Conference on Advanced Computing (ICoAC), pp. 1–4 (2012)

  33. Al-Saadi, A., Setchi, R., Hicks, Y., Allen, S.M.: Routing protocol for heterogeneous wireless mesh networks. IEEE Trans. Veh. Technol. 65(12), 9773–9786 (2016)

    Article  Google Scholar 

  34. Nugraha, M. A., Sudiharto, D. W., Herutomo, A.: Performance comparative analysis between ARAN and SAODV on VANET facing the blackhole. In: 2017 International Conference on Electrical Engineering and Informatics (ICELTICs), Banda Aceh, pp. 1–6 (2017)

Download references

Acknowledgements

Author Mohsen Guizani extends his appreciation to the International Scientific Partnership Program (ISPP) at King Saud University for funding this research work through ISPP.

Funding

This study was funded by the King Saud University through ISPP (International Scientific Partnership Program).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amel Meddeb Makhlouf.

Ethics declarations

Conflict of interest

Authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Meddeb Makhlouf, A., Guizani, M. SE-AOMDV: secure and efficient AOMDV routing protocol for vehicular communications. Int. J. Inf. Secur. 18, 665–676 (2019). https://doi.org/10.1007/s10207-019-00436-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-019-00436-z

Keywords

Navigation