A secure cross-layer architecture for reactive routing in vehicle to vehicle (V2V) communications
Introduction
Vehicular networks are now widely regarded as an effective technology for providing safety and comfort to both drivers and pedestrians. If drivers receive an urgent message half a second before the collision, 60 percent of accidents can be prevented [1]. Vehicular networks face many attacks [2], [3], [4], [5]. To offer predictable services, the networks' security should be ensured. The Dedicated Short-Range Communication (DSRC) channels are assigned by the Federal Communications Commission (FCC) and the European Intelligent Transportation System (ETSI) [6], [7]. The DSRC uses seven 10 MHz channels, numbered 172 to 184, that are currently dispersed across the spectrum between 5.860 and 5.925 GHz bands. FCC uses control channel 178 for secure communication only, while channels 174, 176, 180, and 182 are used to report insecure communications. Channels 172 and 184, the first and last channels respectively, are used for specific purposes such as high priority applications that prevent lower priority transmissions and intersection collision applications [4], [8]. However, in ETSI, the control channel 180 and the four service channels 176, 178, 182, and 184 are used for safety and traffic efficiency, while channels 172 and 174 are for non-safety applications such as traffic efficiency and service announcements [7] (Fig. 1).
Our work is based on a reactive routing protocol that starts by broadcasting a Route REQuest (RREQ) message from the source to find different paths to the destination. Next, in the reverse direction, the destination vehicle sends a Route REPly (RREP) message [9]. The intermediate vehicle measures the Signal to Interference Ratio (SIR) on the available CHannels (CH) during the reply state. Next, the vehicle chooses the maximum SIR value. The previously stated maximum SIR value is compared with the minimum SIR threshold. If the maximum SIR value is greater than the minimum SIR threshold, the maximum SIR value is sent in the reply message. Otherwise, the route reply is dropped. Each vehicle executes the proposed technique, with the maximum SIR value being compared to the maximum SIR value obtained from the RREP. The new maximum SIR value that will be delivered in the new route reply is the minimum value established between the previous two maxima. Finally, when the source receives many RREPs with various SIR values, the largest SIR value is used as the selection criterion. As a special case, when the source receives several RREPs with same SIR values, the shortest path is used as selection criterion.
In our work, we focus on detecting two types of attacks that occur at the network layer and MAC layer in the vehicle to reduce E2E delay and overhead as well as increase the PDR. In the first algorithm, we focus on detecting the attacks done by malicious vehicles in the destination address field. We implemented the proposed algorithm by creating a buffer that contains the input address and the output address. After every periodic time T, we checked the buffer of each vehicle. If the percentage of the changed destination addresses is greater than the , then the vehicle is considered malicious. In the second algorithm, we focus on detecting the attack on the SIR value. The attack occurs in three ways: in the first approach, the attack is made by modifying the SIR value. In the second approach, the power received is adjusted according to the sending of the periodic message with fake position to the current vehicle from its neighbors. In the third approach, the attack is done by modifying the power transmitted by the vehicle.
We organize the rest of the paper as follows. Section 2 presents a review of related works. Section 3 describes our previous work. Section 4 describes our proposed algorithms namely, the destination anti-attack and SIR anti-attack. Section 5 presents an evaluation of the effectiveness of the proposed algorithms. Finally, section 6 concludes the paper.
Section snippets
Related work and our research contributions
We present a literature review of solutions that detect several types of attacks on vehicular networks in the following section and Table 1.
Our previous works
In this paper, we rely on the routing protocol published in our previous work [31]. However, the proposed algorithm relies on a novel method in choosing the optimal path between source and destination based on a new parameter which is the signal-to-interference ratio (SIR). Different interference levels on different channels are used to calculate the SIR value. The proposed approach in this work estimates the SIR level for each car in the topology of each available channel (Equation (1)) [9].
Proposed scheme
In this section, we present two algorithms to protect the MAC and network layers against malicious behaviors. We describe these algorithms below.
- •
Detect the modification of the destination address done by an intermediate vehicle.
- •
Detect the alteration attack that changes the SIR value.
Simulation
In this section, we present the performance evaluation results of our two proposed algorithms. In the first type of attack, we poisoned the reactive routing protocol in order to create malicious vehicles in the network to check the network performance in the presence of these vehicles. In other words, we modified the source code to change the destination address field in the RREQ packet at each malicious vehicle and insert a random value instead of the destination address. In this way, the
Conclusion
Vehicular communications have become an active area of research and standardization. This type of network is being exposed to several security challenges. In this paper, we proposed two anti-attack algorithms. In the first one, the goal was to detect any fabrication on the destination address of a packet by a M_V. This malicious behavior was detected by using a lightweight buffer on each vehicle, that records input and output destination addresses and checking the number of outmatching pairs.
Declaration of Competing Interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Acknowledgement
We thank the anonymous reviewers for their valuable comments which helped us improve the quality and presentation of this paper. This work is supported by the research chair connected cars and Cyber Security (C3S) founded by Nokia, Renault, Thales, Valeo, Wavestone, Fondation Mines-Telecom, and Telecom Paris. Sherali Zeadally was supported by a 2021-2022 Fulbright U.S. scholar grant award administered by the U.S. Department of Stat's Bureau of Educational and Cultural Affairs and through its
References (36)
- et al.
Secure authentication and privacy-preserving techniques in vehicular ad-hoc networks (VANETs)
Veh. Commun.
(02 2020) - et al.
A distributed network intrusion detection system for DDoS detection in VANET
IEEE Access
(10 2019) - et al.
Vehicular ad-hoc network (VANET): review
- et al.
Traffic analysis for accidents reduction in VANET's
- et al.
Denial of service (DoS) attacks detection in MANETs using Bayesian classifiers
- et al.
Security attacks and solutions for vehicular ad hoc networks
IET Commun.
(2010) - et al.
Vehicular communications for ITS: standardization and challenges
IEEE Commun. Stand. Mag.
(2020) - et al.
A performance study of cooperative awareness in ETSI ITS G5 and IEEE WAVE
- et al.
Support vector machine (SVM) based sybil attack detection in vehicular networks
- et al.
A cross-layered scheme for multichannel and reactive routing in vehicular ad hoc networks
Trans. Emerg. Telecommun. Technol.
(02 2022)