DJAVAN: Detecting jamming attacks in Vehicle Ad hoc Networks

نویسندگان

  • Lynda Mokdad
  • Jalel Ben-Othman
  • Anh Tuan Nguyen
چکیده

With development of wireless communications in the two last decades, new infrastructures have been developed. One of them is the Vehicular Ad hoc Networks (VANETs). They are considered as ad hoc networks with the particularity that the topology is always changed, that make more complicated the resource management and open some beaches in security. Specifically on the Physical andMAC layers that aremore vulnerable as they are built on distributed systems and a fluctuating radio channel. Thus, it is not easy to know when transmitted data are not delivered to the destination, if this is due to an attack or to a propagation problem. In this study, we propose a new algorithm DJAVAN (solution of Detecting Jamming Attacks in Vehicle Ad Hoc Networks) to detect a jamming attack in VANETs using the Packet Delivery Ratio (PDR) and with the performance analysis, we determine the threshold that can make the difference between an attack and a poor radio link. © 2015 Elsevier B.V. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving Reliability of Jamming Attack Detection in Ad hoc Networks

Defense against denial of service (DoS) attacks is a critical component of any security system as these attacks can affect the availability of a node or an entire network. In this work, we focus on jamming type DoS attacks at the physical and MAC layers in 802.11 based ad hoc networks. Collisions in wireless networks occur due to varying factors such as jamming attacks, hidden terminal interfer...

متن کامل

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

Jamming attack in MANET: A Selected Review

--A MANET is a collection of nodes that do not rely on a predefined infrastructure to keep the network connected Wireless sensor networks are being used in many applications like health monitoring, military purposes, and home automation. These networks are equipped with large number of sensors, which are spatially distributed. Wireless sensor networks are widely used in remote areas, defense an...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

ADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS

In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Perform. Eval.

دوره 87  شماره 

صفحات  -

تاریخ انتشار 2015