skip to main content
10.1145/2641798.2641800acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Entropy as a new metric for denial of service attack detection in vehicular ad-hoc networks

Published: 21 September 2014 Publication History

Abstract

Vehicular Ad hoc Networks (VANETs) aim to enhance driving conditions and provide with drivers and road users a high level of safety. Thus, they are exposed to several kinds of attacks, especially Denial Of Service attacks family (DOS) which affect the availability of services of authentic users. In this paper, we define "Packets entropy" as a new metric to be used for VANETs denial of service attack detection. We propose also a new detection scheme for this effect. Using "Packets entropy", the proposed method is able to detect VANET DOS attacks by the supervision of traffic traces during short monitoring periods. It presents the advantage of rapidity, to be executed by any node of the VANET network and does not require any modification of the 802.11p MAC layer protocol used as a standard for VANETs. Simulations show the high efficiency of the newly defined metric and the related proposed detection method.

References

[1]
802.11p-2010 - IEEE standard for information technology - local and metropolitan area networks - specific requirements - part 11: Wireless lan medium access control (MAC) and physical layer (PHY) specifications amendment 6: Wireless access in vehicular environments. 11 June 2010.
[2]
802.11--2007 - IEEE standard for information technology - telecommunications and information exchange between systems - local and metropolitan area networks - specific requirements - part 11: Wireless lan medium access control (MAC) and physical layer (PHY) specifications. IEEE STANDARD, 12 June 2007.
[3]
Simulation of urban mobility, http:// sumo.sourceforge.net/. 2014.
[4]
1609.3--2010 - IEEE standard for wireless access in vehicular environments (wave) networking services (revision of IEEE std 1609.3-2007). 30 December 2010.
[5]
1609.4--2010 - IEEE standard for wireless access in vehicular environments (wave)--multi-channel operation (revision of IEEE std 1609.4--2006). 7 February 2011.
[6]
S. Buchegger and J.-Y. Le Boudec. Performance analysis of the confidant protocol. In Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, pages 226--236. ACM, 2002.
[7]
S. Buchegger, C. Tissieres, and J.-Y. Le Boudec. A test-bed for misbehavior detection in mobile ad-hoc networks-how much can watchdogs really do? In Mobile Computing Systems and Applications, 2004. WMCSA 2004. Sixth IEEE Workshop on, pages 102--111. IEEE, 2004.
[8]
A. A. Cardenas, S. Radosavac, and J. S. Baras. Detection and prevention of MAC layer misbehavior in ad hoc networks. In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pages 17--22. ACM, 2004.
[9]
C. Cerasoli and J. Dimarogonas. The generalization of information entropy to manet metrics. In Military Communications Conference, 2008. MILCOM 2008. IEEE, pages 1--9. IEEE, 2008.
[10]
A. Dhamgaye and N. Chavhan. Survey on security challenges in VANET. International Journal of Computer Science, 2, 2013.
[11]
A. Hamieh, J. Ben-Othman, A. Gueroui, and F. Naıt-Abdesselam. Detecting greedy behaviors by linear regression in wireless ad hoc networks. In Communications, 2009. ICC'09. IEEE International Conference on, pages 1--6. IEEE, 2009.
[12]
ITS. Its standars fact sheets of IEEE, http://www.standards.its.dot.gov/factsheets/factsheet/80 seen february 25 2014. 2014.
[13]
S. S. Kaushik. Review of different approaches for privacy scheme in VANETs. International Journal, 5, 2013.
[14]
P. Kyasanur and N. H. Vaidya. Detection and handling of MAC layer misbehavior in wireless networks. In DSN, pages 173--182. Citeseer, 2003.
[15]
M. N. Mejri, J. Ben-Othman, and M. Hamdi. Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communications, 2014.
[16]
L. Miao, K. Djouani, B. J. van Wyk, and Y. Hamam. Evaluation and enhancement of IEEE 802.11 p standard: A survey. Mobile Computing, 2012.
[17]
NS-3. ns-3, http://www.nsnam.org/. 2014.
[18]
M. Raya, J.-P. Hubaux, and I. Aad. Domino: a system to detect greedy behavior in IEEE 802.11 hotspots. In Proceedings of the 2nd international conference on Mobile systems, applications, and services, pages 84--97. ACM, 2004.
[19]
C. E. Shannon and W. Weaver. The mathematical theory of communication (urbana, il. University of Illinois Press, 19(7):1, 1949.
[20]
S. Zeadally, R. Hunt, Y.-S. Chen, A. Irwin, and A. Hassan. Vehicular ad hoc networks (VANETs): status, results, and challenges. Telecommunication Systems, 50(4):217--241, 2012.

Cited By

View all

Index Terms

  1. Entropy as a new metric for denial of service attack detection in vehicular ad-hoc networks

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        MSWiM '14: Proceedings of the 17th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
        September 2014
        352 pages
        ISBN:9781450330305
        DOI:10.1145/2641798
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 21 September 2014

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. IEEE 802.11p
        2. attacks
        3. denial of service (dos)
        4. entropy
        5. greedy behavior
        6. vehicular ad hoc networks (vanets)

        Qualifiers

        • Research-article

        Conference

        MSWiM'14
        Sponsor:

        Acceptance Rates

        MSWiM '14 Paper Acceptance Rate 32 of 128 submissions, 25%;
        Overall Acceptance Rate 398 of 1,577 submissions, 25%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)2
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 01 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media