Skip to main content
Top
Published in: Wireless Networks 6/2017

07-04-2016

Security upgrade against RREQ flooding attack by using balance index on vehicular ad hoc network

Authors: Mohammad Javad Faghihniya, Seyed Mojtaba Hosseini, Maryam Tahmasebi

Published in: Wireless Networks | Issue 6/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

VANET is an ad hoc network that formed between vehicles. Security in VANET plays vital role. AODV routing protocol is a reactive or on-demand routing protocol which means if there is data to be send then the path will create. AODV is the most commonly used topology based routing protocol for VANET. Using of broadcast packets in the AODV route discovery phase caused it is extremely vulnerable against DOS and DDOS flooding attacks. Flooding attack is type of a denial of service attack that causes loss of network bandwidth and imposes high overhead to the network. The method proposed in this paper called Balanced AODV (B-AODV) because it expects all network node behave normally. If network nodes are out of the normal behavior (too much route request) then they identified as malicious node. B-AODV is designed with following feature: (1) The use of adaptive threshold according to network conditions and nodes behavior (balance index) (2) Not using additional routing packets to detect malicious nodes (3) Perform detection and prevention operations independently on each node (4) Perform detection and prevention operations in real time (5) No need for promiscuous mode. This method for detection and prevention flooding attack uses average and standard deviation. In this method each node is employing balance index for acceptation or rejection RREQ packets. The results of the simulation in NS2 indicates B-AODV is resilience against flooding attack and prevent loss of network bandwidth. Comparing between AODV with B-AODV in normal state (non-attacker) shows B-AODV is exactly match with AODV in network performance, this means that the B-AODV algorithm does not impose any overhead and false positive to AODV.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Vasilakos, A. V., Li, Z., Simon, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.CrossRef Vasilakos, A. V., Li, Z., Simon, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.CrossRef
2.
go back to reference Zhou, L., Naixue, X., Shu, L., Vasilakos, A., Yeo, S. S. (2010). Context-aware middleware for multimedia services in heterogeneous networks. IEEE Intelligent Systems, 25, 40–47. doi:10.1109/MIS.2010.48.CrossRef Zhou, L., Naixue, X., Shu, L., Vasilakos, A., Yeo, S. S. (2010). Context-aware middleware for multimedia services in heterogeneous networks. IEEE Intelligent Systems, 25, 40–47. doi:10.​1109/​MIS.​2010.​48.CrossRef
3.
go back to reference Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In INFOCOM, 2012 Proceedings IEEE, 2012 (pp. 100–108). Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In INFOCOM, 2012 Proceedings IEEE, 2012 (pp. 100–108).
4.
go back to reference Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25, 3264–3273.CrossRef Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25, 3264–3273.CrossRef
5.
go back to reference Meng, T., Wu, F., Chen, G., & Vasilakos, A. V. (2014). Revisiting routing in multi-hop wireless networks: Spatial reusability-aware routing. In Global communications conference (GLOBECOM), 2014 IEEE, 2014 (pp. 88–93). Meng, T., Wu, F., Chen, G., & Vasilakos, A. V. (2014). Revisiting routing in multi-hop wireless networks: Spatial reusability-aware routing. In Global communications conference (GLOBECOM), 2014 IEEE, 2014 (pp. 88–93).
6.
go back to reference Meng, T., Wu, F., Yang, Z., Chen, G., & Vasilakos, A. V. (2016). Spatial reusability-aware routing in multi-hop wireless networks. IEEE Transactions on Computers, 65, 244–255.MathSciNetCrossRefMATH Meng, T., Wu, F., Yang, Z., Chen, G., & Vasilakos, A. V. (2016). Spatial reusability-aware routing in multi-hop wireless networks. IEEE Transactions on Computers, 65, 244–255.MathSciNetCrossRefMATH
7.
go back to reference Blum, J., & Eskandarian, A. (2004). The threat of intelligent collisions. IT Professional, 6, 24–29.CrossRef Blum, J., & Eskandarian, A. (2004). The threat of intelligent collisions. IT Professional, 6, 24–29.CrossRef
8.
go back to reference Zeng, Y., Xiang, K., Li, D., & Vasilakos, A. V. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19, 161–173.CrossRef Zeng, Y., Xiang, K., Li, D., & Vasilakos, A. V. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19, 161–173.CrossRef
9.
go back to reference Yang, M., Li, Y., Jin, D., Zeng, L., Wu, X., & Vasilakos, A. V. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. Mobile Networks and Applications, 20, 4–18.CrossRef Yang, M., Li, Y., Jin, D., Zeng, L., Wu, X., & Vasilakos, A. V. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. Mobile Networks and Applications, 20, 4–18.CrossRef
10.
go back to reference Dvir, A., & Vasilakos, A. V. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41, 405–406. Dvir, A., & Vasilakos, A. V. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41, 405–406.
11.
go back to reference Moustafa, H., Senouci, S. M., & Jerbi, M. (2008). Introduction to vehicular networks. 10th November. Moustafa, H., Senouci, S. M., & Jerbi, M. (2008). Introduction to vehicular networks. 10th November.
12.
go back to reference van der Heijden, R. W. & Kargl, F. (2014). Open issues in differentiating misbehavior and anomalies for VANETs. van der Heijden, R. W. & Kargl, F. (2014). Open issues in differentiating misbehavior and anomalies for VANETs.
13.
go back to reference Simaremare, H., Abouaissa, A., Sari, R. F., & Lorenz, P. (2015). Security and performance enhancement of AODV routing protocol. International Journal of Communication Systems, 28, 2003–2019. doi:10.1002/dac.2837.CrossRef Simaremare, H., Abouaissa, A., Sari, R. F., & Lorenz, P. (2015). Security and performance enhancement of AODV routing protocol. International Journal of Communication Systems, 28, 2003–2019. doi:10.​1002/​dac.​2837.CrossRef
14.
go back to reference Wang, T., Liu, Y., & Vasilakos, A. V. (2015). Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Networks, 21, 1835–1846.CrossRef Wang, T., Liu, Y., & Vasilakos, A. V. (2015). Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Networks, 21, 1835–1846.CrossRef
15.
go back to reference Canavan, J. E. (2001). Fundamentals of network security. Norwood: Artech House.MATH Canavan, J. E. (2001). Fundamentals of network security. Norwood: Artech House.MATH
16.
go back to reference Yeh, L.-Y., Chen, Y.-C., & Huang, J.-L. (2011). PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. Computer Communications, 34, 447–456.CrossRef Yeh, L.-Y., Chen, Y.-C., & Huang, J.-L. (2011). PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. Computer Communications, 34, 447–456.CrossRef
17.
go back to reference Mejri, M. N., Ben-Othman, J., & Hamdi, M. (2014). Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communications, 1, 53–66.CrossRef Mejri, M. N., Ben-Othman, J., & Hamdi, M. (2014). Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communications, 1, 53–66.CrossRef
18.
go back to reference Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on demand distance vector (AODV) routing (RFC 3561), IETF MANET Working Group. Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on demand distance vector (AODV) routing (RFC 3561), IETF MANET Working Group.
19.
go back to reference Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in mobile ad hoc networks: challenges and solutions. Wireless Communications, IEEE, 11, 38–47.CrossRef Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in mobile ad hoc networks: challenges and solutions. Wireless Communications, IEEE, 11, 38–47.CrossRef
20.
go back to reference Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for Internet of Things. Journal of network and computer applications, 42, 120–134.CrossRef Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for Internet of Things. Journal of network and computer applications, 42, 120–134.CrossRef
21.
go back to reference Feng, Z., Zhu, Y., Zhang, Q., Ni, L. M., & Vasilakos, A. V. (2014). TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing. In INFOCOM, 2014 Proceedings IEEE, 2014 (pp. 1231–1239). Feng, Z., Zhu, Y., Zhang, Q., Ni, L. M., & Vasilakos, A. V. (2014). TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing. In INFOCOM, 2014 Proceedings IEEE, 2014 (pp. 1231–1239).
22.
go back to reference Song, Y., Liu, L., Ma, H., & Vasilakos, A. V. (2014). A biology-based algorithm to minimal exposure problem of wireless sensor networks. IEEE Transactions on Network and Service Management, 11, 417–430.CrossRef Song, Y., Liu, L., Ma, H., & Vasilakos, A. V. (2014). A biology-based algorithm to minimal exposure problem of wireless sensor networks. IEEE Transactions on Network and Service Management, 11, 417–430.CrossRef
23.
go back to reference Youssef, M., Ibrahim, M., Abdelatif, M., Chen, L., & Vasilakos, A. V. (2014). Routing metrics of cognitive radio networks: A survey. IEEE Communications Surveys & Tutorials, 16, 92–109.CrossRef Youssef, M., Ibrahim, M., Abdelatif, M., Chen, L., & Vasilakos, A. V. (2014). Routing metrics of cognitive radio networks: A survey. IEEE Communications Surveys & Tutorials, 16, 92–109.CrossRef
24.
go back to reference Fadlullah, Z. M., Taleb, T., Vasilakos, A. V., Guizani, M., & Kato, N. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking (TON), 18, 1234–1247.CrossRef Fadlullah, Z. M., Taleb, T., Vasilakos, A. V., Guizani, M., & Kato, N. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking (TON), 18, 1234–1247.CrossRef
25.
go back to reference Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef
26.
go back to reference Zhou, J., Cao, Z., Dong, X., Xiong, N., & Vasilakos, A. V. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Sciences, 314, 255–276.CrossRef Zhou, J., Cao, Z., Dong, X., Xiong, N., & Vasilakos, A. V. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Sciences, 314, 255–276.CrossRef
27.
go back to reference Zhou, J., Cao, Z., Dong, X., Lin, X., & Vasilakos, A. V. (2013). Securing m-healthcare social networks: Challenges, countermeasures and future directions. IEEE Wireless Communications, 20, 12–21.CrossRef Zhou, J., Cao, Z., Dong, X., Lin, X., & Vasilakos, A. V. (2013). Securing m-healthcare social networks: Challenges, countermeasures and future directions. IEEE Wireless Communications, 20, 12–21.CrossRef
28.
go back to reference Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100, 3172–3186.CrossRef Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100, 3172–3186.CrossRef
29.
go back to reference Gunasekaran, M., Premalatha, K., & Gopalakrishnan, B. (2010). A survey on DoS attacks and countermeasures in mobile Ad Hoc networks. International Journal of Advanced Research in Computer Science, 1(4), 156–164. Gunasekaran, M., Premalatha, K., & Gopalakrishnan, B. (2010). A survey on DoS attacks and countermeasures in mobile Ad Hoc networks. International Journal of Advanced Research in Computer Science, 1(4), 156–164.
30.
go back to reference Sawant, K., & Rawat, D. M. Survey of DOS flooding attacks over MANET environment. International Journal of Engineering Research and Applications, 4(5), 110–115. Sawant, K., & Rawat, D. M. Survey of DOS flooding attacks over MANET environment. International Journal of Engineering Research and Applications, 4(5), 110–115.
31.
go back to reference Von Mulert, J., Welch, I., & Seah, W. K. (2012). Security threats and solutions in MANETs: A case study using AODV and SAODV. Journal of network and computer Applications, 35, 1249–1259.CrossRef Von Mulert, J., Welch, I., & Seah, W. K. (2012). Security threats and solutions in MANETs: A case study using AODV and SAODV. Journal of network and computer Applications, 35, 1249–1259.CrossRef
32.
go back to reference Jiang, T., Wang, H., & Vasilakos, A. V. (2012). QoE-driven channel allocation schemes for multimedia transmission of priority-based secondary users over cognitive radio networks. IEEE Journal on Selected Areas in Communications, 30, 1215–1224.CrossRef Jiang, T., Wang, H., & Vasilakos, A. V. (2012). QoE-driven channel allocation schemes for multimedia transmission of priority-based secondary users over cognitive radio networks. IEEE Journal on Selected Areas in Communications, 30, 1215–1224.CrossRef
33.
go back to reference Liu, B., Bi, J., & Vasilakos, A. V. (2014). Toward incentivizing anti-spoofing deployment. IEEE Transactions on Information Forensics and Security, 9, 436–450.CrossRef Liu, B., Bi, J., & Vasilakos, A. V. (2014). Toward incentivizing anti-spoofing deployment. IEEE Transactions on Information Forensics and Security, 9, 436–450.CrossRef
34.
go back to reference Yao, G., Bi, J., & Vasilakos, A. V. (2015). Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter. IEEE Transactions on Information Forensics and Security, 10, 471–484.CrossRef Yao, G., Bi, J., & Vasilakos, A. V. (2015). Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter. IEEE Transactions on Information Forensics and Security, 10, 471–484.CrossRef
35.
go back to reference Shandilya, S. K., & Sahu, S. (2010). A trust based security scheme for RREQ flooding attack in MANET. International Journal of Computer Applications, 5, 0975–8887.CrossRef Shandilya, S. K., & Sahu, S. (2010). A trust based security scheme for RREQ flooding attack in MANET. International Journal of Computer Applications, 5, 0975–8887.CrossRef
36.
go back to reference Bhargava, S. & Agrawal, D. P. (2001). Security enhancements in AODV protocol for wireless ad hoc networks. In Vehicular technology conference, 2001. VTC 2001 Fall. IEEE VTS 54th, 2001 (pp. 2143–2147). Bhargava, S. & Agrawal, D. P. (2001). Security enhancements in AODV protocol for wireless ad hoc networks. In Vehicular technology conference, 2001. VTC 2001 Fall. IEEE VTS 54th, 2001 (pp. 2143–2147).
37.
go back to reference Golle, P., Greene, D., & Staddon, J. (2004). Detecting and correcting malicious data in VANETs. In Proceedings of the 1st ACM international workshop on vehicular ad hoc networks, 2004 (pp. 29–37). Golle, P., Greene, D., & Staddon, J. (2004). Detecting and correcting malicious data in VANETs. In Proceedings of the 1st ACM international workshop on vehicular ad hoc networks, 2004 (pp. 29–37).
38.
go back to reference Yi, P., Dai, Z., Zhong, Y., & Zhang, S. (2005). Resisting flooding attacks in ad hoc networks. In Information technology: Coding and computing, 2005. ITCC 2005. International conference on, 2005 (pp. 657–662). Yi, P., Dai, Z., Zhong, Y., & Zhang, S. (2005). Resisting flooding attacks in ad hoc networks. In Information technology: Coding and computing, 2005. ITCC 2005. International conference on, 2005 (pp. 657–662).
39.
go back to reference Song, J.-H., Hong, F., & Zhang, Y. (2006). Effective filtering scheme against RREQ flooding attack in mobile ad hoc networks. In PDCAT, 2006 (pp. 497–502). Song, J.-H., Hong, F., & Zhang, Y. (2006). Effective filtering scheme against RREQ flooding attack in mobile ad hoc networks. In PDCAT, 2006 (pp. 497–502).
40.
go back to reference Eu, Z. A., & Seah, W. K. G. (2006). Mitigating route request flooding attacks in mobile ad hoc networks. In I. Chong & K. Kawahara (Eds.), Information networking. Advances in data communications and wireless networks (pp. 327–336). Verlag Berlin Hiedelberg: Springer. Eu, Z. A., & Seah, W. K. G. (2006). Mitigating route request flooding attacks in mobile ad hoc networks. In I. Chong & K. Kawahara (Eds.), Information networking. Advances in data communications and wireless networks (pp. 327–336). Verlag Berlin Hiedelberg: Springer.
41.
go back to reference Nakayama, H., Kurosawa, S., Jamalipour, A., Nemoto, Y., & Kato, N. (2009). A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 58, 2471–2481.CrossRef Nakayama, H., Kurosawa, S., Jamalipour, A., Nemoto, Y., & Kato, N. (2009). A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 58, 2471–2481.CrossRef
42.
go back to reference Nadeem, A. & Howarth, M. (2009). Adaptive intrusion detection and prevention of denial of service attacks in MANETs. In Proceedings of the 2009 international conference on wireless communications and mobile computing: Connecting the world wirelessly, 2009 (pp. 926–930). Nadeem, A. & Howarth, M. (2009). Adaptive intrusion detection and prevention of denial of service attacks in MANETs. In Proceedings of the 2009 international conference on wireless communications and mobile computing: Connecting the world wirelessly, 2009 (pp. 926–930).
43.
go back to reference Venkataraman, R., Pushpalatha, M., Khemka, R. & Rao, T. R. (2009). Prevention of flooding attacks in mobile ad hoc networks. In Proceedings of the international conference on advances in computing, communication and control, 2009 (pp. 525–529). Venkataraman, R., Pushpalatha, M., Khemka, R. & Rao, T. R. (2009). Prevention of flooding attacks in mobile ad hoc networks. In Proceedings of the international conference on advances in computing, communication and control, 2009 (pp. 525–529).
44.
go back to reference Yen, Y.-S., Chao, H.-C., Chang, R.-S., & Vasilakos, A. (2011). Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Mathematical and Computer Modelling, 53, 2238–2250.CrossRef Yen, Y.-S., Chao, H.-C., Chang, R.-S., & Vasilakos, A. (2011). Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Mathematical and Computer Modelling, 53, 2238–2250.CrossRef
45.
go back to reference Malekzadeh, M., Ghani, A. A. A., & Subramaniam, S. (2012). A new security model to prevent denial-of-service attacks and violation of availability in wireless networks. International Journal of Communication Systems, 25, 903–925.CrossRef Malekzadeh, M., Ghani, A. A. A., & Subramaniam, S. (2012). A new security model to prevent denial-of-service attacks and violation of availability in wireless networks. International Journal of Communication Systems, 25, 903–925.CrossRef
46.
go back to reference Choudhury, P., Nandi, S., Pal, A., & Debnath, N. C. (2012). Mitigating route request flooding attack in MANET using node reputation. In Industrial informatics (INDIN), 2012 10th IEEE international conference on, 2012 (pp. 1010–1015). Choudhury, P., Nandi, S., Pal, A., & Debnath, N. C. (2012). Mitigating route request flooding attack in MANET using node reputation. In Industrial informatics (INDIN), 2012 10th IEEE international conference on, 2012 (pp. 1010–1015).
47.
go back to reference Yao, Y., Cao, Q., & Vasilakos, A. V. (2015). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for heterogeneous wireless sensor networks. IEEE/ACM Transactions on Networking, 23, 810–823.CrossRef Yao, Y., Cao, Q., & Vasilakos, A. V. (2015). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for heterogeneous wireless sensor networks. IEEE/ACM Transactions on Networking, 23, 810–823.CrossRef
48.
go back to reference Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20, 2481–2501.CrossRef Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20, 2481–2501.CrossRef
49.
go back to reference Ahir, S. A., Marathe, N., & Padiya, P. (2014). IAMTT-new method for resisting network layer denial of service attack on MANET. In Communication systems and network technologies (CSNT), 2014 fourth international conference on, 2014 (pp. 762–766). Ahir, S. A., Marathe, N., & Padiya, P. (2014). IAMTT-new method for resisting network layer denial of service attack on MANET. In Communication systems and network technologies (CSNT), 2014 fourth international conference on, 2014 (pp. 762–766).
50.
go back to reference Li, S., Liu, Q., Chen, H., & Tan, M. (2006). A new method to resist flooding attacks in ad hoc networks. In Wireless communications, networking and mobile computing, 2006. WiCOM 2006. International conference on, 2006 (pp. 1–4). Li, S., Liu, Q., Chen, H., & Tan, M. (2006). A new method to resist flooding attacks in ad hoc networks. In Wireless communications, networking and mobile computing, 2006. WiCOM 2006. International conference on, 2006 (pp. 1–4).
51.
go back to reference Rajaram, A., & Palaniswami, D. S. (2009). A trust based cross layer security protocol for mobile ad hoc networks. arXiv preprint arXiv:0911.0503. Rajaram, A., & Palaniswami, D. S. (2009). A trust based cross layer security protocol for mobile ad hoc networks. arXiv preprint arXiv:0911.0503.
52.
go back to reference Zhou, J., Dong, X., Cao, Z., & Vasilakos, A. V. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on, Information Forensics and Security, 10, 1299–1314.CrossRef Zhou, J., Dong, X., Cao, Z., & Vasilakos, A. V. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on, Information Forensics and Security, 10, 1299–1314.CrossRef
53.
go back to reference Liu, J., Li, Y., Wang, H., Jin, D., Su, L., Zeng, L., et al. (2016). Leveraging software-defined networking for security policy enforcement. Information Sciences, 327, 288–299.CrossRef Liu, J., Li, Y., Wang, H., Jin, D., Su, L., Zeng, L., et al. (2016). Leveraging software-defined networking for security policy enforcement. Information Sciences, 327, 288–299.CrossRef
54.
go back to reference Busch, C., Kannan, R., & Vasilakos, A. V. (2012). “Approximating congestion + dilation in networks via” Quality of routing games. IEEE Transactions on Computers, 61, 1270–1283.MathSciNetCrossRef Busch, C., Kannan, R., & Vasilakos, A. V. (2012). “Approximating congestion + dilation in networks via” Quality of routing games. IEEE Transactions on Computers, 61, 1270–1283.MathSciNetCrossRef
55.
go back to reference Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V. (2015). Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. IEEE Transactions on Mobile Computing, 14, 742–754.CrossRef Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V. (2015). Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. IEEE Transactions on Mobile Computing, 14, 742–754.CrossRef
Metadata
Title
Security upgrade against RREQ flooding attack by using balance index on vehicular ad hoc network
Authors
Mohammad Javad Faghihniya
Seyed Mojtaba Hosseini
Maryam Tahmasebi
Publication date
07-04-2016
Publisher
Springer US
Published in
Wireless Networks / Issue 6/2017
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-016-1259-2

Other articles of this Issue 6/2017

Wireless Networks 6/2017 Go to the issue