Skip to main content
Erschienen in: Wireless Networks 6/2017

07.04.2016

Security upgrade against RREQ flooding attack by using balance index on vehicular ad hoc network

verfasst von: Mohammad Javad Faghihniya, Seyed Mojtaba Hosseini, Maryam Tahmasebi

Erschienen in: Wireless Networks | Ausgabe 6/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

VANET is an ad hoc network that formed between vehicles. Security in VANET plays vital role. AODV routing protocol is a reactive or on-demand routing protocol which means if there is data to be send then the path will create. AODV is the most commonly used topology based routing protocol for VANET. Using of broadcast packets in the AODV route discovery phase caused it is extremely vulnerable against DOS and DDOS flooding attacks. Flooding attack is type of a denial of service attack that causes loss of network bandwidth and imposes high overhead to the network. The method proposed in this paper called Balanced AODV (B-AODV) because it expects all network node behave normally. If network nodes are out of the normal behavior (too much route request) then they identified as malicious node. B-AODV is designed with following feature: (1) The use of adaptive threshold according to network conditions and nodes behavior (balance index) (2) Not using additional routing packets to detect malicious nodes (3) Perform detection and prevention operations independently on each node (4) Perform detection and prevention operations in real time (5) No need for promiscuous mode. This method for detection and prevention flooding attack uses average and standard deviation. In this method each node is employing balance index for acceptation or rejection RREQ packets. The results of the simulation in NS2 indicates B-AODV is resilience against flooding attack and prevent loss of network bandwidth. Comparing between AODV with B-AODV in normal state (non-attacker) shows B-AODV is exactly match with AODV in network performance, this means that the B-AODV algorithm does not impose any overhead and false positive to AODV.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Vasilakos, A. V., Li, Z., Simon, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.CrossRef Vasilakos, A. V., Li, Z., Simon, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.CrossRef
2.
Zurück zum Zitat Zhou, L., Naixue, X., Shu, L., Vasilakos, A., Yeo, S. S. (2010). Context-aware middleware for multimedia services in heterogeneous networks. IEEE Intelligent Systems, 25, 40–47. doi:10.1109/MIS.2010.48.CrossRef Zhou, L., Naixue, X., Shu, L., Vasilakos, A., Yeo, S. S. (2010). Context-aware middleware for multimedia services in heterogeneous networks. IEEE Intelligent Systems, 25, 40–47. doi:10.​1109/​MIS.​2010.​48.CrossRef
3.
Zurück zum Zitat Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In INFOCOM, 2012 Proceedings IEEE, 2012 (pp. 100–108). Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In INFOCOM, 2012 Proceedings IEEE, 2012 (pp. 100–108).
4.
Zurück zum Zitat Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25, 3264–3273.CrossRef Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25, 3264–3273.CrossRef
5.
Zurück zum Zitat Meng, T., Wu, F., Chen, G., & Vasilakos, A. V. (2014). Revisiting routing in multi-hop wireless networks: Spatial reusability-aware routing. In Global communications conference (GLOBECOM), 2014 IEEE, 2014 (pp. 88–93). Meng, T., Wu, F., Chen, G., & Vasilakos, A. V. (2014). Revisiting routing in multi-hop wireless networks: Spatial reusability-aware routing. In Global communications conference (GLOBECOM), 2014 IEEE, 2014 (pp. 88–93).
6.
Zurück zum Zitat Meng, T., Wu, F., Yang, Z., Chen, G., & Vasilakos, A. V. (2016). Spatial reusability-aware routing in multi-hop wireless networks. IEEE Transactions on Computers, 65, 244–255.MathSciNetCrossRefMATH Meng, T., Wu, F., Yang, Z., Chen, G., & Vasilakos, A. V. (2016). Spatial reusability-aware routing in multi-hop wireless networks. IEEE Transactions on Computers, 65, 244–255.MathSciNetCrossRefMATH
7.
Zurück zum Zitat Blum, J., & Eskandarian, A. (2004). The threat of intelligent collisions. IT Professional, 6, 24–29.CrossRef Blum, J., & Eskandarian, A. (2004). The threat of intelligent collisions. IT Professional, 6, 24–29.CrossRef
8.
Zurück zum Zitat Zeng, Y., Xiang, K., Li, D., & Vasilakos, A. V. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19, 161–173.CrossRef Zeng, Y., Xiang, K., Li, D., & Vasilakos, A. V. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19, 161–173.CrossRef
9.
Zurück zum Zitat Yang, M., Li, Y., Jin, D., Zeng, L., Wu, X., & Vasilakos, A. V. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. Mobile Networks and Applications, 20, 4–18.CrossRef Yang, M., Li, Y., Jin, D., Zeng, L., Wu, X., & Vasilakos, A. V. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. Mobile Networks and Applications, 20, 4–18.CrossRef
10.
Zurück zum Zitat Dvir, A., & Vasilakos, A. V. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41, 405–406. Dvir, A., & Vasilakos, A. V. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41, 405–406.
11.
Zurück zum Zitat Moustafa, H., Senouci, S. M., & Jerbi, M. (2008). Introduction to vehicular networks. 10th November. Moustafa, H., Senouci, S. M., & Jerbi, M. (2008). Introduction to vehicular networks. 10th November.
12.
Zurück zum Zitat van der Heijden, R. W. & Kargl, F. (2014). Open issues in differentiating misbehavior and anomalies for VANETs. van der Heijden, R. W. & Kargl, F. (2014). Open issues in differentiating misbehavior and anomalies for VANETs.
13.
Zurück zum Zitat Simaremare, H., Abouaissa, A., Sari, R. F., & Lorenz, P. (2015). Security and performance enhancement of AODV routing protocol. International Journal of Communication Systems, 28, 2003–2019. doi:10.1002/dac.2837.CrossRef Simaremare, H., Abouaissa, A., Sari, R. F., & Lorenz, P. (2015). Security and performance enhancement of AODV routing protocol. International Journal of Communication Systems, 28, 2003–2019. doi:10.​1002/​dac.​2837.CrossRef
14.
Zurück zum Zitat Wang, T., Liu, Y., & Vasilakos, A. V. (2015). Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Networks, 21, 1835–1846.CrossRef Wang, T., Liu, Y., & Vasilakos, A. V. (2015). Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Networks, 21, 1835–1846.CrossRef
15.
Zurück zum Zitat Canavan, J. E. (2001). Fundamentals of network security. Norwood: Artech House.MATH Canavan, J. E. (2001). Fundamentals of network security. Norwood: Artech House.MATH
16.
Zurück zum Zitat Yeh, L.-Y., Chen, Y.-C., & Huang, J.-L. (2011). PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. Computer Communications, 34, 447–456.CrossRef Yeh, L.-Y., Chen, Y.-C., & Huang, J.-L. (2011). PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. Computer Communications, 34, 447–456.CrossRef
17.
Zurück zum Zitat Mejri, M. N., Ben-Othman, J., & Hamdi, M. (2014). Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communications, 1, 53–66.CrossRef Mejri, M. N., Ben-Othman, J., & Hamdi, M. (2014). Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communications, 1, 53–66.CrossRef
18.
Zurück zum Zitat Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on demand distance vector (AODV) routing (RFC 3561), IETF MANET Working Group. Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on demand distance vector (AODV) routing (RFC 3561), IETF MANET Working Group.
19.
Zurück zum Zitat Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in mobile ad hoc networks: challenges and solutions. Wireless Communications, IEEE, 11, 38–47.CrossRef Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in mobile ad hoc networks: challenges and solutions. Wireless Communications, IEEE, 11, 38–47.CrossRef
20.
Zurück zum Zitat Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for Internet of Things. Journal of network and computer applications, 42, 120–134.CrossRef Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for Internet of Things. Journal of network and computer applications, 42, 120–134.CrossRef
21.
Zurück zum Zitat Feng, Z., Zhu, Y., Zhang, Q., Ni, L. M., & Vasilakos, A. V. (2014). TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing. In INFOCOM, 2014 Proceedings IEEE, 2014 (pp. 1231–1239). Feng, Z., Zhu, Y., Zhang, Q., Ni, L. M., & Vasilakos, A. V. (2014). TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing. In INFOCOM, 2014 Proceedings IEEE, 2014 (pp. 1231–1239).
22.
Zurück zum Zitat Song, Y., Liu, L., Ma, H., & Vasilakos, A. V. (2014). A biology-based algorithm to minimal exposure problem of wireless sensor networks. IEEE Transactions on Network and Service Management, 11, 417–430.CrossRef Song, Y., Liu, L., Ma, H., & Vasilakos, A. V. (2014). A biology-based algorithm to minimal exposure problem of wireless sensor networks. IEEE Transactions on Network and Service Management, 11, 417–430.CrossRef
23.
Zurück zum Zitat Youssef, M., Ibrahim, M., Abdelatif, M., Chen, L., & Vasilakos, A. V. (2014). Routing metrics of cognitive radio networks: A survey. IEEE Communications Surveys & Tutorials, 16, 92–109.CrossRef Youssef, M., Ibrahim, M., Abdelatif, M., Chen, L., & Vasilakos, A. V. (2014). Routing metrics of cognitive radio networks: A survey. IEEE Communications Surveys & Tutorials, 16, 92–109.CrossRef
24.
Zurück zum Zitat Fadlullah, Z. M., Taleb, T., Vasilakos, A. V., Guizani, M., & Kato, N. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking (TON), 18, 1234–1247.CrossRef Fadlullah, Z. M., Taleb, T., Vasilakos, A. V., Guizani, M., & Kato, N. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking (TON), 18, 1234–1247.CrossRef
25.
Zurück zum Zitat Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef
26.
Zurück zum Zitat Zhou, J., Cao, Z., Dong, X., Xiong, N., & Vasilakos, A. V. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Sciences, 314, 255–276.CrossRef Zhou, J., Cao, Z., Dong, X., Xiong, N., & Vasilakos, A. V. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Sciences, 314, 255–276.CrossRef
27.
Zurück zum Zitat Zhou, J., Cao, Z., Dong, X., Lin, X., & Vasilakos, A. V. (2013). Securing m-healthcare social networks: Challenges, countermeasures and future directions. IEEE Wireless Communications, 20, 12–21.CrossRef Zhou, J., Cao, Z., Dong, X., Lin, X., & Vasilakos, A. V. (2013). Securing m-healthcare social networks: Challenges, countermeasures and future directions. IEEE Wireless Communications, 20, 12–21.CrossRef
28.
Zurück zum Zitat Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100, 3172–3186.CrossRef Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100, 3172–3186.CrossRef
29.
Zurück zum Zitat Gunasekaran, M., Premalatha, K., & Gopalakrishnan, B. (2010). A survey on DoS attacks and countermeasures in mobile Ad Hoc networks. International Journal of Advanced Research in Computer Science, 1(4), 156–164. Gunasekaran, M., Premalatha, K., & Gopalakrishnan, B. (2010). A survey on DoS attacks and countermeasures in mobile Ad Hoc networks. International Journal of Advanced Research in Computer Science, 1(4), 156–164.
30.
Zurück zum Zitat Sawant, K., & Rawat, D. M. Survey of DOS flooding attacks over MANET environment. International Journal of Engineering Research and Applications, 4(5), 110–115. Sawant, K., & Rawat, D. M. Survey of DOS flooding attacks over MANET environment. International Journal of Engineering Research and Applications, 4(5), 110–115.
31.
Zurück zum Zitat Von Mulert, J., Welch, I., & Seah, W. K. (2012). Security threats and solutions in MANETs: A case study using AODV and SAODV. Journal of network and computer Applications, 35, 1249–1259.CrossRef Von Mulert, J., Welch, I., & Seah, W. K. (2012). Security threats and solutions in MANETs: A case study using AODV and SAODV. Journal of network and computer Applications, 35, 1249–1259.CrossRef
32.
Zurück zum Zitat Jiang, T., Wang, H., & Vasilakos, A. V. (2012). QoE-driven channel allocation schemes for multimedia transmission of priority-based secondary users over cognitive radio networks. IEEE Journal on Selected Areas in Communications, 30, 1215–1224.CrossRef Jiang, T., Wang, H., & Vasilakos, A. V. (2012). QoE-driven channel allocation schemes for multimedia transmission of priority-based secondary users over cognitive radio networks. IEEE Journal on Selected Areas in Communications, 30, 1215–1224.CrossRef
33.
Zurück zum Zitat Liu, B., Bi, J., & Vasilakos, A. V. (2014). Toward incentivizing anti-spoofing deployment. IEEE Transactions on Information Forensics and Security, 9, 436–450.CrossRef Liu, B., Bi, J., & Vasilakos, A. V. (2014). Toward incentivizing anti-spoofing deployment. IEEE Transactions on Information Forensics and Security, 9, 436–450.CrossRef
34.
Zurück zum Zitat Yao, G., Bi, J., & Vasilakos, A. V. (2015). Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter. IEEE Transactions on Information Forensics and Security, 10, 471–484.CrossRef Yao, G., Bi, J., & Vasilakos, A. V. (2015). Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter. IEEE Transactions on Information Forensics and Security, 10, 471–484.CrossRef
35.
Zurück zum Zitat Shandilya, S. K., & Sahu, S. (2010). A trust based security scheme for RREQ flooding attack in MANET. International Journal of Computer Applications, 5, 0975–8887.CrossRef Shandilya, S. K., & Sahu, S. (2010). A trust based security scheme for RREQ flooding attack in MANET. International Journal of Computer Applications, 5, 0975–8887.CrossRef
36.
Zurück zum Zitat Bhargava, S. & Agrawal, D. P. (2001). Security enhancements in AODV protocol for wireless ad hoc networks. In Vehicular technology conference, 2001. VTC 2001 Fall. IEEE VTS 54th, 2001 (pp. 2143–2147). Bhargava, S. & Agrawal, D. P. (2001). Security enhancements in AODV protocol for wireless ad hoc networks. In Vehicular technology conference, 2001. VTC 2001 Fall. IEEE VTS 54th, 2001 (pp. 2143–2147).
37.
Zurück zum Zitat Golle, P., Greene, D., & Staddon, J. (2004). Detecting and correcting malicious data in VANETs. In Proceedings of the 1st ACM international workshop on vehicular ad hoc networks, 2004 (pp. 29–37). Golle, P., Greene, D., & Staddon, J. (2004). Detecting and correcting malicious data in VANETs. In Proceedings of the 1st ACM international workshop on vehicular ad hoc networks, 2004 (pp. 29–37).
38.
Zurück zum Zitat Yi, P., Dai, Z., Zhong, Y., & Zhang, S. (2005). Resisting flooding attacks in ad hoc networks. In Information technology: Coding and computing, 2005. ITCC 2005. International conference on, 2005 (pp. 657–662). Yi, P., Dai, Z., Zhong, Y., & Zhang, S. (2005). Resisting flooding attacks in ad hoc networks. In Information technology: Coding and computing, 2005. ITCC 2005. International conference on, 2005 (pp. 657–662).
39.
Zurück zum Zitat Song, J.-H., Hong, F., & Zhang, Y. (2006). Effective filtering scheme against RREQ flooding attack in mobile ad hoc networks. In PDCAT, 2006 (pp. 497–502). Song, J.-H., Hong, F., & Zhang, Y. (2006). Effective filtering scheme against RREQ flooding attack in mobile ad hoc networks. In PDCAT, 2006 (pp. 497–502).
40.
Zurück zum Zitat Eu, Z. A., & Seah, W. K. G. (2006). Mitigating route request flooding attacks in mobile ad hoc networks. In I. Chong & K. Kawahara (Eds.), Information networking. Advances in data communications and wireless networks (pp. 327–336). Verlag Berlin Hiedelberg: Springer. Eu, Z. A., & Seah, W. K. G. (2006). Mitigating route request flooding attacks in mobile ad hoc networks. In I. Chong & K. Kawahara (Eds.), Information networking. Advances in data communications and wireless networks (pp. 327–336). Verlag Berlin Hiedelberg: Springer.
41.
Zurück zum Zitat Nakayama, H., Kurosawa, S., Jamalipour, A., Nemoto, Y., & Kato, N. (2009). A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 58, 2471–2481.CrossRef Nakayama, H., Kurosawa, S., Jamalipour, A., Nemoto, Y., & Kato, N. (2009). A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 58, 2471–2481.CrossRef
42.
Zurück zum Zitat Nadeem, A. & Howarth, M. (2009). Adaptive intrusion detection and prevention of denial of service attacks in MANETs. In Proceedings of the 2009 international conference on wireless communications and mobile computing: Connecting the world wirelessly, 2009 (pp. 926–930). Nadeem, A. & Howarth, M. (2009). Adaptive intrusion detection and prevention of denial of service attacks in MANETs. In Proceedings of the 2009 international conference on wireless communications and mobile computing: Connecting the world wirelessly, 2009 (pp. 926–930).
43.
Zurück zum Zitat Venkataraman, R., Pushpalatha, M., Khemka, R. & Rao, T. R. (2009). Prevention of flooding attacks in mobile ad hoc networks. In Proceedings of the international conference on advances in computing, communication and control, 2009 (pp. 525–529). Venkataraman, R., Pushpalatha, M., Khemka, R. & Rao, T. R. (2009). Prevention of flooding attacks in mobile ad hoc networks. In Proceedings of the international conference on advances in computing, communication and control, 2009 (pp. 525–529).
44.
Zurück zum Zitat Yen, Y.-S., Chao, H.-C., Chang, R.-S., & Vasilakos, A. (2011). Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Mathematical and Computer Modelling, 53, 2238–2250.CrossRef Yen, Y.-S., Chao, H.-C., Chang, R.-S., & Vasilakos, A. (2011). Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Mathematical and Computer Modelling, 53, 2238–2250.CrossRef
45.
Zurück zum Zitat Malekzadeh, M., Ghani, A. A. A., & Subramaniam, S. (2012). A new security model to prevent denial-of-service attacks and violation of availability in wireless networks. International Journal of Communication Systems, 25, 903–925.CrossRef Malekzadeh, M., Ghani, A. A. A., & Subramaniam, S. (2012). A new security model to prevent denial-of-service attacks and violation of availability in wireless networks. International Journal of Communication Systems, 25, 903–925.CrossRef
46.
Zurück zum Zitat Choudhury, P., Nandi, S., Pal, A., & Debnath, N. C. (2012). Mitigating route request flooding attack in MANET using node reputation. In Industrial informatics (INDIN), 2012 10th IEEE international conference on, 2012 (pp. 1010–1015). Choudhury, P., Nandi, S., Pal, A., & Debnath, N. C. (2012). Mitigating route request flooding attack in MANET using node reputation. In Industrial informatics (INDIN), 2012 10th IEEE international conference on, 2012 (pp. 1010–1015).
47.
Zurück zum Zitat Yao, Y., Cao, Q., & Vasilakos, A. V. (2015). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for heterogeneous wireless sensor networks. IEEE/ACM Transactions on Networking, 23, 810–823.CrossRef Yao, Y., Cao, Q., & Vasilakos, A. V. (2015). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for heterogeneous wireless sensor networks. IEEE/ACM Transactions on Networking, 23, 810–823.CrossRef
48.
Zurück zum Zitat Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20, 2481–2501.CrossRef Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20, 2481–2501.CrossRef
49.
Zurück zum Zitat Ahir, S. A., Marathe, N., & Padiya, P. (2014). IAMTT-new method for resisting network layer denial of service attack on MANET. In Communication systems and network technologies (CSNT), 2014 fourth international conference on, 2014 (pp. 762–766). Ahir, S. A., Marathe, N., & Padiya, P. (2014). IAMTT-new method for resisting network layer denial of service attack on MANET. In Communication systems and network technologies (CSNT), 2014 fourth international conference on, 2014 (pp. 762–766).
50.
Zurück zum Zitat Li, S., Liu, Q., Chen, H., & Tan, M. (2006). A new method to resist flooding attacks in ad hoc networks. In Wireless communications, networking and mobile computing, 2006. WiCOM 2006. International conference on, 2006 (pp. 1–4). Li, S., Liu, Q., Chen, H., & Tan, M. (2006). A new method to resist flooding attacks in ad hoc networks. In Wireless communications, networking and mobile computing, 2006. WiCOM 2006. International conference on, 2006 (pp. 1–4).
51.
Zurück zum Zitat Rajaram, A., & Palaniswami, D. S. (2009). A trust based cross layer security protocol for mobile ad hoc networks. arXiv preprint arXiv:0911.0503. Rajaram, A., & Palaniswami, D. S. (2009). A trust based cross layer security protocol for mobile ad hoc networks. arXiv preprint arXiv:0911.0503.
52.
Zurück zum Zitat Zhou, J., Dong, X., Cao, Z., & Vasilakos, A. V. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on, Information Forensics and Security, 10, 1299–1314.CrossRef Zhou, J., Dong, X., Cao, Z., & Vasilakos, A. V. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on, Information Forensics and Security, 10, 1299–1314.CrossRef
53.
Zurück zum Zitat Liu, J., Li, Y., Wang, H., Jin, D., Su, L., Zeng, L., et al. (2016). Leveraging software-defined networking for security policy enforcement. Information Sciences, 327, 288–299.CrossRef Liu, J., Li, Y., Wang, H., Jin, D., Su, L., Zeng, L., et al. (2016). Leveraging software-defined networking for security policy enforcement. Information Sciences, 327, 288–299.CrossRef
54.
Zurück zum Zitat Busch, C., Kannan, R., & Vasilakos, A. V. (2012). “Approximating congestion + dilation in networks via” Quality of routing games. IEEE Transactions on Computers, 61, 1270–1283.MathSciNetCrossRef Busch, C., Kannan, R., & Vasilakos, A. V. (2012). “Approximating congestion + dilation in networks via” Quality of routing games. IEEE Transactions on Computers, 61, 1270–1283.MathSciNetCrossRef
55.
Zurück zum Zitat Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V. (2015). Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. IEEE Transactions on Mobile Computing, 14, 742–754.CrossRef Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V. (2015). Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. IEEE Transactions on Mobile Computing, 14, 742–754.CrossRef
Metadaten
Titel
Security upgrade against RREQ flooding attack by using balance index on vehicular ad hoc network
verfasst von
Mohammad Javad Faghihniya
Seyed Mojtaba Hosseini
Maryam Tahmasebi
Publikationsdatum
07.04.2016
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 6/2017
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-016-1259-2

Weitere Artikel der Ausgabe 6/2017

Wireless Networks 6/2017 Zur Ausgabe

Neuer Inhalt