Skip to main content
Erschienen in: International Journal of Information Security 5/2019

19.04.2019 | Regular Contribution

SE-AOMDV: secure and efficient AOMDV routing protocol for vehicular communications

verfasst von: Amel Meddeb Makhlouf, Mohsen Guizani

Erschienen in: International Journal of Information Security | Ausgabe 5/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Vehicular Ad hoc Networks (VANETs) are emerging networks that provide essential services to drivers on the road. To exchange data, vehicles as network nodes route information between source and destination using the V-to-V infrastructure. To retrieve the best path, routing algorithms are used. We focus in this paper on the Ad hoc On-demand Multipath Distance Vector (AOMDV) routing algorithm, which is able to retrieve at least three paths. Despite, its efficiency for VANET, the AOMDV protocol still faces big challenges in terms of security. Because of the lack of security mechanisms, such as cryptography and intrusion detection, the AOMDV protocol is vulnerable to attacks such as the blackhole and the man in the middle attacks. For this purpose, we propose in this work a secure and efficient AOMDV routing protocol for vehicular communications. The security consists of detecting malicious vehicles that are not authenticated and have malicious behavior. Moreover, to guarantee integrity and authentication of Route REPlay packets that are used to retrieve the best and secure paths. The efficiency consists of node disjuncture for RREP packets. Our algorithm is specific to vehicular networks, because it deploys specific vehicle-based authentication. The performance of the proposed protocol is evaluated using the NS2 and compared to AOMDV and then to SAODV and TS-AOMDV. The results prove that our algorithm is more secure and efficient than AOMDV, especially in terms of average end-to-end delay, for high-speed vehicles. The delay reduction is estimated to 1.5 ms for a speed of 108 km/h, which is promising for vehicular communications.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Guizani, M., He, D., Ren, K., Rodrigues, J.J., Chan, S., Zhang, Y.: Security and privacy in emerging networks: part II [Guest Editorial]. IEEE Commun. Mag. 53(8), 40–41 (2015)CrossRef Guizani, M., He, D., Ren, K., Rodrigues, J.J., Chan, S., Zhang, Y.: Security and privacy in emerging networks: part II [Guest Editorial]. IEEE Commun. Mag. 53(8), 40–41 (2015)CrossRef
2.
Zurück zum Zitat Zhang, Y., Chen, M., Guizani, N., Wu, D., Leung, V.C.: Sovcan: safety-oriented vehicular controller area network. IEEE Commun. Mag. 55(8), 94–99 (2017)CrossRef Zhang, Y., Chen, M., Guizani, N., Wu, D., Leung, V.C.: Sovcan: safety-oriented vehicular controller area network. IEEE Commun. Mag. 55(8), 94–99 (2017)CrossRef
4.
Zurück zum Zitat Murshedi, T.A., Wang, X., Cheng, H.: On-demand multipath routing protocols for mobile ad-hoc networks: a comparative survey. Int. J. Future Comput. Commun. 5(3), 148 (2016)CrossRef Murshedi, T.A., Wang, X., Cheng, H.: On-demand multipath routing protocols for mobile ad-hoc networks: a comparative survey. Int. J. Future Comput. Commun. 5(3), 148 (2016)CrossRef
5.
Zurück zum Zitat Sun, Y., Wu, L., Wu, S., Li, S., Zhang, T., Zhang, L., Cui, X.: Attacks and countermeasures in the internet of vehicles. Ann. Telecommun. 72(5–6), 283–295 (2017)CrossRef Sun, Y., Wu, L., Wu, S., Li, S., Zhang, T., Zhang, L., Cui, X.: Attacks and countermeasures in the internet of vehicles. Ann. Telecommun. 72(5–6), 283–295 (2017)CrossRef
6.
Zurück zum Zitat Jadoon, A.K., Khan, Q., Ilahi, A.T., Iqbal, W.: A survey on security challenges in VANET. Int. J. Comput. Sci. Inf. Secur. 14(9), 217 (2016) Jadoon, A.K., Khan, Q., Ilahi, A.T., Iqbal, W.: A survey on security challenges in VANET. Int. J. Comput. Sci. Inf. Secur. 14(9), 217 (2016)
7.
Zurück zum Zitat Hasrouny, H., Samhat, A.E., Bassil, C., Laouiti, A.: VANet security challenges and solutions: a survey. Veh. Commun. 7, 7–20 (2017) Hasrouny, H., Samhat, A.E., Bassil, C., Laouiti, A.: VANet security challenges and solutions: a survey. Veh. Commun. 7, 7–20 (2017)
8.
Zurück zum Zitat La Vinh, H., Cavalli, A.R.: Security attacks and solutions in vehicular ad hoc networks: a survey. Int. J. AdHoc Netw. Syst. (IJANS) 4(2), 1–20 (2014)CrossRef La Vinh, H., Cavalli, A.R.: Security attacks and solutions in vehicular ad hoc networks: a survey. Int. J. AdHoc Netw. Syst. (IJANS) 4(2), 1–20 (2014)CrossRef
9.
Zurück zum Zitat Shukla, D., Vaibhav, A., Das, S., Johri, P.: Security and attack analysis for vehicular ad hoc network: a survey. In: 2016 International Conference on Computing, Communication and Automation (ICCCA), pp. 625–630 (2016) Shukla, D., Vaibhav, A., Das, S., Johri, P.: Security and attack analysis for vehicular ad hoc network: a survey. In: 2016 International Conference on Computing, Communication and Automation (ICCCA), pp. 625–630 (2016)
10.
Zurück zum Zitat Lyamin, N., Vinel, A., Jonsson, M., Loo, J.: Real-time detection of denial-of-service attacks in IEEE 802.11 p vehicular networks. IEEE Commun. Lett. 18(1), 110–113 (2014)CrossRef Lyamin, N., Vinel, A., Jonsson, M., Loo, J.: Real-time detection of denial-of-service attacks in IEEE 802.11 p vehicular networks. IEEE Commun. Lett. 18(1), 110–113 (2014)CrossRef
11.
Zurück zum Zitat Saad, A., Abdalrazak, T.R., Hussein, A.J., Abdullah, A.M.: Vehicular ad hoc networks: growth and survey for three layers. Int. J. Electr. Comput. Eng. 7(1), 271 (2017) Saad, A., Abdalrazak, T.R., Hussein, A.J., Abdullah, A.M.: Vehicular ad hoc networks: growth and survey for three layers. Int. J. Electr. Comput. Eng. 7(1), 271 (2017)
12.
Zurück zum Zitat Tyagi, P., Dembla, D.: Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET). Egypt. Inform. J. 18(2), 133–139 (2017)CrossRef Tyagi, P., Dembla, D.: Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET). Egypt. Inform. J. 18(2), 133–139 (2017)CrossRef
13.
Zurück zum Zitat Dhyani, I., Goel, N., Sharma, G., Mallick, B.: A Reliable Tactic for Detecting Black Hole Attack in Vehicular Ad Hoc Networks, Advances in Computer and Computational Sciences, pp. 333–343. Springer, Singapore (2017) Dhyani, I., Goel, N., Sharma, G., Mallick, B.: A Reliable Tactic for Detecting Black Hole Attack in Vehicular Ad Hoc Networks, Advances in Computer and Computational Sciences, pp. 333–343. Springer, Singapore (2017)
14.
Zurück zum Zitat Sultana, J., and Ahmed, T. : Securing AOMDV protocol in mobile adhoc network with elliptic curve cryptography. In: International Conference on Electrical, Computer and Communication Engineering (ECCE), pp. 539–543 (2017) Sultana, J., and Ahmed, T. : Securing AOMDV protocol in mobile adhoc network with elliptic curve cryptography. In: International Conference on Electrical, Computer and Communication Engineering (ECCE), pp. 539–543 (2017)
15.
Zurück zum Zitat Borkar, G.M., Mahajan, A.R.: A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks. Wirel. Netw. 23(8), 2455–2472 (2017)CrossRef Borkar, G.M., Mahajan, A.R.: A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks. Wirel. Netw. 23(8), 2455–2472 (2017)CrossRef
16.
Zurück zum Zitat Gurung, S., Siddhartha, S.: A review of black-hole attack mitigation techniques and its drawbacks in mobile ad-hoc network. In: Proceedings of the 2nd IEEE international conference on WiSPNET, pp. 2409–2415 (2017) Gurung, S., Siddhartha, S.: A review of black-hole attack mitigation techniques and its drawbacks in mobile ad-hoc network. In: Proceedings of the 2nd IEEE international conference on WiSPNET, pp. 2409–2415 (2017)
17.
Zurück zum Zitat Alkhamisi, A. O., Buhari, S. M.: Trusted secure adhoc on-demand multipath distance vector routing in MANET. In: 2016 IEEE 30th international conference on advanced information networking and applications (AINA), Crans-Montana, pp. 212–219 (2016) Alkhamisi, A. O., Buhari, S. M.: Trusted secure adhoc on-demand multipath distance vector routing in MANET. In: 2016 IEEE 30th international conference on advanced information networking and applications (AINA), Crans-Montana, pp. 212–219 (2016)
18.
Zurück zum Zitat Pathan, M.S., Zhu, N., He, J., Zardari, Z.A., Memon, M.Q., Hussain, M.I.: An efficient trust-based scheme for secure and quality of service routing in MANETs. Future Internet 10(2), 16 (2018)CrossRef Pathan, M.S., Zhu, N., He, J., Zardari, Z.A., Memon, M.Q., Hussain, M.I.: An efficient trust-based scheme for secure and quality of service routing in MANETs. Future Internet 10(2), 16 (2018)CrossRef
21.
Zurück zum Zitat Maxim, R., Papadimitratos, P., Hubaux, J.P.: Securing vehicular communications. IEEE Wirel. Commun. 13, 8–15 (2006) Maxim, R., Papadimitratos, P., Hubaux, J.P.: Securing vehicular communications. IEEE Wirel. Commun. 13, 8–15 (2006)
22.
Zurück zum Zitat Shen, A. N., Guo, S., Zeng, D., Guizani, M.: A lightweight privacy-preserving protocol using chameleon hashing for secure vehicular communications. In: 2012 IEEE Wireless Communications and Networking Conference (WCNC), pp. 2543–2548 (2012) Shen, A. N., Guo, S., Zeng, D., Guizani, M.: A lightweight privacy-preserving protocol using chameleon hashing for secure vehicular communications. In: 2012 IEEE Wireless Communications and Networking Conference (WCNC), pp. 2543–2548 (2012)
23.
Zurück zum Zitat Li, J., Lu, H., Guizani, M.: ACPN: a novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Trans. Parallel Distrib. Syst. 26(4), 938–948 (2015)CrossRef Li, J., Lu, H., Guizani, M.: ACPN: a novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Trans. Parallel Distrib. Syst. 26(4), 938–948 (2015)CrossRef
24.
Zurück zum Zitat Jiang, S., Zhu, X., Wang, L.: An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Trans. Intell. Transp. Syst. 17(8), 2193–2204 (2016)CrossRef Jiang, S., Zhu, X., Wang, L.: An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Trans. Intell. Transp. Syst. 17(8), 2193–2204 (2016)CrossRef
25.
Zurück zum Zitat Rekik, M., Obaidat. M.S., Meddeb-Makhlouf, A., Zarai, F.: An optimized and secure authentication scheme for vehicular ad hoc networks. In: 2018 IEEE International Conference on Communications (ICC), Kansas City (2018) Rekik, M., Obaidat. M.S., Meddeb-Makhlouf, A., Zarai, F.: An optimized and secure authentication scheme for vehicular ad hoc networks. In: 2018 IEEE International Conference on Communications (ICC), Kansas City (2018)
26.
Zurück zum Zitat Khan, U., Agrawal, S., Silakari, S.: Detection of malicious nodes (DMN) in vehicular ad-hoc networks. Proc. Comput. Sci. 46, 965–972 (2015)CrossRef Khan, U., Agrawal, S., Silakari, S.: Detection of malicious nodes (DMN) in vehicular ad-hoc networks. Proc. Comput. Sci. 46, 965–972 (2015)CrossRef
27.
Zurück zum Zitat Souza, A.M., Brennand, C.A., Yokoyama, R.S., Donato, E.A., Madeira, E.R., Villas, L.A.: Traffic management systems: a classification, review, challenges, and future perspectives. Int. J. Distrib. Sensor Netw. 13(4), 1550147716683612 (2017)CrossRef Souza, A.M., Brennand, C.A., Yokoyama, R.S., Donato, E.A., Madeira, E.R., Villas, L.A.: Traffic management systems: a classification, review, challenges, and future perspectives. Int. J. Distrib. Sensor Netw. 13(4), 1550147716683612 (2017)CrossRef
28.
Zurück zum Zitat Raw, R.S., Kumar, M., Singh, N.: Security challenges, issues and their solutions for VANET. Int. J. Netw. Secur. Appl. 5(5), 95 (2013) Raw, R.S., Kumar, M., Singh, N.: Security challenges, issues and their solutions for VANET. Int. J. Netw. Secur. Appl. 5(5), 95 (2013)
31.
Zurück zum Zitat Periyasamy, P., Karthikeyan, E.: Performance evaluation of AOMDV protocol based on various scenario and traffic patterns. Int. J. Comput. Sci. Eng. Appl. 1(6), 33 (2011) Periyasamy, P., Karthikeyan, E.: Performance evaluation of AOMDV protocol based on various scenario and traffic patterns. Int. J. Comput. Sci. Eng. Appl. 1(6), 33 (2011)
32.
Zurück zum Zitat Arulkumar, N., Raj, E.G.D.P.: A simulation based study to implement intelligent transport systems concepts in VANETs using AODV routing protocol in NS2. In: International Conference on Advanced Computing (ICoAC), pp. 1–4 (2012) Arulkumar, N., Raj, E.G.D.P.: A simulation based study to implement intelligent transport systems concepts in VANETs using AODV routing protocol in NS2. In: International Conference on Advanced Computing (ICoAC), pp. 1–4 (2012)
33.
Zurück zum Zitat Al-Saadi, A., Setchi, R., Hicks, Y., Allen, S.M.: Routing protocol for heterogeneous wireless mesh networks. IEEE Trans. Veh. Technol. 65(12), 9773–9786 (2016)CrossRef Al-Saadi, A., Setchi, R., Hicks, Y., Allen, S.M.: Routing protocol for heterogeneous wireless mesh networks. IEEE Trans. Veh. Technol. 65(12), 9773–9786 (2016)CrossRef
34.
Zurück zum Zitat Nugraha, M. A., Sudiharto, D. W., Herutomo, A.: Performance comparative analysis between ARAN and SAODV on VANET facing the blackhole. In: 2017 International Conference on Electrical Engineering and Informatics (ICELTICs), Banda Aceh, pp. 1–6 (2017) Nugraha, M. A., Sudiharto, D. W., Herutomo, A.: Performance comparative analysis between ARAN and SAODV on VANET facing the blackhole. In: 2017 International Conference on Electrical Engineering and Informatics (ICELTICs), Banda Aceh, pp. 1–6 (2017)
Metadaten
Titel
SE-AOMDV: secure and efficient AOMDV routing protocol for vehicular communications
verfasst von
Amel Meddeb Makhlouf
Mohsen Guizani
Publikationsdatum
19.04.2019
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Information Security / Ausgabe 5/2019
Print ISSN: 1615-5262
Elektronische ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-019-00436-z

Weitere Artikel der Ausgabe 5/2019

International Journal of Information Security 5/2019 Zur Ausgabe