Volume 11, Issue 11 (November 2024), Pages: 28-36
----------------------------------------------
Original Research Paper
Smart detection of denial of service (DoS) attacks in internet of vehicles (IoV) networks
Author(s):
Maha Helal 1, *, Mohammed Bakhamis 1, Mousa Al-Akhras 2, Samer Atawneh 1, Ibrahim Al-Oqily 3, Tariq Kashmeery 4
Affiliation(s):
1College of Computing and Informatics, Saudi Electronic University, Riyadh, Saudi Arabia
2King Abdullah II School of Information Technology, The University of Jordan, Amman 11942, Jordan
3Prince Al-Hussein Bin Abdallah II for Information Technology, The Hashemite University, Zarqa 131333, Jordan
4College of Computing, Umm Al-Qura University, Makkah, Saudi Arabia
Full text
Full Text - PDF
* Corresponding Author.
Corresponding author's ORCID profile: https://orcid.org/0000-0002-3834-4410
Digital Object Identifier (DOI)
https://doi.org/10.21833/ijaas.2024.11.004
Abstract
Smart cities are receiving increasing attention because of their potential to improve quality of life. Roads and transportation systems have seen significant improvements, particularly in terms of safety. Technologies like the internet of things (IoT) have introduced new features and services for both drivers and governments to reduce road risks and manage transportation more efficiently. Vehicles can now connect to either self-organized or public networks to share information about incidents and road conditions. Access to the Internet and cloud services further enhances these systems by enabling real-time interactions with data collected from various sources, such as other vehicles and road signs. This has led to the development of a new concept called the internet of vehicles (IoV), where vehicles and road objects communicate with each other, and connect to the Internet and services like cloud or fog computing to process large amounts of data. However, implementing IoV comes with challenges, particularly related to security and privacy, which could put road users at risk. One major threat is a denial of service (DoS) attack, which can disrupt these networks. This paper presents a smart detection system that ensures secure communication between nodes, such as vehicles and road objects. To counter DoS attacks, the system also introduces a "honeypot" strategy, which can be used by government vehicles or road objects. The results show that the proposed solution is practical and can be applied in real-world scenarios.
© 2024 The Authors. Published by IASE.
This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
Keywords
Smart cities, Internet of things, Internet of vehicles, Denial of service, Honeypot strategy
Article history
Received 29 May 2024, Received in revised form 28 September 2024, Accepted 19 October 2024
Acknowledgment
No Acknowledgment.
Compliance with ethical standards
Conflict of interest: The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Citation:
Helal M, Bakhamis M, Al-Akhras M, Atawneh S, Al-Oqily I, and Kashmeery T (2024). Smart detection of denial of service (DoS) attacks in internet of vehicles (IoV) networks. International Journal of Advanced and Applied Sciences, 11(11): 28-36
Permanent Link to this page
Figures
Fig. 1 Fig. 2 Fig. 3 Fig. 4 Fig. 5 Fig. 6 Fig. 7 Fig. 8 Fig. 9
Tables
Table 1 Table 2 Table 3 Table 4
----------------------------------------------
References (24)
- Alalwany E and Mahgoub I (2024). Security and trust management in the internet of vehicles (IoV): Challenges and machine learning solutions. Sensors, 24(2): 368. https://doi.org/10.3390/s24020368 [Google Scholar] PMid:38257461 PMCid:PMC10819911
- Ali ES, Hasan MK, Hassan R, Saeed RA, Hassan MB, Islam S, Nafi NS, and Bevinakoppa S (2021). Machine learning technologies for secure vehicular communication in internet of vehicles: Recent advances and applications. Security and Communication Networks, 2021: 8868355. https://doi.org/10.1155/2021/8868355 [Google Scholar]
- AlMarshoud M, Sabir Kiraz M, and H Al-Bayatti A (2024). Security, privacy, and decentralized trust management in VANETs: A review of current research and future directions. ACM Computing Surveys, 56(10): 1-39. https://doi.org/10.1145/3656166 [Google Scholar]
- Alvarez Lopez M, Behrisch M, Bieker-Walz L, Erdmann J, Flötteröd YP, Hilbrich R, Lücken L, Rummel J, Wagner P, and Wießner E (2018). Microscopic traffic simulation using SUMO. In the IEEE Intelligent Transportation Systems Conference (ITSC), IEEE, Auckland, New Zealand: 2575-2582. https://doi.org/10.1109/ITSC.2018.8569938 [Google Scholar]
- Bagga P, Das AK, Wazid M, Rodrigues JJ, and Park Y (2020). Authentication protocols in internet of vehicles: Taxonomy, analysis, and challenges. IEEE Access, 8: 54314-54344. https://doi.org/10.1109/ACCESS.2020.2981397 [Google Scholar]
- Baldini G, Botterman M, Neisse R, and Tallacchini M (2018). Ethical design in the internet of things. Science and Engineering Ethics, 24: 905-925. https://doi.org/10.1007/s11948-016-9754-5 [Google Scholar] PMid:26797878 PMCid:PMC5972157
- Contreras-Castillo J, Zeadally S, and Guerrero-Ibañez JA (2017). Internet of vehicles: architecture, protocols, and security. IEEE Internet of Things Journal, 5(5): 3701-3709. https://doi.org/10.1109/JIOT.2017.2690902 [Google Scholar]
- Gracias JS, Parnell GS, Specking E, Pohl EA, and Buchanan R (2023). Smart cities—A structured literature review. Smart Cities, 6(4): 1719-1743. https://doi.org/10.3390/smartcities6040080 [Google Scholar]
- Gupta N, Manaswini R, Saikrishna B, Silva F, and Teles A (2020). Authentication-based secure data dissemination protocol and framework for 5G-enabled VANET. Future Internet, 12(4): 63. https://doi.org/10.3390/fi12040063 [Google Scholar]
- Hasbullah H, Soomro IA, and Ab Manan JL (2010). Denial of service (DOS) attack and its possible solutions in VANET. International Journal of Electronics and Communication Engineering, 4(5): 813-817. https://doi.org/10.5281/zenodo.1085740 [Google Scholar]
- Kamble SS, Gunasekaran A, Parekh H, and Joshi S (2019). Modeling the internet of things adoption barriers in food retail supply chains. Journal of Retailing and Consumer Services, 48: 154-168. https://doi.org/10.1016/j.jretconser.2019.02.020 [Google Scholar]
- Kumar R, Kumar P, Tripathi R, Gupta GP, and Kumar N (2021). P2SF-IoV: A privacy-preservation-based secured framework for internet of vehicles. IEEE Transactions on Intelligent Transportation Systems, 23(11): 22571-22582. https://doi.org/10.1109/TITS.2021.3102581 [Google Scholar]
- Kumar S, Velliangiri S, Karthikeyan P, Kumari S, Kumar S, and Khan MK (2024). A survey on the blockchain techniques for the internet of vehicles security. Transactions on Emerging Telecommunications Technologies, 35(4): e4317. https://doi.org/10.1002/ett.4317 [Google Scholar]
- Obaidat M, Khodjaeva M, Holst J, and Ben Zid M (2020). Security and privacy challenges in vehicular ad hoc networks. In: Mahmood Z (Ed.), Connected vehicles in the internet of things: Concepts, technologies and frameworks for the IoV: 223-251. Springer International Publishing, Cham, Switzerland. https://doi.org/10.1007/978-3-030-36167-9_9 [Google Scholar]
- Panigrahy SK and Emany H (2023). A survey and tutorial on network optimization for intelligent transport system using the internet of vehicles. Sensors, 23(1): 555. https://doi.org/10.3390/s23010555 [Google Scholar] PMid:36617152 PMCid:PMC9824436
- Priyan MK and Devi GU (2019). A survey on internet of vehicles: Applications, technologies, challenges and opportunities. International Journal of Advanced Intelligence Paradigms, 12(1-2): 98-119. https://doi.org/10.1504/IJAIP.2019.096957 [Google Scholar]
- Quyoom A, Ali R, Gouttam DN, and Sharma H (2015). A novel mechanism of detection of denial of service attack (DoS) in VANET using malicious and irrelevant packet detection algorithm (MIPDA). In the International Conference on Computing, Communication and Automation, IEEE, Greater Noida, India: 414-419. https://doi.org/10.1109/CCAA.2015.7148411 [Google Scholar]
- Rose K, Eldridge S, and Chapin L (2015). The internet of things: An overview. Technical Report, The Internet Society (ISOC), Geneva, Switzerland. [Google Scholar]
- Sharma S and Kaushik B (2019). A survey on internet of vehicles: Applications, security issues and solutions. Vehicular Communications, 20: 100182. https://doi.org/10.1016/j.vehcom.2019.100182 [Google Scholar]
- Sinha A and Mishra SK (2014). Queue limiting algorithm (QLA) for protecting VANET from denial of service (DoS) attack. International Journal of Computer Applications, 86(8): 14-17. https://doi.org/10.5120/15004-3153 [Google Scholar]
- Sommer C, German R, and Dressler F (2010). Bidirectionally coupled network and road traffic simulation for improved IVC analysis. IEEE Transactions on Mobile Computing, 10(1): 3-15. https://doi.org/10.1109/TMC.2010.133 [Google Scholar]
- Surutkar R and Jadhav C (2024). VANET for autonomous vehicles. In the IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS), IEEE, Bhopal, India: 1-7. https://doi.org/10.1109/SCEECS61402.2024.10482135 [Google Scholar]
- Wang C, Cheng X, Li J, He Y, and Xiao K (2021). A survey: Applications of blockchain in the internet of vehicles. EURASIP Journal on Wireless Communications and Networking, 2021: 1-16. https://doi.org/10.1186/s13638-021-01958-8 [Google Scholar]
- Yu S, Lee J, Park K, Das AK, and Park Y (2020). IoV-SMAP: Secure and efficient message authentication protocol for IoV in smart city environment. IEEE Access, 8: 167875-167886. https://doi.org/10.1109/ACCESS.2020.3022778 [Google Scholar]
|