Due to their nature, Vehicular Ad hoc NETwork (VANET) is vulnerable to Denial of Service (DoS) attacks, such as jamming attack. The objective of a jammer is to interfere with legitimate wireless communications, and to degrade the overall QoS of the network. In this paper, we propose a model to detect a particular class of Jamming attack, in which the jammer transmits only when valid radio activity is signaled from its radio hardware. This detection model is based upon the measurement of error distribution.
This paper presents a novel approach for detecting denial of service attacks. In particular, the concern is on the sleeping deprivation attacks such as the malicious nodes that use flooding technique. Our approach is based on wireless sensor network (WSN) clustering. It consists in recursively clustering sensors until a required granularity (chosen by the expert) is achieved. We apply our approach with two different clustering algorithms. Indeed, we use the common clustering WSN algorithm Low Energy Algorithm Adaptive Clustering Hierarchy and the general clustering method Fast and Flexible Unsupervised Clustering Algorithm (FFUCA) based on ultrametric properties. We discuss the behavior of the approach with the two algorithms. Also, we present numerical results that show the efficiency of recursive clustering using the FFUCA algorithm. 310 S. FOUCHAL ET AL.to DoS attacks such as jamming or greedy attacks. The radio signal may be jammed or interfered with and then induces a communication breakdown or a message loss. Many attack strategies, which a jammer can perform, exist, such as the following [11]:Constant: random bits of data are sent continuously over channel. Deceptive: valid packets are sent continuously over the channel. Random: the jammer alternates between sleeping and jamming the channel. Reactive: the jammer attacks only when another radio attempts to use the channel.Several solutions to cope with these attacks have been proposed in the literature [12]. All of them are mainly based on ad hoc networks that have more energy and processing capacities, like routing algorithms [13]. Thus, to overcome these problems, WSNs need specific protection mechanism that detect and reacts to make attacks more complicated [14]. In this context, many approaches are suitable of specific topology organization, especially a hierarchical one [15].Hierarchical topology of WSNs is based on clusters [16]. In fact, sensors are gathered into clusters. Each cluster is represented by a cluster head (CH). The CHs collect information that is locally processed and send it to the BS. This CHs are chosen among sensors that have sufficient resources (i.e., residual energy, memory, and computing capacity) [17]. The common algorithms that are used to cluster WSNs are Low Energy Algorithm Adaptive Clustering Hierarchy (LEACH) [18,19] and a Hybrid, Energy Efficient, Distributed (HEED) clustering approach for ad hoc sensor networks [20].Alrajeh et al. proposed in [4] a secure routing protocol for WSNs that uses a cluster-based security mechanism. They have considered cross-layer design and energy-harvesting system. The cross-layer information exchange allows a network usage and resources optimization by communicating different layers. This induces a multiple parameters exchange and so increases network performance and its efficiency. The energy-harvesting mechanism is applied to enlarge sensors availability and thus the network lifetime. This proposal offers a consistent energy management and efficient solution of secure path from source to ...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.