Cargando…

Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers’ Strategies

Vehicular Ad-Hoc Network (VANET), a vital component of Intelligent Transportation Systems (ITS) technology, relies on communication between dynamically connected vehicles and static Road Side Units (RSU) to offer various applications (e.g., collision avoidance alerts, steep-curve warnings and infota...

Descripción completa

Detalles Bibliográficos
Autores principales: Ahmad, Farhan, Adnane, Asma, Franqueira, Virginia N. L., Kurugollu, Fatih, Liu, Lu
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6263439/
https://www.ncbi.nlm.nih.gov/pubmed/30463282
http://dx.doi.org/10.3390/s18114040
_version_ 1783375294681317376
author Ahmad, Farhan
Adnane, Asma
Franqueira, Virginia N. L.
Kurugollu, Fatih
Liu, Lu
author_facet Ahmad, Farhan
Adnane, Asma
Franqueira, Virginia N. L.
Kurugollu, Fatih
Liu, Lu
author_sort Ahmad, Farhan
collection PubMed
description Vehicular Ad-Hoc Network (VANET), a vital component of Intelligent Transportation Systems (ITS) technology, relies on communication between dynamically connected vehicles and static Road Side Units (RSU) to offer various applications (e.g., collision avoidance alerts, steep-curve warnings and infotainment). VANET has a massive potential to improve traffic efficiency, and road safety by exchanging critical information between nodes (vehicles and RSU), thus reducing the likelihood of traffic accidents. However, this communication between nodes is subject to a variety of attacks, such as Man-In-The-Middle (MITM) attacks which represent a major risk in VANET. It happens when a malicious node intercepts or tampers with messages exchanged between legitimate nodes. In this paper, we studied the impact on network performance of different strategies which attackers can adopt to launch MITM attacks in VANET, such as fleet or random strategies. In particular, we focus on three goals of MITM attacks—message delayed, message dropped and message tampered. The simulation results indicate that these attacks have a severe influence on the legitimate nodes in VANET as the network experience high number of compromised messages, high end-to-end delays and preeminent packet losses.
format Online
Article
Text
id pubmed-6263439
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-62634392018-12-12 Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers’ Strategies Ahmad, Farhan Adnane, Asma Franqueira, Virginia N. L. Kurugollu, Fatih Liu, Lu Sensors (Basel) Article Vehicular Ad-Hoc Network (VANET), a vital component of Intelligent Transportation Systems (ITS) technology, relies on communication between dynamically connected vehicles and static Road Side Units (RSU) to offer various applications (e.g., collision avoidance alerts, steep-curve warnings and infotainment). VANET has a massive potential to improve traffic efficiency, and road safety by exchanging critical information between nodes (vehicles and RSU), thus reducing the likelihood of traffic accidents. However, this communication between nodes is subject to a variety of attacks, such as Man-In-The-Middle (MITM) attacks which represent a major risk in VANET. It happens when a malicious node intercepts or tampers with messages exchanged between legitimate nodes. In this paper, we studied the impact on network performance of different strategies which attackers can adopt to launch MITM attacks in VANET, such as fleet or random strategies. In particular, we focus on three goals of MITM attacks—message delayed, message dropped and message tampered. The simulation results indicate that these attacks have a severe influence on the legitimate nodes in VANET as the network experience high number of compromised messages, high end-to-end delays and preeminent packet losses. MDPI 2018-11-20 /pmc/articles/PMC6263439/ /pubmed/30463282 http://dx.doi.org/10.3390/s18114040 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Ahmad, Farhan
Adnane, Asma
Franqueira, Virginia N. L.
Kurugollu, Fatih
Liu, Lu
Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers’ Strategies
title Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers’ Strategies
title_full Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers’ Strategies
title_fullStr Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers’ Strategies
title_full_unstemmed Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers’ Strategies
title_short Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers’ Strategies
title_sort man-in-the-middle attacks in vehicular ad-hoc networks: evaluating the impact of attackers’ strategies
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6263439/
https://www.ncbi.nlm.nih.gov/pubmed/30463282
http://dx.doi.org/10.3390/s18114040
work_keys_str_mv AT ahmadfarhan maninthemiddleattacksinvehicularadhocnetworksevaluatingtheimpactofattackersstrategies
AT adnaneasma maninthemiddleattacksinvehicularadhocnetworksevaluatingtheimpactofattackersstrategies
AT franqueiravirginianl maninthemiddleattacksinvehicularadhocnetworksevaluatingtheimpactofattackersstrategies
AT kurugollufatih maninthemiddleattacksinvehicularadhocnetworksevaluatingtheimpactofattackersstrategies
AT liulu maninthemiddleattacksinvehicularadhocnetworksevaluatingtheimpactofattackersstrategies