Towards Mitigating Jellyfish Attacks Based on Honesty Metrics in V2X Autonomous Networks
Open Access
- 5 April 2023
- journal article
- research article
- Published by MDPI AG in Applied Sciences
- Vol. 13 (7), 4591
- https://doi.org/10.3390/app13074591
Abstract
In vehicle-to-everything (V2X) networks, security and safety are inherently difficult tasks due to the distinct characteristics of such networks, such as their highly dynamic topology and frequent connectivity disruptions. Jellyfish attacks are a sort of denial of service attack that are challenging to deal with, since they conform to protocol norms while impairing network performance, particularly in terms of communication overhead and reliability. Numerous existing approaches have developed new techniques with which to identify and prevent these attacks; however, no approach has been capable of facing all three types of Jellyfish attacks, which include reordering attacks, delay variance attacks, and periodic drop attacks. In this work, we design a new protocol that analyzes the behavior of every node in a network and selects the trusted routes for data transmission to their intended destination by calculating different Honesty metrics. The OMNET++ simulator was used to evaluate the overall performance of the proposed protocol. Various evaluation metrics, such as the packet delivery ratio, end-to-end delay, and throughput, are considered and compared with other existing approaches.This publication has 43 references indexed in Scilit:
- Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANETCluster Computing, 2017
- Intelligent Intrusion Detection of Grey Hole and Rushing Attacks in Self-Driving Vehicular NetworksComputers, 2016
- LTE evolution for vehicle-to-everything servicesIEEE Communications Magazine, 2016
- QoS-aware Routing in Multi-rate Ad hoc Networks Based on Ant Colony OptimizationNetwork Protocols and Algorithms, 2016
- Secure Link Establishment Method to Prevent Jelly Fish Attack in MANETPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- A novel defense mechanism via Genetic Algorithm for counterfeiting and combating Jelly Fish attack in Mobile Ad-Hoc NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- A time space cryptography hashing solution for prevention Jellyfish reordering attack in wireless adhoc networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Impact of Denial of Service Attacks on Ad Hoc NetworksIEEE/ACM Transactions on Networking, 2008
- Trust-based security for wireless ad hoc and sensor networksComputer Communications, 2007
- GPSRPublished by Association for Computing Machinery (ACM) ,2000