
Research Article
Research on Detection Method of Malicious Node Based on Flood Attack in VANET
@INPROCEEDINGS{10.1007/978-3-030-63941-9_28, author={Yizhen Xie and Yuan Li and Yongjian Wang}, title={Research on Detection Method of Malicious Node Based on Flood Attack in VANET}, proceedings={6GN for Future Wireless Networks. Third EAI International Conference, 6GN 2020, Tianjin, China, August 15-16, 2020, Proceedings}, proceedings_a={6GN}, year={2021}, month={1}, keywords={VANET security 5G Flood attack TCP SYN flood UDP traffic flood}, doi={10.1007/978-3-030-63941-9_28} }
- Yizhen Xie
Yuan Li
Yongjian Wang
Year: 2021
Research on Detection Method of Malicious Node Based on Flood Attack in VANET
6GN
Springer
DOI: 10.1007/978-3-030-63941-9_28
Abstract
For the reason of the variability and mobility of VANET’s topology, it is easy to be attacked by attackers. This paper proposes two detection methods for TCP Synchronize Sequence Numbers (SYN) flood attacks and UDP traffic flood attacks in combination with the requirements of the rapid and real-time detection for malicious nodes in the security of the 5G VANET, and to enhance the ability to identify and detect malicious nodes. For the TCP SYN flood attack, the number of access requests with the same node ID is limited, and the number of semi-connections in Road Side Unit (RSU) is adjusted. For the UDP traffic flood attack, the RSU is used to monitor and analyze the data traffic of each node in VANET. Through the feasibility analysis, the above two detection methods can effectively detect flood attacks in VANET, thus assisting the network defense mechanism to ensure network security. Thereby providing guarantee for the security of VANET in the 5G communication environment.