About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
6GN for Future Wireless Networks. Third EAI International Conference, 6GN 2020, Tianjin, China, August 15-16, 2020, Proceedings

Research Article

Research on Detection Method of Malicious Node Based on Flood Attack in VANET

Download(Requires a free EAI acccount)
3 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-63941-9_28,
        author={Yizhen Xie and Yuan Li and Yongjian Wang},
        title={Research on Detection Method of Malicious Node Based on Flood Attack in VANET},
        proceedings={6GN for Future Wireless Networks. Third EAI International Conference, 6GN 2020, Tianjin, China, August 15-16, 2020, Proceedings},
        proceedings_a={6GN},
        year={2021},
        month={1},
        keywords={VANET security 5G Flood attack TCP SYN flood UDP traffic flood},
        doi={10.1007/978-3-030-63941-9_28}
    }
    
  • Yizhen Xie
    Yuan Li
    Yongjian Wang
    Year: 2021
    Research on Detection Method of Malicious Node Based on Flood Attack in VANET
    6GN
    Springer
    DOI: 10.1007/978-3-030-63941-9_28
Yizhen Xie1, Yuan Li2,*, Yongjian Wang3
  • 1: Beijing University of Posts and Telecommunications
  • 2: Southwest University of Science and Technology, Mianyang
  • 3: National Internet Emergency Center
*Contact email: Liyuan_3033@163.com

Abstract

For the reason of the variability and mobility of VANET’s topology, it is easy to be attacked by attackers. This paper proposes two detection methods for TCP Synchronize Sequence Numbers (SYN) flood attacks and UDP traffic flood attacks in combination with the requirements of the rapid and real-time detection for malicious nodes in the security of the 5G VANET, and to enhance the ability to identify and detect malicious nodes. For the TCP SYN flood attack, the number of access requests with the same node ID is limited, and the number of semi-connections in Road Side Unit (RSU) is adjusted. For the UDP traffic flood attack, the RSU is used to monitor and analyze the data traffic of each node in VANET. Through the feasibility analysis, the above two detection methods can effectively detect flood attacks in VANET, thus assisting the network defense mechanism to ensure network security. Thereby providing guarantee for the security of VANET in the 5G communication environment.

Keywords
VANET security 5G Flood attack TCP SYN flood UDP traffic flood
Published
2021-01-29
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-63941-9_28
Copyright © 2020–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL