Next Article in Journal
Evaluation of the Characteristics and Coating Film Structure of Polymer/Ceramic Pressure-Sensitive Paint
Next Article in Special Issue
A 5G V2X Ecosystem Providing Internet of Vehicles
Previous Article in Journal
Towards the Internet of Flying Robots: A Survey
Article Menu
Issue 11 (November) cover image

Export Article

Open AccessArticle
Sensors 2018, 18(11), 4040; https://doi.org/10.3390/s18114040

Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers’ Strategies

1
Cyber Security Research Group, College of Engineering and Technology, University of Derby, Derby DE22 3AW, UK
2
Department of Computer Science, Loughborough University, Loughborough LE11 3TU, UK
3
College of Engineering and Technology, University of Derby, Derby DE22 3AW, UK
*
Authors to whom correspondence should be addressed.
Received: 11 October 2018 / Revised: 14 November 2018 / Accepted: 18 November 2018 / Published: 20 November 2018
(This article belongs to the Special Issue Recent Advances in Software-Defined Internet of Vehicles (SDIoV))
Full-Text   |   PDF [1718 KB, uploaded 20 November 2018]   |  

Abstract

Vehicular Ad-Hoc Network (VANET), a vital component of Intelligent Transportation Systems (ITS) technology, relies on communication between dynamically connected vehicles and static Road Side Units (RSU) to offer various applications (e.g., collision avoidance alerts, steep-curve warnings and infotainment). VANET has a massive potential to improve traffic efficiency, and road safety by exchanging critical information between nodes (vehicles and RSU), thus reducing the likelihood of traffic accidents. However, this communication between nodes is subject to a variety of attacks, such as Man-In-The-Middle (MITM) attacks which represent a major risk in VANET. It happens when a malicious node intercepts or tampers with messages exchanged between legitimate nodes. In this paper, we studied the impact on network performance of different strategies which attackers can adopt to launch MITM attacks in VANET, such as fleet or random strategies. In particular, we focus on three goals of MITM attacks—message delayed, message dropped and message tampered. The simulation results indicate that these attacks have a severe influence on the legitimate nodes in VANET as the network experience high number of compromised messages, high end-to-end delays and preeminent packet losses. View Full-Text
Keywords: Vehicular Ad-Hoc network; security; Man-In-The-Middle Attack; smart cities; simulation; Intelligent Transportation System; Internet-of-Things Vehicular Ad-Hoc network; security; Man-In-The-Middle Attack; smart cities; simulation; Intelligent Transportation System; Internet-of-Things
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Ahmad, F.; Adnane, A.; Franqueira, V.N.L.; Kurugollu, F.; Liu, L. Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers’ Strategies. Sensors 2018, 18, 4040.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top