A Survey On Jamming in VANET PDF
A Survey On Jamming in VANET PDF
A Survey On Jamming in VANET PDF
1; January 2015
Authors:
Sharaf Malebary
PhD student Department of Computer Science and Engineering University of South Carolina – USA
Dr. Wenyuan Xu
Assistant Professor Department of Computer Science and Engineering University of South Carolina
142
International Journal of Scientific Research and Innovative Technology Vol. 2 No. 1; January 2015
Abstract
Vehicular Ad Hoc Networks (VANET) has attracted today’s research efforts. Despite the attention that
VANET research got, current solutions to achieve secure VANET still undergoing to protect the network
from adversary and attacks. The need for a reliable VANET networks is strongly tied to the security and
privacy features. This paper provides a detailed study on wireless networks and focuses on undergoing
research solutions to secure VANET. In particular, this paper provides intensive information regarding
jamming problems in wireless network and shows the seriousness of this type of attack. Moreover, a
various types of security problems and challenges of VANET been analyzed and discussed; we also
surveyed different set of solutions that research has proposed to help securing wireless networks.
143
International Journal of Scientific Research and Innovative Technology Vol. 2 No. 1; January 2015
VANET promises a safer environment security requirements that have been validated
for everyone who shares the road, by alerting [7]. Although, authentication and non-
pedestrians, vehicles and motorcyclists to avoid repudiation are important, availability is the
fatality. The alerts are generated by collecting foundation for all different type of networks and
data from nodes in VANET and provide has to be assured. One of easy-to-launch yet,
warning messages to nodes that are in affected hard-to-cope threats is jamming attack.
areas or routing toward it. Additionally VANET Jamming attacks can affect VANET
increases comfort by allowing automatic toll availability, because a jammer can block
collection, traffic congestion detection, warning messages e.g. accident warning, road
emergency dispatch services, and electronic hazard, emergency vehicle etc. The
inspection of moving trucks through data consequences of not receiving these messages
transmissions with roadside inspection facilities can result in failing to slow down, rerouting or
[11]. VANET proved how useful these warning stopping the vehicle, which can jeopardize
messages to avoid crashes, safe lives and drivers’ and passengers’ safety. It is difficult to
enhance driving experiences. detect jamming reliably and the impact can be
The Research and Innovative devastating. Hence, Jamming is an open
Technology Administration (RITA) has problem. This paper surveys the security issues
acknowledged the need to utilize technology for that VANET may encounter in particular
safety purposes. Hence it allocated 75 MHz in Jamming attack. At the same time, it surveys
the 5.9 GHz frequency band licensed for current and different solutions for jamming
Dedicated Short-Range Communication attack in other type of networks and show the
(DSRC) [1]. The U.S. Department of specialty of coping jammers in VANET. The
Transportation commitment to DSRC highlights paper is organized as follow, section 2 provides
two critical points: (1) safety is the highest background information. Security challenges
priority and is the central focus for the and goals will be discussed in section 3. Section
connected vehicle technologies. (2) The analysis 4 will survey available solutions for jamming
illustrates that DSRC is the only available problem. Future work and improvements will be
technology in the near-term that offers the discussed in section 5. Finally a conclusion will
latency, accuracy, and reliability needed for be given in section 6.
active safety [2]. Thus many organizations and
manufacturers started advocating VANET by 2. Background
investing on perfecting it.
In spite of the ongoing research efforts In this section we provide background
from, academic and industry, many security on VANET and discuss the importance and
issues remain to be resolved. Since VANET is need of VANET. The reality of VANET will be
expected to provide safety for drivers, it is discussed as well and real examples will be
essential to secure it against abuse, and ensure given to prove that VANET is becoming a
the Quality of Service (QoS) in the presence of reality.
security breaches. However, security and QoS
are two requirements that are related but in 2.1 VANET Infrastructure & Standards.
conflict. When security increases QoS drops and VANET, a type of ad hoc networks, is a
vice versa. Hence, VANET needs to strike a self-organized and infrastructure-less network.
balance between the two goals (security and In this type of networks, mobile devices are
QoS) to make it real. connected together wirelessly [10]. Each mobile
Despite the different types of attacks device (called a node) acts as both data terminal
that may be carried out, we can categorize their and router. Nodes in the network use the
importance in terms of: Authentication, wireless medium to communicate with
Availability and non-repudiation, which are the neighboring ones within range. These nodes can
144
International Journal of Scientific Research and Innovative Technology Vol. 2 No. 1; January 2015
be vehicles or roadside units (RSUs) in the service channels to use the service. The
VANET. ultimate target for all channels is to enable
The discovery of VANET appeared after drivers to receive information about their
the wireless data networks proliferation due to surrounding environment. Besides safety related
the recent adoption of the various 802.11. messages, service channels can announce places
Wireless LANs are widely deployed and the of interest (e.g. restaurants in the area or gas
cost for wireless equipment is dropping. 802.11 stations) in the driver’s locations to enhance
adapters or access points (AP) can be purchased comfort [13].
for next to nothing. As a result of the high
acceptance of the 802.11 standards, academic 2.2 VANET becoming reality
and commercial sectors focused on finding other The discovery of VANET has drawn
applicable wireless technologies. Hence, Mobile much interest all over the world. In Japan, many
ad-hoc network (MANET) is one area that has ITS projects have been established in 2000 to
received considerable attention which led to bring VANET to reality. A standard for V2I
VANET development. MANET and VANET communication was published in 2001 and
are very similar at the network level yet the denoted as DSRC (which was adopted by FCC
details differ. They key difference is that nodes in 2004) [22]. Based on the success of the
in MANET move randomly while in VANET, DSRC system and on infrared-based V2I
vehicles tend to move in an organized fashion. communications, various ITS projects are
The advantage of using ad hoc networks is to currently joining forces to enhance V2I and
allow the deployment in areas where it is V2V communication under Japan’s national ITS
impossible to install the needed infrastructure. It safety 2010 initiative [18].
would be unrealistic and costly to install 802.11 In Europe, six companies and three
access points to cover all the roads in The universities have joined efforts to develop
United States for instance. Another advantage of FleetNet project (2000-2003) [20]. The main
ad hoc networks is how easily and quickly they objective of FleetNet was to develop and
can be deployed without administration demonstrate a platform for inter-vehicle
involvement. communication (IVC). The key design
The Federal Communications requirements for FleetNet are the capability to
Commission (FCC) acknowledged the distribute relevant data (e.g. road and weather
importance of VANET. Hence, it allocated 75 conditions) where needed, and to satisfy drivers'
megahertz of spectrum in the range 5.850 to and passengers' needs for location-dependent
5.925 GHz to be used for V2V and V2I information and services [17].
communications. The 5.9 GHz spectrum was In addition, Network on Wheels (NoW)
named Dedicated Short Range Communication [16] is a German research project carried out by
(DSRC) and its goal is to enable technologies major car manufacturers, suppliers, research
that support safety applications and institutes and universities. The project NoW is
communication between vehicle-based devices the successor of the previous pioneering
and infrastructure to reduce collisions [24]. research project FleetNet which ended in 2003
DSRC consists of seven 10MHz channels in [20]. NoW is supported by the German
which, six channels are used for services and government aiming to develop a vehicular
one channel for control [12]. The control communication system for V2V and V2I based
channel is used to, for example, broadcast safety on ad hoc principles and wireless LAN
messages to alert drivers of potentially technology. The project started on 2004 to
hazardous road conditions. Also, the control enhance road safety and develop infotainment
channel is used to announce the services that are applications [21].
available. If a vehicle finds a service of interest Many governments and institutes started
on the control channel, it then switches to one of adopting and researching VANET using these
145
International Journal of Scientific Research and Innovative Technology Vol. 2 No. 1; January 2015
projects as a foundation to build on the top of. given to prove the potential fatality when
The goal of these projects is to create or modify attacks are launched by adversaries.
network algorithms to be used in a vehicular
environment securely. Nowadays, VANET is no 3.1 Availability: Availability requires all
longer a project in labs or academic research. services that the network offers to be available
Car manufacturers (e.g. BMW, Opel, Honda, when needed by legitimate users. One harmful
Renault, Volvo etc.) have signed Memorandum attack is DoS.
of Understanding on Deployment (MoU) in
2012 to expand the deployment of VANET 3.2 Confidentiality: Confidentiality offers
applications [19]. Many real-life experiments protection for nodes against unauthorized ones
and demos are currently implemented and to avoid messages delay attack. A famous attack
deployed using different VANET systems in that targets confidentiality is Eavesdropping.
vehicles. Automatic toll collection, traveler
information system, and intelligent traffic 3.3 Authentication and Identification: This
control systems are already deployed and used requirement ensures that users and messages in
on a daily basis in different parts of the world. the network are legitimate. Impersonation and
Many security projects have been started Sybil attacks are very well known to target and
academically; however, efforts in making harm this requirement.
security projects in the real world are yet to be
established. After reviewing the security
Since VANET is becoming a reality, the requirements that VANET should satisfy when
security of the network is an important key to deployed, we conclude that security is very
insure the feasibility and reliability of services. important in VANET. Moreover, securing all
Hence, VANET security is an important aspect communication and assuring attack-free
to be assured when using the network. Security environment is not an easy job due to the high
projects in the real world are needed to evaluate mobility and the topology of the network.
the risk of adversaries. The next section will Hence, Research is still on going to secure more
discuss the security issues that VANET lack as areas of VANET communications.
well as the current progress and effort to resolve
them. 4. Jamming problem.
3. VANET requirements and Security Jamming attack deliberately transmits of
challenges radio signals to disrupt communications by
decreasing the signal-to-noise ratio. The term
So far, VANET security has not gotten jamming is used to distinguish it from
enough attention even though it is very crucial. unintentional jamming which called
The criticality lays on the contents of VANET’s interference. Our focus is to study Jamming
packets which contains significant life attacks that launched to disrupt communications
information. So it is important to assure reliable intentionally. To do so, we need to understand
delivery of packets in the network without the different jamming strategies of jammers.
alteration. To do so, security challenges need to Jamming attack can be classified into
be addressed and considered when designing four different classes based on its behavior;
VANET architecture [7]. Constant, Deceptive, Random and Reactive
VANET must satisfy the security jamming. 1) Constant jamming transmits
requirements before deployment. In this section, random generated data on the channel without
we present the security requirements that must checking the state of the channel (Idle or not). 2)
be considered. Some attack scenarios will be The Deceptive jammer injects a stream of
random data constantly without keeping gap
146
International Journal of Scientific Research and Innovative Technology Vol. 2 No. 1; January 2015
between successive packets transmission. 3) including DOS attack. The DoS attack was
Random jamming fluctuates between jamming then introduced and its severity was
and sleeping mode to conserve energy. 4) presented. Authors categorized DOS attacks
Reactive jamming jams only when it senses into three categories: 1) Basic Level
activity on the channel otherwise it stays idle (overwhelm node resources). 2) Extended
[43]. While all jamming attacks can harm the level (jamming the channel). And 3)
network performance equally, the main Distributed Denial of Services (DDOS). A
difference is the detection difficulty. proposed solution was given based on
relying on utilizing the On-Board-Unit
4.1 VANET (OBU) that each vehicle is equipped with.
OBU is supposed to make a decision as to
Jamming is a serious threat to VANET prevent a DOS attacks using one of the
security. Jammers constantly send repeated proposed techniques (switching channels,
signals (in affected area) to interfere with the technology or use frequency hopping) to
communication between nodes in the network. avoid DOS attack [41].
The victim feels that the state of the channel is • Detection of radio interference in VANET
still busy. Therefore, it cannot send or receive [42]: Authors proposed a new model of
packets in the jammed area. detection based on the correlation
When jamming is enabled, the sender coefficient (CC). CC is a statistic measure of
may successfully send packets; the receiver relation between two random variables and
cannot receive all the packets sent by the sender. its value between (-1 and1). A node
Hence, its packet delivery ratio (PDR) is low. calculates and compares two values: the
These packets can be carrying important error probability (EP) and the correlation
information (life threatening) such as, road coefficient (CC). If the CC is greater than
conditions, weather, accidents, etc. and failure the EP then the network is considered
to receive or disseminate these packets can lead jammed. The relation between EP and CC
to fatalities. was measured using NS-2 to evaluate the
Challenges: Due to the high mobility of model and SUMO was used to generate the
VANET and the rapid change of its topology, vehicular mobility patterns.
defending VANET against jammers has been a • A New Anti-Jamming Strategy for
hard problem. That because jammers don’t have VANET [44]: Authors have studied the
to comply with any protocols and their mobility security issues that VANET can encounter.
is not limited. A jammer can be standing on feet In particular they focused on jamming-style
or driving randomly down the roads. Moreover, DoS attacks. The paper measured the
adversaries have full control of when to start effeteness of defense mechanism against
jamming and when to go into a sleep mode to jamming and proposed a new direction to
hide its existence. All these reasons have made utilize RSU to make VANET defense more
jamming problem a challenge to solve and feasible. Authors defined a scheme called
detect. (Hideaway strategy) which uses the PSR
(packet send ratio) to determine if a network
Related Work is jammed and consequently all nodes
should go into silent mode. The paper didn’t
• Denial of Service (DOS) Attack and Its discuss detection and presumed it is out of
Possible Solutions in VANET [41]: the paper scope.
Authors explained the need to obtain • Security Challenges, Issues and Their
network availability all the time in order to Solutions for VANET [7]: R. Raw et al
assure security. Then they described studied the security requirements and
different possible attacks in VANET
147
International Journal of Scientific Research and Innovative Technology Vol. 2 No. 1; January 2015
148
International Journal of Scientific Research and Innovative Technology Vol. 2 No. 1; January 2015
150
International Journal of Scientific Research and Innovative Technology Vol. 2 No. 1; January 2015
optimal jamming and defense effectiveness. Authors described a mapping protocol for
Authors suggested that the network should nodes that surround a jammer. As a result,
compute channel access probability to this service allows network applications to
minimize the jamming detection time. This reason about the region as an entity instead of
work studied the interaction between jammer broken links and congested nodes. Evaluation
and the nodes in the networks. results show that regions can be mapped in 1–
• Compromise-resilient anti-jamming for 5 seconds. Authors found that the protocol is
wireless sensor networks [34]: this paper robust to failure rates as high as 25 percent in
focused in studying insider jammers. An case of moderate connected network.
attacker can gain cryptographic information • WisperNet: Anti-Jamming for Wireless
through compromised nodes and then launch Sensor Networks [63]: the paper proposed a
jamming attacks. The paper then proposes a new protocol called WisperNet (time-
compromise-resilient anti-jamming scheme to synchronized protocol). The new protocol
deal with the problem. According to the consists of two components: 1)WisperNet-
scheme, the physical channel used by a sensor Time, with the goal to reduce the censorship
network is determined by the group key ratio of a statistical jammer to that of a
shared by the sensor nodes. The solution of random jammer. 2)WisperNet-Space in which
this paper is to determine the channels by the network routes are adapted constantly to
group key shared by all nodes. When insider avoid jammed areas and select paths with max
jamming happens, the network will issue a PDR. The evaluation of the protocol shows
new group key for nodes that are not that WisperNet reduces the efficiency of
compromised to protect the network from the jammers even a random one. The proposed
insider jamming. protocol has been implemented on FireFly
• Channel surfing and spatial retreats: (which is a time synchronized real time sensor
defenses against wireless denial of service network platform) for evaluation purposes.
[35] and Defending wireless sensor Some limitations have been observed after
networks from radio interference through experiments. One of the main observation is
channel adaptation [36]: the two papers that WisperNet-Spatial routing scheme is
introduced four common types of jammers: incapable of scaling well in large networks
constant, random, reactive and deceptive. (more than 500 nodes) under moderate to
Authors studied those different types of heavy attacks. That’s because the message
jammers and proposed a technique called from the gateway may not get through.
channel surfing which is developed to cope
with the jamming interference. The channel Since wireless sensor network have been
surfing technique proposes that sensor nodes drawing much attention, research has contributed
should change the communication channel in solving jamming problems in WSN. Little
when they detect jamming attacks. Two research left to enhance current protocols to
channel surfing methods are explored. One is assure a better PDR. A tradeoff between PDR and
coordinated channel switching, in which the security has been acknowledged when securing
entire sensor network changes the radio WSN against different attacks.
channel. The other is spectral multiplexing, in
which the nodes in the jammed area change
the radio channel and the nodes on the 4.3 Wi-Fi
boundary act as relays.
• JAM: a jammed-area Mapping service for Challenges: freedom to mobile and strong
sensor networks [37]: a jammed area connectivity has made WiFi a very popular
detecting and mapping service is developed. technology that made Hotels, Restaurant and
public locations adopting it. However, few issues
151
International Journal of Scientific Research and Innovative Technology Vol. 2 No. 1; January 2015
have been discovered with more WiFi being network. However they found that using PDR
deployed around. WiFi connectivity links tend to was not sufficient to determine if the poor
be strong but as nodes started to distant links link is due jamming or nodes mobility. Based
remains and quality drops. Another issue with on their findings, authors proposed two
WiFi is repeated authentication may be required detection protocols that employ consistency
as nodes switch from an access point to another. checking. One scheme uses signal strength
Moreover, WiFi can suffer from the presence of measurements as a reactive consistency check
adversaries just like in any other type of network. for poor PDR while the other one utilize
Jamming, DoS, Impersonation, and location information to serve as the
eavesdropping are different types of attacks that consistency check. Experiments were
can be carried easily in a WiFi network by a deployed using MICA2 Mote platform and
moderate skilled adversary. results were giving to prove the feasibility of
the proposed scheme.
Related Work • Modeling, Evaluation and Detection of
Jamming Attacks in Time-Critical
• Carving Secure Wi-Fi Zones with Wireless Applications [50]: the paper aim at
Defensive Jamming [48]: the paper focuses modeling and detecting jamming attacks
on turning jamming from being a problem to against time-critical wireless networks with
utilizing it to create a secure Wi-Fi zone. applications to smart grid. Authors introduced
Authors referred to the technique as defensive message invalidation ratio as a new metric to
jamming. The concept is to use jamming quantify the performance of time-critical
signals to protect Wi-Fi zone from any applications. The proposed modeling
information leakage inside the boundaries. approach was inspired by the comparison
Authors assumed that an insider can try to between the behavior of jammer and a
leak information using cellular network and gambler who intends to win a game. They
thus it needs to be monitored by the network found that by comparing gambling-based
administrator. Experiments details were modeling and real-time experiments, there
giving where defensive jammers location was exists a phase transition phenomenon for
adjusted as well as its power to reach the successful time-critical message delivery
optimal scenario. under a variety of jamming attacks. That is, as
• The Feasibility of Launching and Detecting the probability that a packet is jammed
Jamming Attacks in Wireless Networks increases from 0 to 1, the message
[49]: in this paper, Xu et al. have studied the invalidation ratio increases dramatically to 1.
problem of launching jamming attack on Based on analytical and experimental results,
wireless networks and its criticality. Based on Jamming Attack Detection based on
the results of the study they proposed four Estimation (JADE) scheme was designed to
different jamming attack models that can be achieve robust jamming detection, and
launched easily to interfere with the operation implement JADE in a wireless network for
of wireless networks. The paper provides power substations in the smart grid.
evaluation of the different jamming attack Experiments and results showed that applying
models in term of their effectiveness and JADE achieved efficient and robust jamming
ability to block communication. Authors also detection for power networks.
concluded that signal strength and carrier • SecureArray: Improving WiFi Security
sensing time are not enough to detect jammers with Fine-Grained Physical-Layer
presence effectively. They also conducted Information [64]: the paper proposed a new
experiments where PDR was used to system called SecureArray to work alongside
differentiate between congested and jammed existing wireless security protocols to
152
International Journal of Scientific Research and Innovative Technology Vol. 2 No. 1; January 2015
153
International Journal of Scientific Research and Innovative Technology Vol. 2 No. 1; January 2015
The schemes have to satisfy VANET [3]A Dhamgaye, and N Chavhan, “Survey on
requirements while maintaining good QoS. Security Challenges in VANET”, Vol.2, pp88-96,
Research has already started and results will be IJCSN 2013.
shown in the next paper. [4]R Kumar, and M Dave, “A Comparative Study
of Various Routing Protocols in VANET”, Vol.8,
6. Conclusion pp643-648, IJCSI 2011.
The FCC acknowledged the seriousness of [5]National Highway Traffic Safety
jamming affect and considered jamming a Administration, Laws & Regulations, Vehicles,
criminal offense. They stated that it is unlawful http://www.nhtsa.gov
to market, sell or operate jamming in US. [6]Engine Control Unit, Working of ECU,
Offenders (jammers) can face fines (up to http://en.wikipedia.org/wiki/Engine_control_unit.
$112,500), seizure of equipment and jail time [7]R Raw, M Kumar, and N Singh, “Security
[39]. This section will provide information on Challenges, Issues and Their Solutions for
jamming affect in different type of networks VANET”, Vol.5, pp95-105, IJNSA 2013.
(Wireless Sensor Network, Wi-Fi, GPS, [8]M Raya, P Papadimitratos, JP Hubaux,
MANET, and VANET). We will also survey “Securing Vehicular Communications”, IEEE
proposed solutions to defend against jamming Wireless Communications, Vol.13, October 2006
attacks. Finally, the feasibility of these solutions [9]J Nzouonta, N Rajgure, G Wang, and C
to protect VANET against jamming attacks will Borcea, “VANET Routing on City Roads Using
be discussed and current research will be Real-Time Vehicular Traffic Information”, Vol.
provided. In this work we extensively studied 58, pp3609-3626, IEEE, September 2009
vehicular Ad-Hoc network in different aspects. [10] “Mobile ad-hoc Network.” Wikipedia: The
We provided information regarding VANET Free Encyclopedia. Wikipedia Foundation, Inc.
standards as well as past and current projects in 18 September 2014. Web,
different parts of the world. Then more intensive http://en.wikipedia.org/wiki/Mobile_ad_hoc_net
research was done to provide solid information work.
about security issues and in specific jamming [11]Federal Communications Commission,” FCC
attacks and their affect on the network. This Proposes to Allocate Spectrum in 5.9 GHz Range
paper surveyed jamming problem in different For Intelligent Transportation Systems Uses”,
type of networks and provide key information http://www.fcc.gov, June 1998.
regarding current progress of solving jamming [12]R. Dass, R. Sangwan, and I. Girdhar,
problem. This paper works as a base study for “Vehicular Ad Hoc Networks”, IJATCSE, Vol.1,
our next work. Our future target is to study October 2012.
jamming effect in VANET and propose a strong [13]M Abdellatif, “ A Brief Summary on the
yet easy to implement detection method to alert Main Aspects and Challenges of Vehicular Ad-
users of a potential jamming attack in the Hoc Networks (VANETs)”, INESC Porto, 2010.
network. [14]“Electronic control unit”, Wikipedia: The
Free Encyclopedia. Wikipedia Foundation, Inc.
References: September 2014. Web,
http://en.wikipedia.org/wiki/Electronic_control_u
[1]Y Qian, K Lu, and N Moayeri, “A Secure
nit
VANET MAC Protocol for DSRC Applications”,
[15]Fatality Analysis Reporting System (FARS)
IEEE Globecom, 2008
Encyclopedia, “National Statistics”, http://www-
[2]U.S. Department of Transportation,
fars.nhtsa.dot.gov/Main/index.aspx
IntelligentTransportation Systems (ITS) Home,
[16]G. Samara, W. Al-Salihi, and R.
http://www.its.dot.gov/index.htm
Sures,”Security Analysis of Vehicular Ad Hoc
Networks”, 2nd NETAPPS, 2010.
154
International Journal of Scientific Research and Innovative Technology Vol. 2 No. 1; January 2015