Vehicle-to-Everything (V2X) Communication Approach Towards Advanced Intelligent TransportationView this Special Issue
Jamming Attack in Vehicular Networks: Adaptively Probabilistic Channel Surfing Scheme
Vehicular networks play a crucial role in Intelligent Transportation System (ITS), making transportation safer and more convenient. Most applications in ITS require information carried by basic safety messages (BSMs) to be exchanged periodically among vehicles. However, BSMs are vulnerable to different attacks, especially jamming attacks, due to their limited short message length and life span. In this paper, we analyze the impact of a jamming attack on BSMs and initially propose a random channel surfing scheme to attempt to react to the attack. We investigate the scheme by a simple extendible probabilistic model and simulation in NS-3. Obtained results provide a reference to design an optimal channel surfing scheme that adapts to its supported applications.
Vehicular networks facilitate communication among vehicles (V2V) and between vehicles and roadside infrastructure (V2I) in the transportation network. Thanks to this communication, the network infrastructure can serve an extensive range of applications. Among these, safety applications that make transportation safer are one crucial type. They operate based on essential information included in basic safety messages (BSMs), such as position, velocity, acceleration of vehicles, and hazardous incident warnings. Due to the requirement of freshness and the compact of information, BSMs are exchanged periodically every ms [1, 2] and have short lengths. These characteristics make BSMs prone to be targets of many types of wireless attacks, especially attacks at the physical and medium access control layer, such as jamming attacks. Limited packet length does not allow complex cryptography. The short life span, in milliseconds, makes BSMs easily become victims of simple but effective attacks like jamming attacks, as no time is taken for the attacker to do complex computations.
Jamming is one kind of Denial-of-Service (DoS) attack. It broadcasts radio signals in the physical channel to block any communication in the same physical channel within its transmission range. Jamming can be either constant jamming or reactive jamming. In constant cases, the attacker continually emits radio signals not following any rule of communication protocol. In reactive jamming, the attacker (so-called the jammer) transmits radio signals upon sensing a transmission in the medium. Reactive jamming is more dangerous and harder to detect as it conforms to legitimate transmission . The impact of jamming is graver to safety applications because of their time constraints. The consequence can be severe if the safety-related information is not delivered to the appropriate vehicles at the right time because of the interruption caused by jamming.
While the impact of a jamming attack is profound for safety applications, mitigation against them in vehicular networks encounters even more challenges. Indeed, characteristics of the vehicular environment have raised these challenges in VANETs. The main ones include issues of inherent properties of radio channels, highly dynamic operating environment, lack of centralized management, high-reliability requirements, and low latency communication and scalability.
In the case of BSMs, it becomes even more challenged because BSMs are supposed to be transmitted only in the control channel and renewed every short-time period ( ms, as the suggestion in [1, 2]). It relates to a multichannel operation specified in the suit of standards IEEE 1609 for Wireless Ad hoc Vehicular Environments (WAVEs). According to the suit of standards, vehicles switch alternatively between one control channel (CCH) to any service channel (SCH), as illustrated in Figure 1. This working mechanism allows single-PHY devices, or vehicles in VANETs, to access high-prioritized data and management traffic in CCH during CCH intervals (CCHIs), as well as general traffic in SCH intervals (SCHI).
There are a considerable number of proposals dealing with jamming attacks, one of the most practical proposed approaches is channel surfing . After detecting jamming   (jamming detection are out of our scope), communication devices change from the current jammed channel to other available channels. The question is which channel should be chosen provided that the communication can be remained among as many devices as possible while other performance and security constraints should be satisfied. The concept of channel surfing is commonly studied in wireless and vehicular networks but is not dedicated to safety applications. This paper focuses on safety applications in vehicular networks, precisely the critical type of messages, the BSMs.
Our contributions are in both mathematical and networking aspects. Firstly, we study the integration of mitigation against jamming attacks from wireless networks into VANETs and propose an adapted channel surfing scheme to deal with jamming attacks on safety applications in VANETs. Secondly, we offer a probabilistic model in the evaluation of our works. Simulation results validated the model. Furthermore, the results allow us to choose appropriate parameters of the scheme for the delay requirement of safety applications.
The paper is organized as follows: the threat of jamming attacks on safety applications in vehicular networks is briefly described in this Section 1; Section 2 discusses related works on methods to deal with jamming attacks in wireless networks; our random channel surfing scheme is elaborated in Section 3; the analytical model to investigate our proposed scheme is defined in Section 4; the obtained numerical results are validated by simulation and also analyzed in details in Section 5; Section 6 concludes the paper.
2. Related Works
Many research efforts focus on designing defense strategies for vehicular networks, but the problem remains an open issue. Several approaches have been developed in wireless networks to defend against jamming attacks. We can classify these solutions into two types of strategies: competition strategy and retreat strategy. In the competition strategy, nodes reduce jamming effects by adjusting their physical-layer parameters such as transmit power, data rate, and carrier sensing threshold . Because the radio channel substantially impacts communication in the vehicular environment, one should carefully consider the feasibility of competition strategy in vehicular networks. Besides, the retreat strategy seems more practical for communication in the vehicular environment. In retreat strategy, devices must coordinate to switch to the same new channel when jamming attacks block the current channel. However, channel coordination emerges as a problem for broadcasting, and BSM exchange has a broadcasting nature. This paper considers the feasibility of retreat strategy and channel surfing approach, particularly an attempt to deal with jamming attacks on BSMs.
In wireless networks, channel surfing approaches have been proposed [4, 7–9]. The crucial point making channel surfing feasible is how devices agree beforehand on the channel switching sequence. Based on how devices choose the channel switching sequence, channel surfing approaches can be classified into prior negotiation and without negotiation. In prior negotiation, devices must exchange information to make a channel agreement . Considering Wi-Fi communication, Navda et al.  proposed a channel surfing scheme on which the access point generates a pseudorandom channel sequence, encrypts it, and exchanges it securely using the client’s public key. In , the authors propose a coordinated channel-switching strategy. The devices, or nodes, detect themselves as jammed nodes, switch immediately to the orthogonal channel, and wait for chances to reconnect to the entire network. The boundary nodes who lose connectivity with their neighbors monitor available channels and connectivity to their neighbors in these channels. Finally, the boundary node selects the new channel and notifies all other nodes. Performance of channel surfing approaches also varies accordingly to the mobility of the networks because of the change in neighborhood leading to the variation of the number of neighbors [11, 12].
The prior negotiation may guarantee the channel agreement after jamming detection; however, it can be vulnerable to attackers. Negotiation data is exposed and possibly intercepted; thus, one can reveal the surfing sequence or information of the new channel. For this reason, Djuraev et al. propose a channel surfing scheme without prior negotiation. They use transmission power and received signal strength to determine the next channel in . In , two entities, A and B, exchange packets, and B sends a data packet to A. Then, A acknowledges back to B in the following ACK. The next channel is determined based on the received signal strength indicator of the data packets and ACKs received at corresponding entities. Considering physical technology to deal with jamming, Strasser et al. propose a frequency hopping on which the two communication entities switch their channel at different rates . There exist time slots that the two entities can encounter. The technique requires advanced transceivers and does not reach high channel utilization. The issue of effective coordination among vehicles to react to jamming attacks remains [3, 13].
The abovementioned approaches focus on communication between only two entities in wireless networks. Mitigating jamming attacks in vehicular networks for broadcast communication is still an open issue. There have been several works on broadcast in wireless networks. The authors in  utilize spreading code to cope with jamming in broadcast scenarios. The proposed protocol applies to the Code Division Multiple Access (CDMA) system. In , the authors propose a collaborative broadcast scheme using the uncoordinated frequency hopping technique. According to this scheme, nodes receiving a broadcast message will help forward it to other nodes. There are always opportunities for nodes to exchange messages through unjammed channels. As one of the limited number of works that consider broadcast in VANETs,  proposes a hideaway strategy. Vehicles stop all transmission until the jammer moves away. It means communication is interrupted for an undetermined period. Focusing on safety applications in vehicular networks, in this paper, we initially propose an adaptively probabilistic channel surfing scheme that adapts to their characteristics, such as broadcast manner, multiple channel operation, and short lifespan of BSMs. This scheme is an extended version of the one proposed in . We study our scheme in a mathematical model and use simulation to validate the results. The mathematical model allows us to tune the scheme to achieve the time constraint requirements of safety applications in vehicular networks. We elaborate on the detail of the scheme in the following section.
3. Adaptively Probabilistic Channel Surfing Scheme
This paper assumes vehicles that participated in the network have been deployed with some safety applications, and these applications always have safety information that is needed to broadcast through BSMs. Second, the jammer will attack the network at a given time. According to the standard IEEE 1604.9, vehicles alternatively switch from one CCH to one of 6 available SCHs to accommodate corresponding services. BSMs are exchanged periodically every 100 ms at CCHIs. In case of being attacked, communication in CCH is blocked by a reactive jammer that emits a noninformation radio signal whenever it senses a transmission within its sensitivity range. After detecting the attack of the jammer, vehicles will trigger our proposed random channel surfing scheme. Vehicles change their operating channel to a random one of the 6 SCHs instead of CCH during each CCHI. For SCHIs, vehicles keep their original schedule to maintain non-safety services. Every vehicle is supposed to have one safety-related information included in several BSMs that should be sent repeatedly within a certain period, provided that the number of vehicles that received the information is as high as possible. In this work, vehicles continuously transmit the safety information till the transmission times reach 100, i.e., during 10 seconds.
3.2. Random Channel Surfing Scheme
When a vehicle detects a jamming attack, the procedure implemented in this vehicle is triggered. First, the vehicle chose a set of predefined probability parameters for channel assignment. The values of those parameters represent the probabilities of which SCH channels will be assigned for the next CCHI. The applications that need to broadcast their safety information must choose which set of parameters. Criteria are selected based on their designs and requirements of time constrain. In this paper, we evaluate three different sets of predefined probability parameters (Table 1). The first set corresponds to when choosing one of the available SCHs is uniformly distributed between and . In the second and third cases, the distribution of choosing SCH is linear and geometric. Figure 2 illustrates these distributions.
Once the channel number is assigned, the vehicle switches to that channel for the next CCHI. The SCH number follows the same distribution the vehicle chooses at the beginning. The procedure is detailed in Algorithm 1. After the jamming attack is confirmed and the communication fails, this procedure first calls the function. This function returns the number of SCH based on the type of safety application. Each application has a corresponding set of probability parameters. Next, the application stops communication on the current SCH, and a new SCH will be used in the next CCHI. The procedure will be executed until the communication is recovered (receiving BSMs).
3.3. Evaluation Metric
We can evaluate the usefulness of this random channel surfing scheme by the mean number of vehicles that can recover the communication when suffering a jamming attack after a time interval . It means that after CCHIs (BSMs are exchanged periodically every CCHI), the larger the mean number of vehicles that receive BSMs is, the better the performance of the proposed scheme is. The evaluation of this proposed scheme thus boils down to finding out the average number of vehicles that receive the BSMs after CCHIs.
4. Analytical Model
Proposition 1. We consider the random channel surfing described in the previous section. Let be the number of vehicles receiving BSMs from a sender. Let be the random variable representing the number of vehicles able to receive BSMs after CCHIs. Then, with its probability mass function: where is the matching probability for sender and receivers to stay in the same SCH number, is the probability that SCH number will be assigned. The mean number of vehicles that can receive BSMs after timeslot is
Proof. Firstly, communication can only happen if the sender and receiver work in the same channel frequency. According to the assumption, the sender and receiver can randomly choose one of the six SCHs. The matching probability for them to stay in the same SCH is given by: Secondly, call the number of CCHIs until a receiver receives the BSM message. The best scenario is , meaning that the receiver gets the message immediately. The worst scenario occurs when , meaning this receiver always selects the channel differently from the sender. Indeed, is a discrete random variable that could take any value from to . For instance, consider the case , which means that in previous timeslots, this receiver did not receive the message. As mentioned above, at any given timeslot, the probability that the receiver gets the message is , and the probability of not receiving the message is . Thus, the probability of is given by Specifically, the random variable follows the Geometric distribution with parameter : and its probability mass function (PMF) is So, the probability for the receiver to receive the message at a given timeslot is given by Finally, consider the number of receiver that got the message after timeslots, . Each receiver has chance to receive the message independently from other receiver, and is fundamentally a Binomial random variable .
4.1. Application of Random Channel Surfing Model
One direct application of our analytical model for this random channel surfing scheme is to optimize the design of safety applications in vehicular networks. Indeed, safety applications are sensitive to time constrain. A natural way to improve the communication of safety applications when suffering jamming attacks is to adjust the matching probability. From (2), we can write
Thus, can be computed as a function of and .
Figure 3 depicts the mean number of vehicles that can recover communication as regards time (computed from the number of CCHIs). As the analytical model showed, when is uniformly distributed, we need almost second for of vehicles to recover. In case is geometrically distributed , only is required for of vehicles to reestablish the communication. Thus, by adjusting the channel assignment probabilities, a safety application can easily achieve its target of how many vehicles can be notified about safety information within a certain time slot.
5. Performance Evaluation
We evaluate our random channel surfing scheme by the number of vehicles receiving one information sent by a vehicle, called the sender, after a given time which is computed in a number of CCHIs. The analytical model and simulation allow us to study many scenarios with a different number of vehicles in the network. Due to lack of space, we present only the result for the scenario of vehicles in a communication range. Among vehicles, one vehicle plays the sender role. It retransmits its information in messages broadcast every CCHI. Every vehicle switches randomly to one of service channels every CCHI when the jamming attack is detected. The numerical result obtained from the analytical model allows us to determine , the expectation or the average number of vehicles that received the information after CCHIs. To validate the analytical model, we run simulations in NS-3  with the procedure being implemented in all vehicles (nodes) and using the WAVE model that is specified for the vehicular environment. The IEEE standard 802.11p and the 1609 standard set are implemented in the simulations. All simulation results are computed at confidence intervals. We evaluate our scheme with three different sets of probabilities parameters given in Table 1 and consider two cases of mobility: constant mobility where vehicle pattern has been fixed and traffic mobility where a traffic simulator generates vehicle pattern. Parameters used in the simulation are listed in Table 2.
5.1. Constant Mobility
Firstly, we analyze our scheme by studying the average number of received vehicles after a given time. Analytical and simulation results are compared in all figures. Figures 4–6 show the increase in the average number of vehicles that receive the information; in another words, the expectation of random variable as defined in the previous section. This figure also displays its corresponding standard deviation, which expresses how the real value differs from the average one. The simulation results validate the analytical results: they closely match the analytical results. At early CCHIs, the number of received vehicles increases dramatically and reaches , i.e., nearly vehicles at CCHI in case ( and in case and , respectively). After that, the number increases insignificantly. Almost vehicles, up to among vehicles, received information after CCHIs (). Matching the time requirement of ITS safety application specified in , approximately of vehicles using our scheme can satisfy the maximum latency of a given safety application of second. Depending on the use cases of applications, this performance can probably be acceptable. Thus, it raises the question of which cases this performance is reasonable. Then, in these cases, the information should be more critical to some vehicles than others. For example, vehicles close to the origin of the information about an incident may be much more impacted than vehicles at a far distance. Therefore, it is potential to extend our channel surfing scheme with the idea of prioritizing the receivers. It means that the scheme should somehow manage groups of vehicles provided that higher prioritized vehicles must be acknowledged of the safety information early, while others can loosen the time constraint.
Secondly, our analytical model also allows us to figure out the likely number of received vehicles after a certain time. Figure 7 depicts the probability distribution of the obtained value of at CCHIs in the analytical model and so in simulation. The number of received vehicles approximately ranges from to . It means that about to of vehicles are warned about the information after second. The value has the highest probability at in theory and in simulation. The probability distribution of after CCHIs is illustrated in Figure 8. After CCHIs, to vehicles receive the information. The results indicate the list of possible values of the number of received vehicles after a given time. It can be a reference to select the proposed scheme for suitable applications in terms of the freshness of exchanged information, expected informing scale of information, and network parameters such as the number of vehicles, density, available frequencies.
5.2. Traffic Mobility
To evaluate the impact of realistic traffic patterns, we generate vehicle locations from a traffic simulator in this scenario. This traffic simulator allows us to emulate driver behavior faithfully. On a highway, driver behavior is limited to accelerating, braking, and changing lanes. We assume that there is no off-ramp on the section of the highway. The desired speed is associated with each vehicle. It corresponds to the speed that the driver would reach if he was alone in his lane. If the driver is alone (the downstream vehicle is sufficiently far), he adapts his acceleration to reach his desired speed (free-flow regime). If he is not alone, he adapts his acceleration to the vehicles around him (car following regime). He can also change lanes if the conditions of another lane seem better. All these decisions are functions of traffic conditions (speed and distance) and random variables used to introduce a different behavior for each vehicle. This kind of simulation is called microsimulation , and the model we used, which has been tuned and validated with regard to real data collected on a highway, is presented in detail in [21, 22]. We simulated a road/highway with this traffic simulator with three lanes, and the simulation time was . The vehicle positions are then injected into NS-3 for simulation. In this scenario, we also consider receivers in the communication range of the sender as in the constant mobility case.
In Figure 9, we compare the simulation results performed with different traffic intensities () in traffic mobility and constant mobility scenarios. For both scenarios (constant and traffic mobility), the channel assignment probability is the same and uniformly distributed . As shown, the traffic pattern has an important impact on the performance of our proposed scheme. When the traffic intensity is high (, the mean distance between two consecutive vehicles is 5 meters), the average number of vehicles that can be acknowledged of the information is about lower than the constant mobility case at . Moreover, we can observe a significant decrease ( and , respectively, at ) in the performance of the traffic mobility scenario when considering low traffic intensities (). This may happen due to the high frame error rate in the traffic mobility scenario. The traffic simulator mimics the real traffic pattern where vehicles are likely to form clusters. Consequently, vehicles that belong to a far cluster could not receive any message even when they chose the same SCH as the sender.
This paper investigated the feasibility of a channel surfing approach against jamming attacks in vehicular networks, especially for safety applications with strict time constraints and a broadcast nature. We initialize and implement a random channel surfing scheme in vehicular networks. A simple, extensible probabilistic model is proposed to evaluate and study the favorable use case of our scheme. This model provides the key to designing safety applications sensitive to time constrain by adjusting SCH assignment probabilities. We validate the analytical model by NS-3 simulations. The simulation results have shown that a large number of vehicles can recover their communication within an acceptable time. The real traffic pattern has an essential effect on the performance of this random channel surfing scheme. We are currently working on an extension of this model that takes into account the frame error rate to model the real testbed scenarios accurately reported in this manuscript.
No data were used to support this study.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
The authors would like to thank the University of Sciences and Technologies of Vietnam, Vietnam Academy of Science and Technology (VAST), for funding this research in the scope of project USTH.ICT.01/21-22. The original idea about the random channel surfing scheme was partially published at the 2020 RIVF International Conference on Computing and Communication Technologies (RIVF) . We would like to thank Professor Anthony BUSSON (LIP, ENS Lyon) and Professor Yacine Ghamri-Doudane (L3I, University of La Rochelle) for their enthusiastic discussions that allowed us to extend our previous work to this version.
SAE International, Dsrc Implementation Guide. A Guide of Users of sae j2735 Message Sets Over dsrc, 2010.
H. Nguyen-Minh, Contribution to the Intelligent Transportation System: Security of Safety Applications in Vehicle Ad Hoc Networks, PhD thesis, University of Avignon, 2016.
L. Wang and A. M. Wyglinski, “A combined approach for distinguishing different types of jamming attacks against wireless networks,” in Proceedings of 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, pp. 809–814, Victoria, BC, Canada, August 2011.View at: Publisher Site | Google Scholar
H. Nguyen-Minh, A. Benslimane, and M. Radenkovic, Social Delay Tolerant Protocol for Safety Services in Vehicular Networks.
H. N. Minh, A. M. Vegni, V. Loscrí, and A. Benslimane, “Connectivity management in an integrated heterogeneous social networks framework in vehicular environments,” in Proceedings of the Conference on Information Technology for Social Good, pp. 25–30, New York, NY, USA, September 2021.View at: Publisher Site | Google Scholar
N.-M. Huong, T. Hoang Tung, G. Anh Tuan, and H. Thanh Tung, “Channel surfing to mitigate against jamming attacks on safety applications in vehicular networks,” in 2020 RIVF International Conference on Computing and Communication Technologies (RIVF), pp. 1–5, Ho Chi Minh City, Vietnam, October 2020.View at: Publisher Site | Google Scholar
ETSI TS 102 637-2 V1.1.1, “Intelligent transport systems (its); vehicular communications; basic set of applications; part 2: Specification of cooperative awareness basic service,” 2010.View at: Google Scholar
S. Druitt, “Introduction to microsimulation,” Traffic Engineering & Control, vol. 39, no. 9, 1998.View at: Google Scholar
K. I. Ahmed, Modeling Drivers’ Acceleration and Lane Changing Behavior, PhD thesis, Massachusetts Institute of Technology, 1999.
A. T. Giang and A. Busson, “Modeling CSMA/CA in VANET,” ASMTA, Springer, 2012.View at: Google Scholar