RESEARCH ARTICLE Bloom-lter based IP-CHOCK detection scheme for denial of service attacks in VANET Karan Verma * and Halabi Hasbullah Department of Computer and Information Sciences, Universiti Teknologi PETRONAS, Malaysia ABSTRACT Vehicular ad hoc networks (VANETs) have drawn increasing attention in recent years due to their wide range of applications. At the present time, vehicle communication is exposed to many security threats, such as denial of service (DoS) attacks. In these attacks, a malicious node forges a large number of fake identities. Internet Protocol (IP) spoong addresses is to disrupt the proper functioning of the fair data transfer between two fast moving vehicles. In this paper, IP spoong addresses of DoS attacks have been detected and defended by using the Bloom-lter based IP-CHOCK detection method, which provides the availability of a service for the legitimate vehicles in the VANET. The IP spoong addresses in the DoS attacks committed by fraud and malicious nodes have also been investigated. This method provides a secure communication as well as frees the bandwidth. This proposed approach requires fewer resources and is easy to deploy. Simulation results have shown that this method is efcient and effective to detect and defend against DoS attacks in the VANET. Specically, this method provides faster detec- tion time, lower storage capacity, and computational cost. Copyright © 2014 John Wiley & Sons, Ltd. KEYWORDS Internet Protocol (IP); Bloom-lter (BF); hash function; User Datagram Protocol (UDP); VANET *Correspondence Karan Verma, Dept. of Computer & Information Sciences, Universiti Teknologi PETRONAS, Malaysia. E-mail: karan.verma.phd@gmail.com 1. INTRODUCTION The mass production of internet enabled personal mobile phones, and an unprecedented growth in the number of Internet service providers has made the Internet commonly accessible to everyone. This can enhance the criminals ability to perform unlawful or unethical activities including attacks on vehicles and other personal mobile applications. The most common denial of service (DoS) attacks are the User Datagram Protocol (UDP) SYN ood attack and Internet Protocol (IP) spoong addresses attack [1]. Vehicle drivers have no ability to predict the conditions ahead on the road, such as the speed of other vehicles, traf- c congestion, and other possible risks. Therefore, vehicles crash on the roads because of trafc congestion and other possible risks [2]. This is an important issue. These risks can be reduced with the aid of sensors, computer equip- ment, wireless communication devices, and other techno- logically equipped devices on the vehicles. By using this equipment and devices, vehicle drivers can foresee the speed of other vehicles, trafc congestion, and other possi- ble risks. So, many researchers have been working in the area of vehicular ad hoc networks (VANET) systems, and they can provide safe, clean, and comfortable traveling on the roads, secure communication between fast moving vehicles and limit the number of fatalities [3,4]. Unique characteristics of VANET systems are the high mobility, rapidly changing network topology caused by the high traveling speed of the nodes, constrained patterns due to the restricted roads, and limitations of bandwidth due to the absence of a central coordinator that controls nodes. Others are the disconnection problems owing to frequent fragmentation in the network and signal fading which is caused by obstacles between the communicating nodes [57]. An attempt to make a mobile resource or a service unavailable to its intended users is called DoS attacks [8]. First, the attacker can control a large number of vulnerable hosts on the Internet by compromising them as shown in Figure 1. The attacker can use these vulnerable hosts to send a huge number of packets to the victim vehicles simultaneously. During DoS attacks, massive amounts of trafc arrive at the target of the victim vehicles. The target is either the vehicles network service or the vehicles them- selves. The victim services are disrupted because of the huge amount of trafc. The computational overhead is increased because of the lack of infrastructure and difculties involved in providing comprehensive coverage for all roads because SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2014) Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.1043 Copyright © 2014 John Wiley & Sons, Ltd.