International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Red-AODV: A Prevention Model of Black Hole Attack for VANET Protocols and Identification of Malicious Nodes in VANET

Author NameAuthor Details

Md. Tofael Ahmed, Amina Aktar Rubi, Md. Saifur Rahman, Maqsudur Rahman

Md. Tofael Ahmed[1]

Amina Aktar Rubi[2]

Md. Saifur Rahman[3]

Maqsudur Rahman[4]

[1]Department of Information and Communication Technology, Comilla University, Bangladesh

[2]Department of Information and Communication Technology, Comilla University, Bangladesh

[3]Department of Information and Communication Technology, Comilla University, Bangladesh

[4]Department of Computer Science and Engineering, Port City International University, Bangladesh

Abstract

VANET is a type of MANET in which the Vehicle nodes communicate between each other using wireless medium without any fixed infrastructure. The major goal of VANET is to create a safer and more efficient Intelligent Transportation System (ITS) and Traffic Information System (TIS) where high-mobility drivers may communicate with one another. Routing protocols, we know, accomplish the shortest possible connection time while using the least amount of network resources. VANETs also have some routing protocols to implement it in the real world for proper communication among vehicles. The Black Hole Attack has become one of the security dangers in VANET because of the great mobility of the vehicles and the volatile nature of the network connections. As the name imply, the Black Hole Attack in VANET is similar to the Black Hole in the universe which makes entities disappeared. Black Hole Attack redirects the data packets to such a node that actually does not exist in the network. In this research, we analyzed the performances of one reactive protocol (AODV) and one proactive protocol (OLSR) in order to better categorize the protocol’s robustness under Black Hole Attack and approach a prevention model, named Red-AODV to keep VANET safe from Black Hole Attack. After applying the Red-AODV protocol in the network which may reduce the losses resulted from the existence of Black Hole Attack, then again we analyze the changings of the network performance. We use Network Simulator 2 and run it for different number of nodes. The simulations are made in terms of several network parameters including Packet Delivery Ratio (PDR), Dropped Packet Ratio (DPR) and End to End Delay (EED), Throughput and Normalized Routing Load (NRL).

Index Terms

VANET

Black Hole Attack

AODV

Red-AODV

Intelligent Transport System

Reference

  1. 1.
    S. Zeadally, R. Hunt, Y.-S. Chen, A. Irwin, and A. Hassan, “Vehicular ad hoc networks (vanets): status, results, and challenges,” Telecommunication Systems, vol. 50, no. 4, pp. 217–241, 2012.
  2. 2.
    R. Mishra, A. Singh, and R. Kumar, “Vanet security: Issues, challenges and solutions,” in 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT). IEEE, 2016, pp. 1050–1055.
  3. 3.
    K. S. Patel and J. Shah, “Detection and avoidance of malicious node in manet,” in 2015 International Conference on Computer, Communication and Control (IC4). IEEE, 2015, pp. 1–4.
  4. 4.
    A. Jain, U. Prajapati, and P. Chouhan, “Trust based mechanism with aodv protocol for prevention of black-hole attack in manet scenario,” in 2016 Symposium on Colossal Data Analysis and Networking (CDAN). IEEE, 2016, pp. 1–4.
  5. 5.
    J. V. Ananthi and S. Vengatesan, “Detection of various attacks in wireless adhoc networks and its performance analysis,” in 2017 International Conference on Inventive Computing and Informatics (ICICI). IEEE, 2017, pp. 754–757.
  6. 6.
    S. Kumar and K. S. Mann, “Detection of multiple malicious nodes using entropy for mitigating the effect of denial of service attack in vanets,” in 2018 4th International conference on computing sciences (ICCS). IEEE, 2018, pp. 72–79.
  7. 7.
    M. Sathish, K. Arumugam, S. N. Pari, and V. Harikrishnan, “Detection of single and collaborative black hole attack in manet,” in 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). IEEE, 2016, pp. 2040–2044.
  8. 8.
    R. Khatoun, P. Gut, R. Doulami, L. Khoukhi, and A. Serhrouchni, “A reputation system for detection of black hole attack in vehicular networking,” in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC). IEEE, 2015, pp. 1–5.
  9. 9.
    R. Jahan and P. Suman, “Detection of malicious node and development of routing strategy in vanet,” in 2016 3rd International Conference on Signal Processing and Integrated Networks (SPIN). IEEE, 2016, pp. 472–476.
  10. 10.
    P. Hiremath, T. Anuradha, and P. Pattan, “Adaptive fuzzy inference system for detection and prevention of cooperative black hole attack in manets,” in 2016 International Conference on Information Science (ICIS). IEEE, 2016, pp. 245–251.
  11. 11.
    A. Kumar, M. Bansal et al., “A review on vanet security attacks and their countermeasure,” in 2017 4th international conference on signal processing, computing and control (ISPCC). IEEE, 2017, pp. 580–585.
  12. 12.
    S. R. Deshmukh, P. Chatur, and N. B. Bhople, “Aodv-based secure routing against blackhole attack in manet,” in 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). IEEE, 2016, pp. 1960–1964.
  13. 13.
    K. C. Purohit, S. C. Dimri, and S. Jasola, “Mitigation and performance analysis of routing protocols under black-hole attack in vehicular ad-hoc network (VANET),” Wirel. Pers. Commun., vol. 97, no. 4, pp. 5099–5114, 2017.
  14. 14.
    B. Sun, “Detecting black-hole attack in mobile ad hoc networks,” in 5th European Personal Mobile Communications Conference 2003, 2003.
  15. 15.
    L. Tamilselvan and D. V. Sankaranarayanan, “Prevention of Cooperative Black Hole Attack in MANET,” Journal of Networks, vol. 3, no. 5, pp. 13–20, 2008.
  16. 16.
    S. Kurosawa, H. Nakayama, N. Kato, A. Jamalipour, and Y. Nemoto, “Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method,” Com.tw. [Online]. Available: http://ijns.jalaxy.com.tw/contents/ijns-v5-n3/ijns-2007-v5-n3-p338-346.pdf. [Accessed: 16-Sep-2021].
  17. 17.
    “Cyclic redundancy check (crc) rfc,” https://tools.ietf.org/html/rfc3385.
  18. 18.
    C. Perkins, E. Belding-Royer, S. Das et al., “Ad hoc on-demand distance vector (aodv) routing,” 2003.
  19. 19.
    W. contributors, “Network simulation,” https://cutt.ly/kmeEBfk, Jun 2021.
  20. 20.
    “Network simulator 2 (ns2): Features & basic architecture of ns2,” https://cutt.ly/1meEMw0.
  21. 21.
    M. F. Khan, E. A. Felemban, S. Qaisar, and S. Ali, “Performance analysis on packet delivery ratio and end-to-end delay of different network topologies in wireless sensor networks (wsns),” in 2013 IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks. IEEE, 2013, pp. 324–329.
  22. 22.
    “Packet loss ratio,” https://cutt.ly/tmeE4AJ.
SCOPUS
SCImago Journal & Country Rank