1.
S. Zeadally, R. Hunt, Y.-S. Chen, A. Irwin, and A. Hassan, “Vehicular ad hoc networks (vanets): status, results, and challenges,” Telecommunication Systems, vol. 50, no. 4, pp. 217–241, 2012.
2.
R. Mishra, A. Singh, and R. Kumar, “Vanet security: Issues, challenges and solutions,” in 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT). IEEE, 2016, pp. 1050–1055.
3.
K. S. Patel and J. Shah, “Detection and avoidance of malicious node in manet,” in 2015 International Conference on Computer, Communication and Control (IC4). IEEE, 2015, pp. 1–4.
4.
A. Jain, U. Prajapati, and P. Chouhan, “Trust based mechanism with aodv protocol for prevention of black-hole attack in manet scenario,” in 2016 Symposium on Colossal Data Analysis and Networking (CDAN). IEEE, 2016, pp. 1–4.
5.
J. V. Ananthi and S. Vengatesan, “Detection of various attacks in wireless adhoc networks and its performance analysis,” in 2017 International Conference on Inventive Computing and Informatics (ICICI). IEEE, 2017, pp. 754–757.
6.
S. Kumar and K. S. Mann, “Detection of multiple malicious nodes using entropy for mitigating the effect of denial of service attack in vanets,” in 2018 4th International conference on computing sciences (ICCS). IEEE, 2018, pp. 72–79.
7.
M. Sathish, K. Arumugam, S. N. Pari, and V. Harikrishnan, “Detection of single and collaborative black hole attack in manet,” in 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). IEEE, 2016, pp. 2040–2044.
8.
R. Khatoun, P. Gut, R. Doulami, L. Khoukhi, and A. Serhrouchni, “A reputation system for detection of black hole attack in vehicular networking,” in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC). IEEE, 2015, pp. 1–5.
9.
R. Jahan and P. Suman, “Detection of malicious node and development of routing strategy in vanet,” in 2016 3rd International Conference on Signal Processing and Integrated Networks (SPIN). IEEE, 2016, pp. 472–476.
10.
P. Hiremath, T. Anuradha, and P. Pattan, “Adaptive fuzzy inference system for detection and prevention of cooperative black hole attack in manets,” in 2016 International Conference on Information Science (ICIS). IEEE, 2016, pp. 245–251.
11.
A. Kumar, M. Bansal et al., “A review on vanet security attacks and their countermeasure,” in 2017 4th international conference on signal processing, computing and control (ISPCC). IEEE, 2017, pp. 580–585.
12.
S. R. Deshmukh, P. Chatur, and N. B. Bhople, “Aodv-based secure routing against blackhole attack in manet,” in 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). IEEE, 2016, pp. 1960–1964.
13.
K. C. Purohit, S. C. Dimri, and S. Jasola, “Mitigation and performance analysis of routing protocols under black-hole attack in vehicular ad-hoc network (VANET),” Wirel. Pers. Commun., vol. 97, no. 4, pp. 5099–5114, 2017.
14.
B. Sun, “Detecting black-hole attack in mobile ad hoc networks,” in 5th European Personal Mobile Communications Conference 2003, 2003.
15.
L. Tamilselvan and D. V. Sankaranarayanan, “Prevention of Cooperative Black Hole Attack in MANET,” Journal of Networks, vol. 3, no. 5, pp. 13–20, 2008.
16.
S. Kurosawa, H. Nakayama, N. Kato, A. Jamalipour, and Y. Nemoto, “Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method,” Com.tw. [Online]. Available: http://ijns.jalaxy.com.tw/contents/ijns-v5-n3/ijns-2007-v5-n3-p338-346.pdf. [Accessed: 16-Sep-2021].
17.
“Cyclic redundancy check (crc) rfc,” https://tools.ietf.org/html/rfc3385.
18.
C. Perkins, E. Belding-Royer, S. Das et al., “Ad hoc on-demand distance vector (aodv) routing,” 2003.
19.
W. contributors, “Network simulation,” https://cutt.ly/kmeEBfk, Jun 2021.
20.
“Network simulator 2 (ns2): Features & basic architecture of ns2,” https://cutt.ly/1meEMw0.
21.
M. F. Khan, E. A. Felemban, S. Qaisar, and S. Ali, “Performance analysis on packet delivery ratio and end-to-end delay of different network topologies in wireless sensor networks (wsns),” in 2013 IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks. IEEE, 2013, pp. 324–329.
22.
“Packet loss ratio,” https://cutt.ly/tmeE4AJ.