Blackhole Attack and its effect on VANET
|Ajay N. Upadhyaya1 , J.S. Shah2|
1 Computer Engineering Department, RK University, Rajkot, India .
2 Ex. Principal, Government Engineering College, Patan, India .
|Correspondence should be addressed to: firstname.lastname@example.org.|
Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-11 , Page no. 25-32, Nov-2017
Online published on Nov 30, 2017
Copyright © Ajay N. Upadhyaya, J.S. Shah . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
|View this paper at Google Scholar | DPI Digital Library|
|XML View||PDF Download|
IEEE Style Citation: Ajay N. Upadhyaya, J.S. Shah , “Blackhole Attack and its effect on VANET”, International Journal of Computer Sciences and Engineering, Vol.5, Issue.11, pp.25-32, 2017.
MLA Style Citation: Ajay N. Upadhyaya, J.S. Shah "Blackhole Attack and its effect on VANET." International Journal of Computer Sciences and Engineering 5.11 (2017): 25-32.
APA Style Citation: Ajay N. Upadhyaya, J.S. Shah , (2017). Blackhole Attack and its effect on VANET. International Journal of Computer Sciences and Engineering, 5(11), 25-32.
|194||185 downloads||51 downloads|
|VANET is one type of adhoc networks which established among vehicles equipped with communication facilities. In VANETs vehicles are equipped with device known as on Board Unit (OBU) through which it can communicate with other vehicles as well as with infrastructure which is known as Road Side Unit (RSU). VANET can be used for different applications like Life-Critical Safety Applications, Safety warning Applications, Electronic Toll Collections, Internet Access in vehicles, Vehicle Group Communications, Roadside Services Finder and many more. Various researchers are proposing different solutions in VANET for Protocols, Effective Service Parameters, Smart Network challenges and lot more by seeing the usefulness of VANETs in various applications but security is a main issue for adopting VANET as a life critical solution. Security is the major concern for various VANET applications where a wrong, replicated or delayed messages may directly or indirectly affect the human lives. Many of the applications require a high level of security in VANET adoption. Security Attacks on VANET can be categories in Routing Attack, Monitoring Attack, Social Attack, Timing Attack, Application Attack and Network Attack. In this paper we focused on Routing Attack detection, specifically Blackhole Attack detection methodologies. We have proposed four different approaches for Blackhole attack detection: Neighborhood based, Sequence Number based, Packet Drop rate based and Cluster Forming based. We analyze the performance of the proposed approaches for different scenario with comparative analysis.|
|Key-Words / Index Term :|
|Blackhole Attack Detection, AODV, Neighborhood based blackhole detection, Sequence Number based blackhole detection, Packet Drop rate based blackhole detection, Cluster Forming based blackhole detection|
. Zeadally, S., Hunt, R., Chen, YS. et al. Telecommun Syst (2012) 50: 217. doi:10.1007/s11235-010-9400-5
. M. S. Al-kahtani, "Survey on security attacks in Vehicular Ad hoc Networks (VANETs)," 2012 6th International Conference on Signal Processing and Communication Systems, Gold Coast, QLD, 2012, pp. 1-9.doi:10.1109/ICSPCS.2012.6507953
. S. Verma, B. Mallick and P. Verma, "Impact of gray hole attack in VANET," 2015 1st International Conference on Next Generation Computing Technologies (NGCT), pp. 127-130.
. J. Li, H. Lu and M. Guizani, "ACPN: A Novel Authentication Framework with Conditional Privacy-Preservation and Non-Repudiation for VANETs," in IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 4, pp. 938-948, April 2015.
. A. D. Patel and K. Chawda, "Blackhole and grayhole attacks in MANET," International Conference on Information Communication and Embedded Systems (ICICES2014), Chennai, 2014, pp. 1-6.
Meenakshi Jamgade and Vimal Shukla , "Comparative on AODV and DSR under Black Hole Attacks Detection Scheme Using Secure RSA Algorithms in MANET", International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.145-150, 2016.
. Pradeep Kumar Sharma, Shivlal Mewada and Pratiksha Nigam, "Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.4, pp.8-11, 2013.
. R. Kumari, P. Nand, "Performance Analysis of Existing Routing Protocols", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.5, pp.47-50, 2017.
. Umesh Kumar Singh, Jalaj Patidar and Kailash Chandra Phuleriya, "On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks", International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.1, pp.11-15, 2015.
. Bissmeyer, N.; Schroder, K.H.; Petit, J.; Mauthofer, S.; Bayarou, K.M., "Experimental analysis of misbehavior detection and prevention in VANETs," in Vehicular Networking Conference (VNC), 2013 IEEE , vol., no., pp.198-201, 16-18 Dec. 2013
. Bala, Anu; Bansal, M.; Singh, J., "Performance Analysis of MANET under Blackhole Attack," in Networks and Communications, 2009. NETCOM `09. First International Conference on ,IEEE vol., no., pp.141-145, 27-29 Dec. 2009
. Wazid, M.; Katal, A.; Singh Sachan, R.; Goudar, R.H.; Singh, D.P., "Detection and prevention mechanism for Blackhole attack in Wireless Sensor Network," in Communications and Signal Processing (ICCSP), 2013 International Conference on , IEEE vol., no., pp.576-581, 3-5 April 2013
. Junhai Luo; Mingyu Fan; Danxia Ye, "Black hole attack prevention based on authentication mechanism," in Communication Systems, 2008. ICCS 2008. 11th IEEE Singapore International Conference on , vol., no., pp.173-177, 19-21 Nov. 2008.
. Khan U, Agrawal S, Silakari S. “A detailed survey on misbehavior node detection techniques invehicular ad hoc networks”. In: SC Satapathy (ed.) Information systems design and intelligent applications. Berlin: Springer, 2015, pp.11–19.