Detection of black hole attacks in vehicle-to-vehicle communications using ad hoc networks and on demand protocols

被引:0
|
作者
Bharanidharan, C. [1 ]
Malathi, S. [1 ]
Manoharan, Hariprasath [2 ]
机构
[1] Panimalar Engn Coll, Dept Artificial Intelligence & Data Sci, Chennai, India
[2] Ponjesly Coll Engn, Dept Elect & Commun Engn, Chennai, India
关键词
Vehicle ad hoc networks (VANETs); Mobile ad hoc networks (MANETs); Vehicles-to-vehicles (V-2-V); Vehicle-to-infrastructure (V2I); Ad hoc on demand vector (AODV); PERFORMANCE; PREVENTION; SECURITY; SYSTEMS; DMV;
D O I
10.1108/IJIUS-02-2023-0016
中图分类号
TP24 [机器人技术];
学科分类号
080202 ; 1405 ;
摘要
PurposeThe potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems (ITSs). VANETs have different characteristics and system architectures from mobile ad hoc networks (MANETs), with a primary focus on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. But protecting VANETs from malicious assaults is crucial because they can undermine network security and safety.Design/methodology/approachThe black hole attack is a well-known danger to VANETs. It occurs when a hostile node introduces phony routing tables into the network, potentially damaging it and interfering with communication. A safe ad hoc on-demand distance vector (AODV) routing protocol has been created in response to this issue. By adding cryptographic features for source and target node verification to the route request (RREQ) and route reply (RREP) packets, this protocol improves upon the original AODV routing system.FindingsThrough the use of cryptographic-based encryption and decryption techniques, the suggested method fortifies the VANET connection. In addition, other network metrics are taken into account to assess the effectiveness of the secure AODV routing protocol under black hole attacks, including packet loss, end-to-end latency, packet delivery ratio (PDR) and routing request overhead. Results from simulations using an NS-2.33 simulator show how well the suggested fix works to enhance system performance and lessen the effects of black hole assaults on VANETs.Originality/valueAll things considered, the safe AODV routing protocol provides a strong method for improving security and dependability in VANET systems, protecting against malevolent attacks and guaranteeing smooth communication between cars and infrastructure.
引用
收藏
页码:245 / +
页数:118
相关论文
共 50 条
  • [21] Anticipatory Lane Change Warning using Vehicle-to-Vehicle Communications
    Williams, Nigel
    Wu, Guoyuan
    Boriboonsomsin, Kanok
    Barth, Matthew
    Rajab, Samer
    Bai, Sue
    [J]. 2018 21ST INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITSC), 2018, : 117 - 122
  • [22] The differential detection OFDM cooperative diversity system in vehicle-to-vehicle communications
    Liu Weixin
    Wei Ning
    Zhang zhongpei
    Li Shaoqian
    Jiang Na
    [J]. 2006 6TH INTERNATIONAL CONFERENCE ON ITS TELECOMMUNICATIONS PROCEEDINGS, 2006, : 1118 - +
  • [23] Enhancing Misbehavior Detection in 5G Vehicle-to-Vehicle Communications
    Van-Linh Nguyen
    Lin, Po-Ching
    Hwang, Ren-Hung
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (09) : 9417 - 9430
  • [24] Improved protocols for spreading vehicle emergency messages in mobile ad hoc networks
    Soonju Park
    Dong Chun Lee
    Youngmi Kwon
    [J]. Cluster Computing, 2017, 20 : 731 - 739
  • [25] Road Traffic Congestion Detection through Cooperative Vehicle-to-Vehicle Communications
    Bauza, Ramon
    Gozalvez, Javier
    Sanchez-Soriano, Joaquin
    [J]. IEEE LOCAL COMPUTER NETWORK CONFERENCE, 2010, : 606 - 612
  • [26] Improved protocols for spreading vehicle emergency messages in mobile ad hoc networks
    Park, Soonju
    Lee, Dong Chun
    Kwon, Youngmi
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (01): : 731 - 739
  • [27] Detection of Black Hole Attacks in Mobile Ad Hoc Networks via HSA-CBDS Method
    Fahad, Ahmed Mohammed
    Ahmed, Abdulghani Ali
    Alghushami, Abdullah H.
    Alani, Sammer
    [J]. INTELLIGENT COMPUTING & OPTIMIZATION, 2019, 866 : 46 - 55
  • [28] Performance analysis of ad-hoc networks under black hole attacks
    Dokurer, Semih
    Erten, Y. M.
    Acar, Can Erkin
    [J]. PROCEEDINGS IEEE SOUTHEASTCON 2007, VOLS 1 AND 2, 2007, : 148 - 153
  • [29] Interception of Black- Hole Attacks in Mobile AD-HOC Networks
    Balachandra
    Shetty, Nisha P.
    [J]. 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 5 - 9
  • [30] Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems
    Su, Ming-Yang
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (01) : 107 - 117