A Cross-layer Method for Identifying and Isolating the Blackhole Nodes in Vehicular Ad-hoc Networks

被引:1
作者
Rabiaa, Naib [1 ]
Moussa, Ali Cherif [1 ]
Sofiane, Boukli Hacene [1 ]
机构
[1] Univ Djillali Liabes Sidi Bel Abbes, Dept Comp Sci, Sidi Bel Abbes, Algeria
来源
INFORMATION SECURITY JOURNAL | 2023年 / 32卷 / 03期
关键词
Vehicular ad-hoc networks; cross-layer; security; aomdv; black-hole attack; HOLE ATTACKS;
D O I
10.1080/19393555.2021.2007316
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular Ad-hoc Network (VANET) is a set of intelligent vehicles that communicate without a fixed infrastructure. The communication between each source/destination pair is done by using routing protocols. On-demand multipath distance vector (AOMDV) is one of the most known ad-hoc multipath routing protocols used in VANETs. The decentralized nature of VANET makes this type of network vulnerable to various attacks, such as blackhole attack. In such attack, the malicious vehicle aims to make the communication unavailable. To achieve this goal, the malicious vehicle persuades the source to send its data packets through it because it has the fresher route toward the destination. This is done by forging routing information. After receiving the data packets, the malicious vehicle deletes them instead of forwarding them to their intended destinations. This paper introduces a new Cross-Layer method (CRAOMDV) where information is shared between MAC and network layers to detect and ignore the malicious vehicles in VANETs. Our experiments used the simulator NS2 and SUMO for the generation and simulation of real mobility scenarios. The evaluation results demonstrate the efficiency of CRAOMDV compared to AOMDV under blackhole attack in terms of improving the packet delivery and reducing the average end-to-delay and the routing overhead.
引用
收藏
页码:212 / 226
页数:15
相关论文
共 31 条
  • [1] Al-kahtani M.S., 2012, 6 INT C SIGNAL PROCE
  • [2] Almutairi H., 2014, P 6 INT C MANAGEMENT, P133
  • [3] Performance Evaluation of AODV and AOMDV with Probabilistic Relay in VANET Environments
    Anggoro, Radityo
    Kitasuka, Teruaki
    Nakamura, Ryoji
    Aritsugi, Masayoshi
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON NETWORKING AND COMPUTING (ICNC 2012), 2012, : 259 - 263
  • [4] Variable control chart for detecting black hole attack in vehicular ad-hoc networks
    Cherkaoui, Badreddine
    Beni-hssane, Abderrahim
    Erritali, Mohammed
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (11) : 5129 - 5138
  • [5] EAODV: detection and removal of multiple black hole attacks through sending forged packets in MANETs
    Delkesh, Taher
    Jamali, Mohammad Ali Jabraeil
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (05) : 1897 - 1914
  • [6] Dhyani I., 2017, Advances in Computer and Computational Sciences, P333
  • [7] VANET security surveys
    Engoulou, Richard Gilles
    Bellaiche, Martine
    Pierre, Samuel
    Quintero, Alejandro
    [J]. COMPUTER COMMUNICATIONS, 2014, 44 : 1 - 13
  • [8] Intelligent Detection of Black Hole Attacks for Secure Communication in Autonomous and Connected Vehicles
    Hassan, Zohaib
    Mehmood, Amjad
    Maple, Carsten
    Khan, Muhammad Altaf
    Aldegheishem, Abdulaziz
    [J]. IEEE ACCESS, 2020, 8 (08): : 199618 - 199628
  • [9] Kamal Kumar Mr, 2019, INT J COMPUTER SCI M, V8, P187
  • [10] Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm
    Kumar, Ankit
    Varadarajan, Vijayakumar
    Kumar, Abhishek
    Dadheech, Pankaj
    Choudhary, Surendra Singh
    Kumar, V. D. Ambeth
    Panigrahi, B. K.
    Veluvolu, Kalyana C.
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2021, 80