A Cross-layer Method for Identifying and Isolating the Blackhole Nodes in Vehicular Ad-hoc Networks

被引:1
作者
Rabiaa, Naib [1 ]
Moussa, Ali Cherif [1 ]
Sofiane, Boukli Hacene [1 ]
机构
[1] Univ Djillali Liabes Sidi Bel Abbes, Dept Comp Sci, Sidi Bel Abbes, Algeria
来源
INFORMATION SECURITY JOURNAL | 2023年 / 32卷 / 03期
关键词
Vehicular ad-hoc networks; cross-layer; security; aomdv; black-hole attack; HOLE ATTACKS;
D O I
10.1080/19393555.2021.2007316
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular Ad-hoc Network (VANET) is a set of intelligent vehicles that communicate without a fixed infrastructure. The communication between each source/destination pair is done by using routing protocols. On-demand multipath distance vector (AOMDV) is one of the most known ad-hoc multipath routing protocols used in VANETs. The decentralized nature of VANET makes this type of network vulnerable to various attacks, such as blackhole attack. In such attack, the malicious vehicle aims to make the communication unavailable. To achieve this goal, the malicious vehicle persuades the source to send its data packets through it because it has the fresher route toward the destination. This is done by forging routing information. After receiving the data packets, the malicious vehicle deletes them instead of forwarding them to their intended destinations. This paper introduces a new Cross-Layer method (CRAOMDV) where information is shared between MAC and network layers to detect and ignore the malicious vehicles in VANETs. Our experiments used the simulator NS2 and SUMO for the generation and simulation of real mobility scenarios. The evaluation results demonstrate the efficiency of CRAOMDV compared to AOMDV under blackhole attack in terms of improving the packet delivery and reducing the average end-to-delay and the routing overhead.
引用
收藏
页码:212 / 226
页数:15
相关论文
共 31 条
  • [21] Pooja, 2015, 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), P552, DOI 10.1109/CCAA.2015.7148439
  • [22] Quyoom Abdul, 2020, Journal of Multimedia Information System, V7, P45
  • [23] Raj P. N., 2009, ARXIV09092371
  • [24] Raja Kumar K, 2021, DATA ENG COMMUNICATI, P337, DOI DOI 10.1007/978-981-16-0081-4_33/FIGURES/6
  • [25] Rani J., 2013, INT C CONTR COMP COM, P1
  • [26] A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV
    Sakiz, Fatih
    Sen, Sevil
    [J]. AD HOC NETWORKS, 2017, 61 : 33 - 50
  • [27] Sultana J., 2018, INT J ELECTR COMPUT, V8, P4412, DOI [10.11591/ijece.v8i6.pp4412-4422, DOI 10.11591/IJECE.V8I6.PP4412-4422]
  • [28] Tamilselvan Latha., 2007, The 2nd international conference on wireless broadband and ultra wideband communications (AusWireless 2007), P21
  • [29] Toutouh J., 2011, P 13 ANN C COMP GECC, P719
  • [30] An optimized Ad-hoc On-demand Multipath Distance Vector(AOMDV) routing protocol
    Yuan, YH
    Chen, HM
    Jia, M
    [J]. 2005 ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC), VOLS 1& 2, 2005, : 569 - 573