Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm

被引:67
作者
Kumar, Ankit [1 ]
Varadarajan, Vijayakumar [2 ]
Kumar, Abhishek [3 ]
Dadheech, Pankaj [1 ]
Choudhary, Surendra Singh [4 ]
Kumar, V. D. Ambeth [5 ]
Panigrahi, B. K. [6 ]
Veluvolu, Kalyana C. [7 ]
机构
[1] Swami Keshvanand Inst Technol Management & Gramot, Dept Comp Sci & Engn, Jaipur, Rajasthan, India
[2] Univ New South Wales, Dept Sch Comp Sci & Engn, Kensington, NSW, Australia
[3] Banaras Hindu Univ, Inst Sci, Dept Comp Sci, Varanasi, Uttar Pradesh, India
[4] Sri Balaji Coll Engn & Technol, Dept Comp Sci & Engn, Jaipur, Rajasthan, India
[5] Anna Univ, Dept Comp Sci & Engn, Panimalar Engn Coll, Chennai, Tamil Nadu, India
[6] Indian Inst Technol, Dept Elect Engn, New Delhi, India
[7] Kyungpook Natl Univ, Sch Elect Engn, Daegu, South Korea
关键词
Mobile ad-hoc networks (MANET); Vehicular ad-hoc networks (VANET); Routing protocol; Ad-hoc on-demand distance vector (AODV); Performance parameters; Black hole attack; AUTHENTICATION; MITIGATION; PROTOCOLS; VANETS;
D O I
10.1016/j.micpro.2020.103352
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular ad hoc networks (VANETs) has received significant attention in the research domain of intelligent transportation system (ITS) as they provide safety and security to drivers and passengers. As compared to mobile ad hoc networks (MANETs), VANETs are mainly different in terms of characteristics, and system architecture. Security in VANET has been an important issue as it effects the communication between both (V-2-V) vehicles-to vehicle and (V-2-I) vehicle to infrastructure. In VANET, malicious attacks affect the security of the networks, and it is necessary to identify and prevent such security attacks. In VANET network, any node can function as a router for the others nodes, and a malicious node connected to the network may inject spoofed routing tables to the other nodes thereby affecting the operation of the network. To overcome this issue, a secure AODV routing protocol is developed for detection of black hole attack in this paper. The proposed method is a modified version of the original AODV routing protocol with improvements in the RREQ packet and RREP packet protocols. For added security, a cryptography function-based encryption and decryption is included to verify the source and destination nodes. The proposed approach is demonstrated on a NS-2.33 simulator using different network parameters like drop packets, end-to-end delay, and packet delivery ratio (PDR) and routing request overhead. Results demonstrate that the proposed method outperforms existing AODV routing protocol under black hole attack and improves the network performance.
引用
收藏
页数:13
相关论文
共 36 条
[1]   Optimized Node Clustering in VANETs by Using Meta-Heuristic Algorithms [J].
Ahsan, Waleed ;
Khan, Muhammad Fahad ;
Aadil, Farhan ;
Maqsood, Muazzam ;
Ashraf, Staish ;
Nam, Yunyoung ;
Rho, Seungmin .
ELECTRONICS, 2020, 9 (03)
[2]   Efficient Conditional Anonymity With Message Integrity and Authentication in a Vehicular Ad-Hoc Network [J].
Alazzawi, Murtadha A. ;
Lu, Hongwei ;
Yassin, Ali A. ;
Chen, Kai .
IEEE ACCESS, 2019, 7 :71424-71435
[3]  
[Anonymous], 2005, Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, DOI DOI 10.1145/1102219.1102223
[4]   Novel cross layer detection schemes to detect blackhole attack against QoS-OLSR protocol in VANET [J].
Baiad, Raghad ;
Alhussein, Omar ;
Otrok, Hadi ;
Muhaidat, Sami .
VEHICULAR COMMUNICATIONS, 2016, 5 :9-17
[5]  
BALARAM A, 2016, INDIAN J SCI TECHNOL, V9, pN1648, DOI DOI 10.17485/ijst/2016/v9i48/99870
[6]  
Cherkaoui B, 2017, INT J COMMUN ANTENNA, V7, P208
[7]   A Distributed Token Passing Protocol for Time Constrained Data Gathering in VANETs [J].
Chiti, Francesco ;
Fantacci, Romano ;
Nizzi, Francesca ;
Pierucci, Laura ;
Borrego, Carlos .
ELECTRONICS, 2019, 8 (08)
[8]   An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs [J].
Cui, Jie ;
Wu, Di ;
Zhang, Jing ;
Xu, Yan ;
Zhong, Hong .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (03) :2972-2986
[9]   A Public Goods Game Theory-Based Approach to Cooperation in VANETs Under a High Vehicle Density Condition [J].
Ding, Qing ;
Zeng, Xikai ;
Zhang, Xinming ;
Sung, Dan Keun .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2019, 20 (11) :3995-4005
[10]   Choosing Mutation and Crossover Ratios for Genetic Algorithms-A Review with a New Dynamic Approach [J].
Hassanat, Ahmad ;
Almohammadi, Khalid ;
Alkafaween, Esra'a ;
Abunawas, Eman ;
Hammouri, Awni ;
Prasath, V. B. Surya .
INFORMATION, 2019, 10 (12)