Robust Analysis For Aodv Protocol in Vehicular Adhoc Network Under Black Hole
Robust Analysis For Aodv Protocol in Vehicular Adhoc Network Under Black Hole
Abstract: Security is one of biggest challenges in implementing adhoc network like VANET and MANET and it is due to
changing behavior of topology of adhoc network. There are possibilities of various attacks like active and passive attack in
network to change the real data or to steal the data. There are diverse types of passive attacks which are very dangerous for
communication. Black hole attack in Vehicular Ad Hoc Network is major problem related with the field of computer networking.
In this paper we present the performance analysis of the black hole attack in Vehicular Ad Hoc Network. We elaborate the
different types of attacks and their depth in ad hoc network. The performance metric is taken for the evaluation of attack which
depends on a packet end to end delay, network throughput and network load. In our base work black hole attack used in network
communication using AODV protocol. As we know there are many issues in VANET and specially security issues. Therefore in
our research work we proposed a new protocol which is known as GPSR which has superior result as compared to base work in
term of end to end delay, energy consumption, packet delivery ratio, throughput and overhead. Besides this a security algorithm
also implemented so that unauthorized person cannot access the authentic
Keywords- Black Hole Attack, Network, Secure, End to End Delay, Adhoc, Protocol, VANET, Packet
__________________________________________________*****_________________________________________________
Rx power 0.3
Tx power 0.6
Initial Energy 90
Interface Queue Length 200
Mobility Model Manhattan Mobility
Model
REFERENCES
[1]. Salim Lachdhaf,, Mohamed Mazouzi, “ Detection and
Prevention of Black Hole Attack in VANET Using Secured
AODV Routing Protocol”, Conference Paper, DOI:
10.5121/csit.2017.71503 Natarajan Meghanathan et al.
(Eds) : NeTCoM, CSEIT, GRAPH-HOC, NCS, SIPR –
2017 pp. 25– 36, 2017
[2]. Bharti, D.P.Dvedi, “ Performance Analysis of Black hole
Attack using CBR/UDP Traffic Pattern with AODV routing
Protocol in VANET”, International Journal of Science and
Research (IJSR) ISSN (Online): 2319-7064 Index
Copernicus Value (2013): 6.14 | Impact Factor (2016):
6.391
[3]. Sagar R Deshmukh, P N Chatur, Nikhil B Bhople,” AODV-
Based Secure Routing Against Black hole Attack in
MANET”, IEEE International Conference On Recent
Trends in Electronics Information Communication
Technology, India, pp. 1960-1964, 2016
Figure12 Comparison of Throughput
146
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 141 – 147
_______________________________________________________________________________________________
[4]. Heithem Nacer and Mohamed Mazouzi, “A Scheduling Hole Attack in Vehicular Networking,” International
Algorithm for Beacon Message in Vehicular Ad Hoc Conference on Cyber Security of Smart cities, Industrial
Networks”,International Conference on Hybrid Intelligent Control System and Communications (SSIC), 2015
Systems (HIS 2016),Marrakech, Morocco, pp. 489-497, [11]. Surmukh, S.; Kumari, P.; Agrawal, S. Comparative
2016. Analysis of Various Routing Protocols in VANET. In
[5]. Roshan Jahan, Preetam Suman, “Detection of malicious Proceedings of 5th IEEE International Conference on
node and development of routing strategy in VANET,” 3rd Advanced Computing & Communication Technologies,
International Conference on Signal Processing and Haryana, India, 21–22February 2015
Integrated Networks (SPIN), IEEE, pp. 472-476, 2016 [12]. Elias C. Eze, Sijing Zhang and Enjie Liu,” Vehicular Ad
[6]. Sathish M, Arumugam K, S. Neelavathy Pari, Harikrishnan Hoc Networks (VANETs): Current State, Challenges,
V S, “Detection of Single and Collaborative Black Hole Potentials and Way Forward”, Proceedings of the 20th
Attack in MANET,” International Conference on Wireless International Conference on Automation & Computing,
Communications, Signal Processing and Networking Cranfield University, Bedfordshire, UK, 2014
(WiSPNET), IEEE, pp.2040-2044, 2016. [13]. Sabih ur Rehman, M. Arif Khan, Tanveer A. Zia, Lihong
[7]. Sathish M, Arumugam K, S. Neelavathy Pari, Harikrishnan Zheng, “Vehicular Ad-Hoc Networks (VANETs) - An
V S, “Detection of Intelligent Malicious and Selfish Nodes Overview and Challenges”, Journal of Wireless
in VANET using Threshold Adaptive Control,” 5th Networking and Communications, 2013, pp. 29-38.
International Conference on Electronic Devices, Systems [14]. Sirwan A.Mohammed and Sattar B.Sadkhan, “Design Of
and Applications (ICEDSA), IEEE, 2016 Wireless Network Based On Ns2”, Journal of Global
[8]. P.S Hiremath and Anuradha T, “Adaptive Fuzzy Inference Research in Computer Science (jgrcs), Volume 3, No. 12,
System for Detection and Prevention of Cooperative Black December 2012.
Hole Attack in MANETs”, International Conference on [15]. Halabi Hasbullah, Irshad Ahmed Soomro, Jamalul-lail Ab
Information Science (ICIS), pp.245-251, 2016 Manan,” Denial of Service (DOS) Attack and Its Possible
[9]. P.S Hiremath and Anuradha T, “Adaptive Method for Solutions in VANET”, International Scholarly and
Detection and Prevention of Cooperative Black Hole Scientific Research & Innovation 4(5) 2010, World
Attack inMANETs”, International Journal of Electrical and Academy of Science, Engineering and Technology, Vol:4
Electronics and Data Communication, Volume-3, Issue-4, 2010-05-25.
pp.1-7, 2015
[10]. R. Khatoun, P. Guy, R. Doulami, L. Khoukhi and A.
Serhrouchni, “A Reputation System for Detection of Black
147
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________