0% found this document useful (0 votes)
5 views11 pages

JCRINN Black Wormhole Attack

This research evaluates the impact of Blackhole and Wormhole attacks on the DSDV routing protocol in VANET, highlighting the significant performance degradation caused by these attacks. Through simulations, it was found that the Wormhole attack led to a 76.9% decline in throughput, emphasizing the vulnerabilities in VANET communications. The study underscores the urgent need for more secure routing algorithms to mitigate these emerging threats.

Uploaded by

openid_wwlPw9oj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views11 pages

JCRINN Black Wormhole Attack

This research evaluates the impact of Blackhole and Wormhole attacks on the DSDV routing protocol in VANET, highlighting the significant performance degradation caused by these attacks. Through simulations, it was found that the Wormhole attack led to a 76.9% decline in throughput, emphasizing the vulnerabilities in VANET communications. The study underscores the urgent need for more secure routing algorithms to mitigate these emerging threats.

Uploaded by

openid_wwlPw9oj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Impact of Blackhole and Wormhole Attacks on DSDV

Routing Protocol in VANET: Behavioural Analysis


First Author1*, Second Author2
(Double Blind Review: Please do not type or edit anything here until final-
camera ready submissions)
1
First affiliation, City and Country (Please do not type or edit anything here, until camera ready submissions)
2
Second affiliation, City and Country (Please do not type or edit anything here until camera ready submissions)

ARTICLE INFO ABSTRACT


Article history: VANET (Vehicular Ad-Hoc Network) play a vital role in Intelligent
Received XX Month 2024 Transportation Systems (ITS) and the development of intelligent cars
Revised XX Month 2024 as it allows seamless and reliable communication between vehicles and
Accepted XX Month 2024 infrastructure by facilitating real-time applications such as collision
Online first
Published 1 September 2024 avoidance, traffic control and driver assistance However, the dynamic
nature and open-access medium of VANET make it highly susceptible
to security threat such as Blackhole and Wormhole attack that can
Keywords: disrupt the network's ability to efficiently route data packets and cause
Keyword1 severe performance degradation. Despite the growing significance of
Keyword2 VANET, there is a limited number of studies demonstrating how
Keyword3 Blackhole and Wormhole attacks can significantly degrade the
Keyword4 performance of VANET using DSDV routing protocol as the baseline.
Keyword5
Keyword6 Therefore, this research aims to address the gap by evaluating the
performance of these attacks using DSDV under three scenarios:
DOI: without attack, with Blackhole attack and with Wormhole attack. Key
10.24191/jcrinn.v10i2 performance metrics such as Packet Delivery Ratio (PDR), throughput,
End-to-End Delay (EED) and routing overhead are examined across
varying number of nodes utilizing NS-2.35 with SUMO 1.18.0. As
compared to the without attack scenario, the result of throughput
declines by 76.9% under the Wormhole attack scenario, revealing a
substantial degradation of VANET performance. Ultimately, these
results offer quantitative insights about the severity of performance
deterioration carried by these attacks and highlight the important
vulnerabilities in VANET which underscores the pressing need for the
development of more robust and secure algorithms to mitigate these
emerging threats.

1. INTRODUCTION

In recent years, VANET has grown in prominence in data transmission. VANET are being used in
the intelligent transport system to support drivers, passengers and amenities like mishap alerts and driver
assistance (Jabar Mahmood et al., 2021). Along with that, this network is also instrumental in safety
applications as it enables interchange of communication between vehicles and roadside infrastructure.
however, VANET is not only giving significant advantages to safeguard the user in the network but also
poses various security threats due to an open access medium, high vehicle mobility and dynamic topology
changes. It has been ascertained that due to highly dynamic nature of vehicles, the network topology of
VANET is quite different and hence the routing protocol must be quite efficient. in VANET, reliable
connectivity between the vehicles and other components is also crucial for effective communication and
safety. Therefore, a robust routing protocol is essential to manage dynamic network conditions and ensure
efficient data transmission between moving vehicles. In this research, Destination Sequence Distance
Vector (DSDV) routing protocol periodically broadcasts its routing table to direct neighbours to maintain
table consistency in a rapidly changing topology (Sahoo & Kumar Tripathy, 2023). DSDV was built
1*
Corresponding author. E-mail address: [email protected] (Add the e-mail in the final camera-ready submission)
using the Bellmann-Ford 2 approach where mobile nodes are required to broadcast their entries to other
nodes in their immediate vicinity (Ferdinand Alifo, 2023).
Despite the advancement of routing protocol in VANET security, it faces some inherent drawbacks
regarding deception by false routing information from malicious nodes. These vulnerabilities can lead to a
slew of security issues such as blackhole and wormhole attacks that could compromise the dependability
and integrity of VANET communication and making it difficult to implement real-time and reliable
traffic management in VANET. Blackhole attack is a type of denial of service (DoS) where it occurs
when a malicious node draws the victim's node to the network and ensures data transmission through it.
The attacker lures the victim by advertising the shortest path to a non-existent destination. When the data
packet is routed through the attacker, they simply drop the data packet without informing them, creating a
"hole" in communication and preventing the data from reaching their intended recipient (Jabar Mahmood
et al., 2021). Critical safety messages like collision warnings may be delayed or lost due to this attack,
impairing VANET’s security and performance in traffic jams, accidents and fatalities (Malik et al., 2022).

Fig 1 Illustration of blackhole attack on VANET

Figure 1 provides a graphic illustration of black hole’s impact on VANET. Vehicle V3 collides with
vehicle V2, and alert message is sent by vehicle V3 to V4 (the blackhole attacker). However, vehicle V4
drops the message without forwarding it to vehicles V5 and V6 which could lead to more accidents and
traffic congestion. On the other hand, the wormhole attack is a version of the blackhole attack but way
riskiest as it directed towards the routing layer that could evade cryptographic safeguards and take down
the communication network (Bhatti et al., 2024). In this attack, malicious automobiles create a tunnel or
wormhole between the sender and the recipient with a low hope count and log it in the routing database
(Sahabdeen Aysha Asra, 2022). Moreover, wormhole attack is mounted with the assistance of two or
more colluding nodes, producing a false route and causing data to be routed through the attacker's node,
resulting in data manipulation, theft and misleading (Bhatti et al., 2024). In severe cases, these attacks
have the potential to completely disrupt networks, jeopardizing VANET functionality and safety by
rerouting and manipulating data inside the vehicles (Bhatti et al., 2024). While these attacks do not
directly jam channels or control resources, they severely disrupt communication, impacting the intended
functionality of VANET. Therefore, this research is proposed to study, simulate and analyse the
performance of simulated blackhole and wormhole attack using DSDV routing protocol. The findings of
the research are beneficial to many parties specifically the automaker industry, academic researchers and
users. By analysing the performance impact of these attacks using DSDV protocol, this research will
contribute valuable insights to the development of more reliable and secure routing protocols for VANET

2. RELATED WORK

In recent years, the security challenges in Vehicular Ad-Hoc Networks (VANETs) and Mobile Ad-
Hoc Networks (MANETs) have garnered significant attention due to their vulnerability to malicious
attacks. Several studies have explored the impact of these attacks and proposed mitigation strategies to
enhance network performance and reliability. This literature review synthesizes key findings from recent
research on blackhole, wormhole, and greyhole attacks, focusing on the effectiveness of various routing
protocols and detection mechanisms.
(Kumar et al., 2021) addressed the blackhole attack in VANETs by proposing a secure Ad-Hoc On-
Demand Distance Vector (AODV) routing protocol. Their approach involved modifying the original
AODV protocol by enhancing Route Request (RREQ) and Route Reply (RREP) packets and
implementing a cryptography-based function for node verification. Using NS-2 simulations, the study
evaluated performance metrics such as Packet Loss Ratio (PLR), Packet Delivery Ratio (PDR), routing
overhead, and End-to-End Delay (EED). The results demonstrated that the proposed method effectively
detected and isolated malicious nodes, leading to a lower PLR and higher PDR, thereby improving
network security and performance.
Similarly (Alifo Yakubu, 2023) investigated the performance of AODV and Dynamic Source
Routing (DSR) protocols in MANETs under blackhole attacks. Their study highlighted the vulnerability
of MANETs to such attacks, which significantly degrade network reliability. Using NS-2 simulations, the
researchers analyzed PDR, throughput, and residual energy. The findings revealed that AODV
outperformed DSR in energy efficiency and PDR, while DSR exhibited higher throughput. This study
emphasized the importance of selecting routing protocols based on specific network performance and
security requirements.
In contrast, (Ferdinand Alifo, 2023) focused on the impact of wormhole attacks on MANETs,
evaluating the performance of Destination-Sequenced Distance-Vector (DSDV), DSR, and Temporally
Ordered Routing Algorithm (TORA) protocols. The study utilized NS-2 simulations to measure
throughput, PDR, and EED. The results indicated that DSDV and TORA were highly vulnerable to
wormhole attacks, resulting in no data transmission and low PDR. Conversely, DSR demonstrated
stronger resistance, achieving a PDR of 24.86% and higher throughput. This research underscored the
severity of wormhole attacks and the need for robust countermeasures.
(Gurtej Kaur, 2022) explored the greyhole attack in VANETs, which involves dropping or altering
data packets, thereby compromising network security. The study proposed a mechanism to detect and
prevent greyhole attacks using the AODV routing protocol. A three-phase methodology was employed,
involving network initialization, malicious node generation, and detection through system broadcast
messages. The proposed method significantly improved PDR and throughput, with a 60% increase in
PDR and a 45% increase in throughput post-attack prevention. However, the study's exclusive focus on
greyhole attacks left room for future research on other security threats in VANETs.
Lastly, (Masruroh et al., 2022) analyzed the impact of blackhole and rushing attacks on VANETs
using the Ad-Hoc On-Demand Multipath Distance Vector (AOMDV) routing protocol. The study
employed OpenStreet Map, SUMO, and NS-2 to simulate realistic traffic scenarios in Bandung,
Indonesia. Performance metrics such as throughput, PLR, PDR, and EED were evaluated. The findings
revealed that both blackhole and rushing attacks degraded Quality of Service (QoS), with blackhole
attacks causing more severe declines in throughput and PDR, as well as higher PLR and EED. This study
highlighted the need for enhanced security measures to mitigate these attacks.
In conclusion, these studies collectively emphasize the critical security challenges posed by blackhole
and wormholes attacks in VANETs and MANETs. While various routing protocols and detection
mechanisms have shown promise in mitigating these threats, further research is needed to address the
evolving nature of network vulnerabilities and ensure robust, secure communication in dynamic ad-hoc
environments.

Table 1 Summary of Related Work

Author Issue Research Objectives Limitation and Results

(Kumar et VANET and traditional AODV To propose a secure AODV routing • Effectively detects and isolates
routing protocol are susceptible protocol to detect and mitigate malicious nodes, leading to a
al., 2021)
to blackhole attacks. blackhole attacks in VANET reduction in PLR.

(Alifo Blackhole attack in MANET To evaluate the performance of • DSR shows higher throughput, while
Yakubu, can disrupt network services by AODV and DSR under blackhole AODV has better PDR and
2023) dropping packets. attack residual energy.

(F. Alifo Wormhole attacks can severely To simulate and evaluate the • Zero data transmission and PDR in
et al., compromise the integrity and performance of different routing
DSDV and TORA
efficiency of data transmission protocols
2023) in (DSDV, DSR, TORA) under • Higher throughput and PDR, but
MANET. wormhole attack. with a slight delay in
DSR

(Gurtej Greyhole attack randomly To propose the detection and • Effectively prevent the attack leading
modify and discard packets prevention mechanism of AODV to a better result in PDR and
Kaur,
making it difficult to detect in routing protocol under greyhole throughput.
2022) VANET. attack in
VANET

(Masruro Blackhole and rushing attacks To analyse and compare the • Blackhole attack result in lower
can disrupt effects of black hole and rushing throughput and PDR, higher PLR,
h et al.,
VANET data attacks on VANET using AOMDV and increased EED compared to
2022) communication. rushing attack.

3. RESEARCH METHODOLOGY
In this project, NS-2 is used as a simulation tool to recreate a VANET network and study its
behaviour under different scenarios. The simulations involve varying the number of nodes (10, 20, 30, 40,
and 50) to represent traffic congestion in a network area of 1000 x 1000 square meters. The project’s
details and parameters are outlined in Table 2, providing a comprehensive overview of the setup,
configurations, and simulation scenarios. Using NS-2, the project aims to gain insights into the
performance and characteristics of VANET networks, especially in analysing Blackhole and Wormhole
attacks. These parameters were selected based on consideration for representing realistic urban
environments and the typical standard values used within VANET research domain.

Table 2: Network Parameter

Parameter Value

Simulator NS-2.35

Mobility Model SUMO Mobility (based on imported OSM map)

Routing Protocol DSDV

Number of nodes 10, 20, 30, 40 and 50

Packet Size 1500 bytes

Simulation Time (s) 30, 60, 90, 120, and 150

Terrain Size (m) 1200 x 1400

Malicious Activity Wormhole: 2 nodes

Blackhole: 1 node

Performance Metric EED, Throughput, PDR and routing overhead

Fig.2 shows the GUI of SUMO where it illustrates the traffic flows and movement of the vehicles
above the imported map from OSM which reflects the real-world movement patterns.
Fig. 2 SUMO -GUI

4. RESULT AND ANALYSIS

Results and Analysis represents the most crucial component of this research, as it presents and
interprets the findings obtained from the simulations designed to evaluate the performance of blackhole
and wormhole attacks using DSDV routing protocol within a VANET environment. The analysis
presented herein focuses on four key performance metrics: Packet Delivery Ratio (PDR), Throughput,
End-to-End Delay (EED), and Routing Overhead. These metrics were carefully selected to provide a
comprehensive and nuanced understanding of the performance for both normal operating conditions and
under the stress of malicious attacks. The results are presented in a comparative framework, directly
contrasting DSDV's baseline performance (without attack) with its performance when subjected to
blackhole attack and with wormhole attack. This comparative approach serves to highlight the specific
vulnerabilities of the VANET and quantify the effectiveness of the implemented attacks in degrading
network performance.

4.1 Packet Delivery Ratio vs Number of Nodes


From the results illustrated in Fig. 3, it is evident that the Packet Delivery Ratio (PDR) in the scenario
without any attack remains consistently high, ranging from 95.5% to 99%, as the number of nodes
increases. This stability is attributed to the network operating optimally without malicious disruptions,
ensuring reliable data transmission. The slight decrease in PDR can be linked to factors such as network
congestion and higher packet collision rates in larger networks. Despite these minor challenges, the
overall performance remains robust, indicating stable network conditions.
In contrast, both the blackhole and wormhole attack scenarios significantly impact the PDR. The
PDR drops notably as the number of nodes increases. In the blackhole attack scenario, malicious nodes
drop packets instead of forwarding them, leading to increased packet loss. As the network expands, the
likelihood of encountering such malicious nodes rises, further degrading performance. For example, at 30
nodes, the PDR drops to 95.56%, a decrease of approximately 2.94% compared to the no-attack scenario
(98.5%). This decline is due to malicious nodes attracting traffic by advertising the shortest path and then
dropping packets, preventing them from reaching their destinations. However, as node density increases
beyond 30 nodes, the impact of the blackhole attack diminishes due to the availability of alternate paths,
diluting the effect of a single malicious node.
Similarly, the wormhole attack scenario shows a decrease in PDR, though the impact is less severe
than that of blackhole attacks. At 30 nodes, the PDR drops to 95.55%, nearly identical to the blackhole
attack's PDR of 95.56%. However, at 20 nodes, the PDR drops to 97.35%, a smaller degradation
compared to the blackhole attack's 96.64%. Wormhole attacks disrupt normal routing by tunnelling
packets between distant nodes, causing some packet loss but not as severe as blackhole attacks. This
results in a relatively higher PDR, as wormhole attacks create shortcuts that may lead to routing loops or
bypass optimal paths, effectively disrupting routing without entirely dropping packets.

Fig 3 Packet Delivery Ratio (PDR) vs Number of Nodes

In summary, the presence of attacks disrupts normal routing, with blackhole attacks being more
detrimental due to complete packet dropping, whereas wormhole attacks cause routing anomalies but
retain some packet delivery.

4.2 Throughput vs Number of Nodes


As illustrated in Figure 4, the throughput in the no-attack scenario remains relatively stable and high
as the number of nodes increases, reflecting efficient network operation and consistent data transmission
facilitated by the DSDV protocol. However, throughput decreases significantly from around 760 kbps at
lower node densities (10-20 nodes) to 254.71 kbps at higher densities. This reduction is attributed to
increased network congestion and contention for the shared wireless medium, which limits effective data
transfer rates as the network scales.
In contrast, the blackhole attack severely impacts throughput, particularly at 20 nodes, where it drops
dramatically to 141.02 kbps from a baseline of 762.84 kbps, marking an 81.4% reduction. This sharp
decline is caused by malicious nodes attracting and then discarding traffic, preventing successful data
delivery. While the impact is less severe at other node densities, throughput still suffers as the likelihood
of encountering malicious nodes increases with network growth.
Similarly, the wormhole attack significantly degrades throughput, especially at 30 nodes, where it
falls to 79.15 kbps from 254.71 kbps, a 69% decrease. Wormholes disrupt routing by creating shortcuts
and potential loops, consuming bandwidth and delaying data delivery. Although throughput declines, the
effect is less severe than blackhole attacks, as wormholes misroute rather than drop packets. The differing
impacts of these attacks highlight their distinct mechanisms and interactions with network topology at
varying node densities.

Fig 4 Throughput Vs Number of Nodes

In summary, the presence of attacks disrupts network efficiency, with blackhole attacks causing more
significant throughput degradation due to packet loss, while wormhole attacks lead to routing anomalies
that moderately affect throughput.

4.3 End to End Delay (EED) vs Number of Nodes

As shown in Figure 5, the EED in the without attack scenario shows a fluctuating trend with varying
node density. From 10 to 30 nodes, the EED increases, suggesting increasing congestion and queuing
delays as more nodes compete for the shared medium. However, at 40 nodes, the EED decreases, which
might be due to changes in network topology or traffic patterns generated in that specific simulation run.
At 50 nodes, the EED increases again, indicating that congestion effects are again dominant at higher
densities.
In contrast, a noticeable impact on EED is seen under the blackhole attack scenario. At 10 nodes, the
EED increases significantly from 132.193ms in the without attack scenario to 181.262ms with the
blackhole attack (increase 37.1%). The escalation is likely due to packets being routed toward the
blackhole node and then being dropped, requiring retransmission and thus increasing the overall delay. At
20 nodes, the blackhole attack has a slight decrease in EED compared to the no-attack scenario which
warrants further investigation. It is possible that the blackhole node remove itself from the routing
process, coincidentally reduces congestion in some specific cases, leading to a temporary decrease in
delay which is not the typical behavior of a blackhole attack.
The wormhole attack has a less consistent impact on EED compared to the blackhole attack. At 10
and 20 nodes, it causes a moderate increase in EED. However, at 30 nodes, the wormhole attack shows a
decrease in EED compared to the without attack scenario. This could be because the wormhole creates a
shortcut, reducing the number of hops a packet needs to traverse in some cases.
Fig 5 End to End Delay (EED) vs Number of Nodes
4.4 Routing Overhead (RO) vs Number of Nodes
As illustrated in Figure 6, the routing overhead in the no-attack scenario increases gradually as the
number of nodes grows. This is because more nodes necessitate additional routing updates and control
messages to maintain network connectivity and accurate routing tables. The DSDV protocol efficiently
manages this process, resulting in a moderate rise in overhead, particularly noticeable from 20 to 30
nodes and again from 40 to 50 nodes, reflecting the growing complexity of the network.
In the blackhole attack scenario, routing overhead rises significantly, especially at 30 nodes, where it
jumps from 12.679 to 31.741—an increase of approximately 150%. This sharp rise is due to malicious
nodes advertising false routes, forcing frequent route recalculations and generating more control
messages. However, at 50 nodes, the routing overhead decreases compared to the no-attack scenario,
likely because the high node density allows the network to adapt and find alternate paths that bypass the
malicious node.
The wormhole attack also increases routing overhead, though less drastically than blackhole attacks.
At 30 nodes, overhead rises to 22.317, a 76% increase, due to routing loops and inconsistencies caused by
unauthorized shortcuts. At 50 nodes, wormhole attacks result in the highest overhead among all scenarios,
as their disruptive effects become more pronounced in dense networks, requiring additional control
messages to resolve routing anomalies. This highlights the varying impacts of different attack types on
network performance.
Fig 6 End to End Delay(EED) vs Number of Nodes
In summary, attacks increase RO by disrupting normal routing, with blackhole attacks causing more
significant overhead due to frequent route recalculations, while wormhole attacks lead to routing
anomalies that moderately increase RO.

5. CONCLUSION

The research conducted on the performance of VANETs under blackhole and wormhole attacks using
the DSDV routing protocol provides critical insights into the vulnerabilities and resilience of vehicular
networks. The findings highlight the significant impact of these attacks on key network performance
metrics, including Packet Delivery Ratio (PDR), throughput, End-to-End Delay (EED), and Routing
Overhead (RO).
In the no-attack scenario, the network demonstrates stable and efficient performance, with high PDR,
consistent throughput, and manageable EED and RO. This underscores the effectiveness of the DSDV
protocol in maintaining reliable communication in dynamic VANET environments. However, the
introduction of blackhole and wormhole attacks severely disrupts network operations. Blackhole attacks,
characterized by malicious nodes dropping packets, lead to substantial declines in PDR and throughput,
increased EED, and heightened RO due to frequent route recalculations. Wormhole attacks, while less
severe in terms of packet loss, still degrade network performance by creating routing anomalies and
increasing RO, particularly in dense networks.
The study reveals that blackhole attacks are more detrimental to PDR and throughput due to complete
packet dropping, whereas wormhole attacks cause routing inconsistencies that moderately affect
performance. Interestingly, at higher node densities, the impact of blackhole attacks diminishes as the
network can adapt and find alternate paths, whereas wormhole attacks become more disruptive due to
increased routing anomalies.
These findings emphasize the need for robust security mechanisms to mitigate the effects of such
attacks in VANETs. The research contributes valuable insights for automakers, academic researchers, and
users, highlighting the importance of developing more secure and reliable routing protocols. Future work
could focus on enhancing the DSDV protocol or exploring alternative protocols to better withstand these
attacks, ensuring safer and more efficient vehicular communication systems. Overall, this study
underscores the critical balance between network performance and security in the evolving landscape of
intelligent transportation systems.
6. REFERENCES

Alifo, F., Martin, D., & Awinsongya, M. (2023). Wormhole Attack Vulnerability Assessment of
MANETs: Effects on Routing Protocols and Network Performance. International Journal of
Computer Applications. https://api.semanticscholar.org/CorpusID:270401706

Alifo Yakubu. (2023). Performance analysis of AODV and DSR routing protocols under blackhole attack
using NS-2. Advanced Computer Science and Information Technology Trends, 485–496.

Bhatti, D. S., Saleem, S., Imran, A., Kim, H. J., Kim, K.-I., & Lee, K.-C. (2024). Detection and isolation
of wormhole nodes in wireless ad hoc networks based on post-wormhole actions. Scientific Reports,
14(1), 3428. https://doi.org/10.1038/s41598-024-53938-9

Ferdinand Alifo, D. M. M. A. Y. (2023). Wormhole Attack Vulnerability Assessment of MANETs:


Effects on Routing Protocols and Network Performance . International Journal of Computer
Applications , 185(48), 24–29.

Gurtej Kaur, M. K. A. K. (2022). Gray hole Attack Detection and Prevention System in Vehicular Adhoc
Network (VANET). 3rd International Conference on Computing, Analytics and Networks (ICAN),
1–6.

Jabar Mahmood, Zongtao Duan, Yun Yang, Qinglong Wang, Jamel Nebhen, & Muhammad Nasir
Mumtaz Bhutta. (2021). Security in vehicular ad hoc networks: challenges and countermeasures.
Security and Communication Networks. Security and Communication Networks, 1–20.
https://doi.org/https://doi.org/10.1155/2021/9997771

Kumar, A., Varadarajan, V., Kumar, A., Dadheech, P., Choudhary, S. S., Kumar, V. D. A., Panigrahi, B.
K., & Veluvolu, K. C. (2021). Black hole attack detection in vehicular ad-hoc network using secure
AODV routing algorithm. Microprocess. Microsyst., 80(C).
https://doi.org/10.1016/j.micpro.2020.103352

Malik, A., Khan, M. Z., Faisal, M., Khan, F., & Seo, J.-T. (2022). An Efficient Dynamic Solution for the
Detection and Prevention of Black Hole Attack in VANETs. Sensors, 22(5).
https://doi.org/10.3390/s22051897

Masruroh, S. U., Farghani, Y. S., Kusdaryono, A., Fiade, A., Putri, R. A., & Pratiwi, L. A. (2022).
Comparative Analysis of Testing Black Hole Attack and Rushing Attack on VANET (Vehicular Ad-
Hoc Network) with AOMDV Routing Protocol. 2022 International Conference on Engineering and
Emerging Technologies (ICEET), 1–6. https://doi.org/10.1109/ICEET56468.2022.10007272

Sahabdeen Aysha Asra. (2022). Security issues of Vehicular Ad Hoc Networks (VANET): A Systematic
Review. TIERS Information Technology Journal, 3(1), 17–27.

Sahoo, A., & Kumar Tripathy, A. (2023). On routing algorithms in the internet of vehicles: a survey.
Connection Science, 35(1), 2272583. https://doi.org/10.1080/09540091.2023.2272583

You might also like