全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Real Time Vehicular Traffic Simulation for Black Hole Attack in the Greater Detroit Area

DOI: 10.4236/jis.2020.111004, PP. 71-80

Keywords: Black Hole Attacks, Vehicular Ad Hoc Networks, AODV Protocol, Simulation, SUMO, Greater Detroit Area

Full-Text   Cite this paper   Add to My Lib

Abstract:

Vehicular Ad-hoc Networks (VANETs) technology has recently emerged, and gaining significant attention from the research because it is promising technologies related to Intelligent Transportation System (ITSs) and smart cities. Wireless vehicular communication is employed to improve traffic safety and to reduce traffic congestion. Each vehicle in the ad-hoc network achieves as a smart mobile node categorized by high mobility and forming of dynamic networks. As a result of the movement of vehicles in a continuous way, VANETs are vulnerable to many security threats so it requisites capable and secure communication. Unfortunately, Ad hoc networks are liable to varied attacks like Block Hole attacks and Grey Hole attacks, Denial of service attacks, etc. Among the most known attacks are the Black Hole attacks while the malicious vehicle is able to intercept the data and drops it without forwarding it to the cars. The main goal of our simulation is to analyze the performance impact of black hole attack in real time vehicular traffic in the Greater Detroit Area using NS-2 and SUMO (Simulation of Urban). The simulation will be with AODV protocol.

References

[1]  Zaidi, K. and Rajarajan, M. (2015) Vehicular Internet: Security & Privacy Challenges and Opportunities. Future Internet, 7, 257-275.
https://doi.org/10.3390/fi7030257
[2]  Alshammari, A., Zohdy, M., Debnath, D. and Corser, G. (2018) Classification Approach for Intrusion Detection in Vehicle Systems. Wireless Engineering and Technology, 9, 79-94. https://doi.org/10.4236/wet.2018.94007
[3]  Kaur, T. and Verma, A.K. (2012) Simulation and Analysis of AODV Routing Protocol in VANET. International Journal of Soft Computing and Engineering, 2, 293-301.
[4]  Jamali, S.B.S. (2015) A Survey over Black Hole Attack Detection in Mobile ad Hoc Network. International Journal of Computer Science and Network Security, 15, 44.
[5]  Miller, C. and Valasek, C. (2015) Remote Exploitation of an Unaltered Passenger Vehicle. Black Hat USA.
[6]  Van Glabbeek, R., Höfner, P., Portmann, M. and Tan, W.L. (2016) Modelling and Verifying the AODV Routing Protocol. Distributed Computing, 29, 279-315.
https://doi.org/10.1007/s00446-015-0262-7
[7]  Kumar, J., Kulkarni, M. and Gupta, D. (2013) Effect of Black Hole Attack on MANET Routing Protocols. International Journal of Computer Network and Information Security, 5, 64. https://doi.org/10.5815/ijcnis.2013.05.08
[8]  Singh, H. and Singh, M. (2013) Securing MANETs Routing Protocol under Black Hole Attack. International Journal of Innovative Research in Computer and Communication Engineering, 1, 808-813.
[9]  Shahabi, S., Ghazvini, M. and Bakhtiarian, M. (2016) A Modified Algorithm to Improve Security and Performance of AODV Protocol against Black Hole Attack. Wireless Networks, 22, 1505-1511.
https://doi.org/10.1007/s11276-015-1032-y
[10]  Abdulkader, Z.A., Abdullah, A., Abdullah, M.T. and Zukarnain, Z.A. (2017) LI-AODV: Lifetime Improving AODV Routing for Detecting and Removing Black-Hole Attack from VANET. Journal of Theoretical & Applied Information Technology, 95, 196-209.
[11]  Bibhu, V., Kumar, R., Kumar, B.S. and Singh, D.K. (2012) Performance Analysis of Black Hole Attack in VANET. International Journal of Computer Network and Information Security, 4, 47. https://doi.org/10.5815/ijcnis.2012.11.06
[12]  Alheeti, K.M.A., Gruebler, A. and McDonald-Maier, K.D. (2015) An Intrusion Detection System against Black Hole Attacks on the Communication Network of Self-Driving Cars. 6th International Conference on Emerging Security Technologies, Braunschweig, 3-5 September 2015, 86-91.
https://doi.org/10.1109/EST.2015.10
[13]  Grimaldo, J. and Martí, R. (2018) Performance Comparison of Routing Protocols in VANETs under Black Hole Attack in Panama City. International Conference on Electronics, Communications and Computers, Cholula, 126-132.
https://doi.org/10.1109/CONIELECOMP.2018.8327187
[14]  Ahmed, E.F., Abouhogail, R.A. and Yahya, A. (2014) Performance Evaluation of Blackhole Attack on Vanet’s Routing Protocols. Science and Engineering Research Support Society, 8, 39-54.
[15]  Afdhal, A., Muchallil, S., Walidainy, H. and Yuhardian, Q. (2017) Black Hole Attacks Analysis for AODV and AOMDV Routing Performance in VANETs. International Conference on Electrical Engineering and Informatics, Banda Aceh, 18-20 October 2017, 29-34. https://doi.org/10.1109/ICELTICS.2017.8253244
[16]  Gurung, S. and Chauhan, S. (2019) Performance Analysis of Black-Hole Attack Mitigation Protocols under Gray-Hole Attacks in MANET. Wireless Networks, 25, 975-988.
[17]  Moudni, H., Er-rouidi, M., Mouncif, H. and El Hadadi, B. (2016) Performance Analysis of AODV Routing Protocol in MANET under the Influence of Routing Attacks. International Conference on Electrical and Information Technologies, Tangiers, 4-7 May 2016, 536-542. https://doi.org/10.1109/EITech.2016.7519658
[18]  Deshmukh, S.R., Chatur, P.N. and Bhople, N.B. (2016) AODV-Based Secure Routing against Blackhole Attack in MANET. IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology, Bangalore, 20-21 May 2016, 1960-1964. https://doi.org/10.1109/RTEICT.2016.7808179
[19]  Kaushik, N. and Dureja, A. (2013) Performance Evaluation of Modified AODV against Black Hole Attack in MANET. European Scientific Journal, 9, 182-193.
[20]  Open Street Map.
https://www.openstreetmap.org

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133