Skip to main content
Log in

A secured routing algorithm against black hole attack for better intelligent transportation system in vehicular ad hoc network

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

The societal costs accompanying the developments are usually related to traffic congestion and accidents. The condition can be enhanced by providing timely information on traffic conditions using vehicular ad-hoc networks. vehicular ah hoc network (VANET), which is an essential technology in the realization of intelligent transportation system (ITS), has key challenges such as infrequent link connection duration and high packet drop ratio. In this paper, an algorithm is proposed which provides security against attacks on routing protocols and better network connectivity. In this algorithm, attacker node or the chain of attacker node can be identified, and IPs of these attacker nodes are blacklisted which implies if any RREP (route reply packet)come from the blacklisted node then that RREP will be discarded. The proposed algorithm is implemented using NCTUns network simulator and comparison of leading VANET protocols ad hoc on-demand distance vector (AODV), B-AODV (AODV with black hole attack) with the proposed secured algorithm is done. Extensive simulation scenarios are considered, and final results show that proposed algorithm has 40% higher throughput in comparison to AODV protocol, which makes it more efficient in a dense vehicular environment having V2V communication. Also, the proposed algorithm has 10% lower packet drop and a lesser number of collisions which renders it more reliable for the vehicle vehicle (V2V) environment. It proves that proposed secured routing algorithm performs better than standard AODV in the presence of malicious nodes causing black hole attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Giordano S (2002) Mobile ad hoc networks. In: Stojmenovic I (ed) Handbook of wireless networks and mobile computing. Wiley, New York, pp 325–346

    Chapter  Google Scholar 

  2. Kenney JB (2011) Dedicated short-range communications (DSRC) standards in the United States. Proc IEEE 99:1162–1182

    Article  Google Scholar 

  3. Tyagi P, Dembla D (2015) Performance analysis and quality-of-service monitoring of protected and unprotected TCP networks using NCTUns simulator: IEEE 2015 Communication Systems and Network Technologies; 4–6 April 2015. IEEE, Gwalior, pp 273–277

  4. Guo P, Wang J, Li B, Lee S (2014) Variable threshold value authentication architecture for wireless mesh networks. J Internet Technol 15:929–936

    Google Scholar 

  5. Papadimitratos P, Buttyan L, Holczer T, Schoch E, Freudiger J, Raya M, Ma Z, Kargl F, Kung A, Hubaux JP (2008) Secure vehicular communication systems: design and architecture. IEEE Commun Mag 46:100–109

    Article  Google Scholar 

  6. Perkins CE, Royer F, Das SR (2003) Ad hoc on-demand distance vector (AODV) routing. IETF RFC- 3561 MANET Working group 2003

  7. Hyoung-Kee C, In-Hwan K, Jae-Chern Y (2010) Secure and efficient protocol for a vehicular ad-hoc network with privacy preservation. Eurasip J Wirel Commun Netw 2011:1–15

  8. Raya M, Papadimitratos P, Hubaux J-P (2006) Securing vehicular communications. IEEE Wcnc 13:8–11

    Google Scholar 

  9. Tyagi P, Dembla D (2014) Taxonomy of security attacks and issues in vehicular ad-hoc networks (VANETs). Int J Comput Appl 91:22–27

    Google Scholar 

  10. Sivakumar T, Manoharan R (2017) ERP: an efficient reactive routing protocol for dense vehicular ad hoc networks. Turk J Electr Eng Comput Sci 25:1762–1772

    Article  Google Scholar 

  11. Cerri D, Ghioni A (2002) Securing AODV: the A-SAODV secure routing prototype. IEEE Commn Mag 46:120–125

    Article  Google Scholar 

  12. Gopal U, Subramanian K (2017) A secure cross-layer AODV routing method to detect and isolate (SCLARDI) black hole attacks for MANET. Turk J Electr Eng Comput Sci 25:2761–2769

    Article  Google Scholar 

  13. Mohamed E, Abdelmalek A (2015) Impact analysis of black hole attacks on mobile Ad Hoc networks performance. Int J Grid Comput Appl (IJGCA) 6:1–10

    Google Scholar 

  14. Deng H, Li W, Agrawal DP (2002) Routing security in wireless ad hoc networks. IEEE Commun Mag 40:70–75

    Article  Google Scholar 

  15. Huang D, Misra S, Verma M, Xue G (2011) PACP: an efficient pseudonymous authentication-based conditional privacy protocol for VANETs. Transp Res Rec 12:736–746

    Google Scholar 

  16. Ramaswamy S, Fu H, Sreekantaradhya M, Dixon J, Nygard K (2003) Prevention of cooperative black hole attack in wireless ad hoc networks. In: IEEE 2003 International Conference on Wireless Networks Las Vegas, Nevada, pp 570–575

  17. Vijayakumar P, Azores M, Kannan A, Deborah LJ (2016) Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. Transp Res Rec 17:1–14

    Google Scholar 

  18. Mohamed H, Ibrahim S (2015) A comparison of VANET authentication schemes: public key vs. symmetric key. IEEE Commun Mag 40:70–75

  19. Wang SY (2003) The design and implementation of the NCTUns network simulator. Comput Netw 42:175–197

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Parul Tyagi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tyagi, P., Dembla, D. A secured routing algorithm against black hole attack for better intelligent transportation system in vehicular ad hoc network. Int. j. inf. tecnol. 11, 743–749 (2019). https://doi.org/10.1007/s41870-018-0160-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-018-0160-x

Keywords

Navigation