Skip to main content

A Reliable Tactic for Detecting Black Hole Attack in Vehicular Ad Hoc Networks

  • Conference paper
  • First Online:
Advances in Computer and Computational Sciences

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 553))

Abstract

Nowadays, Vehicular Ad Hoc networks is one of the most emerging and favorable technology which succor in governing day-to-day road traffic in roads. The main disquiet of VANETs is focused on providing security to moving nodes in the vehicular network, so that possibility of accidents, traffic jams or any other hindrance in communication among different vehicles will get reduced. Black hole is most popular security attack that sends false reply message to the source by advertising itself as having optimal route toward destination. This paper focused on black hole problem. Here, a reliable mechanism is proposed for averting black hole attack in VANET by unicasting data packet to vehicles. To enhance security, trust factor technique is used which detect routing misbehavior and gives surety of relaying data packets to the destination. This elucidation defends against black hole attack and simulation on Ns-2 will sustain its efficiency and reliability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Khan, Mohammad Arifin Rahman. “Possible solution for traffic in roaming system.” International Journal of Advanced Research in Engineering and Applied Sciences 3, no. 8: 1–15 (2014).

    Google Scholar 

  2. Al-Kahtani, Mohammed Saeed. “Survey on security attacks in Vehicular Ad hoc Networks (VANETs).” In Signal Processing and Communication Systems (ICSPCS), 2012 6th International Conference on, pp. 1–9. IEEE, (2012).

    Google Scholar 

  3. Sharma G, Bala S, Verma A K, Singh Tej, “Security in Wireless Sensor Networks using Frequency Hopping”, International Journal of Computer Application(0975-8887), Volume 12- No. 6 December (2010).

    Google Scholar 

  4. Raya M. and Hubaux J-P, “The security of vehicular ad hoc networks”, Proceedings of the 3rd ACM workshop on Security of adhoc and sensor networks. New York, NY, USA: ACM,, pp. 11.21, (2005).

    Google Scholar 

  5. Mahmood, RA Raja, and A. I. Khan. “A survey on detecting black hole attack in AODV-based mobile ad hoc networks.” In 2007 International Symposium on High Capacity Optical Networks and Enabling Technologies, pp. 1–6. IEEE, (2007).

    Google Scholar 

  6. Ramaswamy S.,Huirong Fu, Manohar S. “Prevention of Cooperative Black hole attack in wireless Ad-Hoc Network”, International Conference on Wireless Networks, pp. 570–575, June (2003).

    Google Scholar 

  7. Almutairi H, Chelloug S, Alqarni H, Aljaber R, Alshehri A, Alotaish D, “A new Black Hole Detection Scheme for Vanets” ACM, September (2014).

    Google Scholar 

  8. Kozma W, Lazos L (2009) REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits. Paper presented at the Second ACM conference on Wireless Network Security, Zurich Switzerland, 16–18 March (2009).

    Google Scholar 

  9. Tamilselvan, L., Sankaranarayanan, V., Prevention of Blackhole Attack in MANET. Paper presented at the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, Sydney, Australia, 27–30 August(2007).

    Google Scholar 

  10. Marti S, Giuli TJ, Lai K, Baker M: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. Paper presented at the 6th annual International Conference on Mobile Computing and Networking, Boston, Massachusetts, 6–11 August (2000).

    Google Scholar 

  11. Dhingra S, Arora K, “Detection and Prevention of Black Hole Attack in VANET” International Journal of Computer Science & Management studies, Vol. 13, June (2013).

    Google Scholar 

  12. Aware A.A, Bhandari K, “Prevention of Black hole Attack on AODV in MANET using Hash Function”, 3rd IEEE International Conference on Reliability, Infocom Technologies and Optimization (ICRITO 2014), pp 388–393, October (2014).

    Google Scholar 

  13. Rani J, Kumar N “Improving AOMDV Protocol for Black Hole Detection in Mobile Ad hoc Network” IEEE International Conference on Control, Computing, Communication and Materials (ICCCCM), (2013).

    Google Scholar 

  14. Su, M.-Y. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications, 34(1) 107–117, January (2011).

    Google Scholar 

  15. Huang J-W, Woungang I, Chao H-C, Obaidat M-S, Chi T-Y, Dhurandher S, “Multi-Path Trust-Based Secure AOMDV Routing in Ad Hoc Networks” IEEE Globecom, (2011).

    Google Scholar 

  16. Ros, Francisco J., and. Ruiz M. P. “Implement ing a new manet unicast rout ing protocol in ns2.” Sun Microsystems Inc (2004).

    Google Scholar 

  17. Khamayseh, Y., Bader, A., Mardini, W., BaniYasein, M.,“A New Protocol for Detecting Black hole Nodes in Ad Hoc Networks”, “International journal communication network & information security” April (2011).

    Google Scholar 

  18. Chauhan, R. K. “An assessment based approach to detect black hole attack in MANET.” In Computing, Communication & Automation (ICCCA), 2015 International Conference on, pp. 552–557. IEEE, (2015).

    Google Scholar 

  19. Beraldi, R., Querzoni, L., and Baldoni, R., “A Hint-Based Probabilistic Protocol for Unicast Communications in MANETs”, in Proc. of IEEE 11th International Conference on Parallel and Distributed Systems (ICPADS’05), (2005).

    Google Scholar 

  20. Khan, Mohammad Arifin Rahman. “Analysis the channel allocation for removing the traffic problems from the roaming systems.” International Journal of Advanced Research in Engineering and Applied Sciences 3.7,74–86 (2014).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Isha Dhyani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Dhyani, I., Goel, N., Sharma, G., Mallick, B. (2017). A Reliable Tactic for Detecting Black Hole Attack in Vehicular Ad Hoc Networks. In: Bhatia, S., Mishra, K., Tiwari, S., Singh, V. (eds) Advances in Computer and Computational Sciences. Advances in Intelligent Systems and Computing, vol 553. Springer, Singapore. https://doi.org/10.1007/978-981-10-3770-2_31

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3770-2_31

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3769-6

  • Online ISBN: 978-981-10-3770-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics