A Reliable Tactic for Detecting Black Hole Attack in Vehicular Ad Hoc Networks

  • Isha DhyaniEmail author
  • Neha Goel
  • Gaurav Sharma
  • Bhawna Mallick
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 553)


Nowadays, Vehicular Ad Hoc networks is one of the most emerging and favorable technology which succor in governing day-to-day road traffic in roads. The main disquiet of VANETs is focused on providing security to moving nodes in the vehicular network, so that possibility of accidents, traffic jams or any other hindrance in communication among different vehicles will get reduced. Black hole is most popular security attack that sends false reply message to the source by advertising itself as having optimal route toward destination. This paper focused on black hole problem. Here, a reliable mechanism is proposed for averting black hole attack in VANET by unicasting data packet to vehicles. To enhance security, trust factor technique is used which detect routing misbehavior and gives surety of relaying data packets to the destination. This elucidation defends against black hole attack and simulation on Ns-2 will sustain its efficiency and reliability.


Vehicular Ad hoc networks Black hole attack Security Attack 


  1. 1.
    Khan, Mohammad Arifin Rahman. “Possible solution for traffic in roaming system.” International Journal of Advanced Research in Engineering and Applied Sciences 3, no. 8: 1–15 (2014).Google Scholar
  2. 2.
    Al-Kahtani, Mohammed Saeed. “Survey on security attacks in Vehicular Ad hoc Networks (VANETs).” In Signal Processing and Communication Systems (ICSPCS), 2012 6th International Conference on, pp. 1–9. IEEE, (2012).Google Scholar
  3. 3.
    Sharma G, Bala S, Verma A K, Singh Tej, “Security in Wireless Sensor Networks using Frequency Hopping”, International Journal of Computer Application(0975-8887), Volume 12- No. 6 December (2010).Google Scholar
  4. 4.
    Raya M. and Hubaux J-P, “The security of vehicular ad hoc networks”, Proceedings of the 3rd ACM workshop on Security of adhoc and sensor networks. New York, NY, USA: ACM,, pp. 11.21, (2005).Google Scholar
  5. 5.
    Mahmood, RA Raja, and A. I. Khan. “A survey on detecting black hole attack in AODV-based mobile ad hoc networks.” In 2007 International Symposium on High Capacity Optical Networks and Enabling Technologies, pp. 1–6. IEEE, (2007).Google Scholar
  6. 6.
    Ramaswamy S.,Huirong Fu, Manohar S. “Prevention of Cooperative Black hole attack in wireless Ad-Hoc Network”, International Conference on Wireless Networks, pp. 570–575, June (2003).Google Scholar
  7. 7.
    Almutairi H, Chelloug S, Alqarni H, Aljaber R, Alshehri A, Alotaish D, “A new Black Hole Detection Scheme for Vanets” ACM, September (2014).Google Scholar
  8. 8.
    Kozma W, Lazos L (2009) REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits. Paper presented at the Second ACM conference on Wireless Network Security, Zurich Switzerland, 16–18 March (2009).Google Scholar
  9. 9.
    Tamilselvan, L., Sankaranarayanan, V., Prevention of Blackhole Attack in MANET. Paper presented at the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, Sydney, Australia, 27–30 August(2007).Google Scholar
  10. 10.
    Marti S, Giuli TJ, Lai K, Baker M: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. Paper presented at the 6th annual International Conference on Mobile Computing and Networking, Boston, Massachusetts, 6–11 August (2000).Google Scholar
  11. 11.
    Dhingra S, Arora K, “Detection and Prevention of Black Hole Attack in VANET” International Journal of Computer Science & Management studies, Vol. 13, June (2013).Google Scholar
  12. 12.
    Aware A.A, Bhandari K, “Prevention of Black hole Attack on AODV in MANET using Hash Function”, 3rd IEEE International Conference on Reliability, Infocom Technologies and Optimization (ICRITO 2014), pp 388–393, October (2014).Google Scholar
  13. 13.
    Rani J, Kumar N “Improving AOMDV Protocol for Black Hole Detection in Mobile Ad hoc Network” IEEE International Conference on Control, Computing, Communication and Materials (ICCCCM), (2013).Google Scholar
  14. 14.
    Su, M.-Y. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications, 34(1) 107–117, January (2011).Google Scholar
  15. 15.
    Huang J-W, Woungang I, Chao H-C, Obaidat M-S, Chi T-Y, Dhurandher S, “Multi-Path Trust-Based Secure AOMDV Routing in Ad Hoc Networks” IEEE Globecom, (2011).Google Scholar
  16. 16.
    Ros, Francisco J., and. Ruiz M. P. “Implement ing a new manet unicast rout ing protocol in ns2.” Sun Microsystems Inc (2004).Google Scholar
  17. 17.
    Khamayseh, Y., Bader, A., Mardini, W., BaniYasein, M.,“A New Protocol for Detecting Black hole Nodes in Ad Hoc Networks”, “International journal communication network & information security” April (2011).Google Scholar
  18. 18.
    Chauhan, R. K. “An assessment based approach to detect black hole attack in MANET.” In Computing, Communication & Automation (ICCCA), 2015 International Conference on, pp. 552–557. IEEE, (2015).Google Scholar
  19. 19.
    Beraldi, R., Querzoni, L., and Baldoni, R., “A Hint-Based Probabilistic Protocol for Unicast Communications in MANETs”, in Proc. of IEEE 11th International Conference on Parallel and Distributed Systems (ICPADS’05), (2005).Google Scholar
  20. 20.
    Khan, Mohammad Arifin Rahman. “Analysis the channel allocation for removing the traffic problems from the roaming systems.” International Journal of Advanced Research in Engineering and Applied Sciences 3.7,74–86 (2014).Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  • Isha Dhyani
    • 1
    Email author
  • Neha Goel
    • 1
  • Gaurav Sharma
    • 2
  • Bhawna Mallick
    • 1
  1. 1.Galgotia College of Engineering and TechnologyGreater NoidaIndia
  2. 2.Amity UniversityNoidaIndia

Personalised recommendations