Abstract
Nowadays, Vehicular Ad Hoc networks is one of the most emerging and favorable technology which succor in governing day-to-day road traffic in roads. The main disquiet of VANETs is focused on providing security to moving nodes in the vehicular network, so that possibility of accidents, traffic jams or any other hindrance in communication among different vehicles will get reduced. Black hole is most popular security attack that sends false reply message to the source by advertising itself as having optimal route toward destination. This paper focused on black hole problem. Here, a reliable mechanism is proposed for averting black hole attack in VANET by unicasting data packet to vehicles. To enhance security, trust factor technique is used which detect routing misbehavior and gives surety of relaying data packets to the destination. This elucidation defends against black hole attack and simulation on Ns-2 will sustain its efficiency and reliability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Khan, Mohammad Arifin Rahman. “Possible solution for traffic in roaming system.” International Journal of Advanced Research in Engineering and Applied Sciences 3, no. 8: 1–15 (2014).
Al-Kahtani, Mohammed Saeed. “Survey on security attacks in Vehicular Ad hoc Networks (VANETs).” In Signal Processing and Communication Systems (ICSPCS), 2012 6th International Conference on, pp. 1–9. IEEE, (2012).
Sharma G, Bala S, Verma A K, Singh Tej, “Security in Wireless Sensor Networks using Frequency Hopping”, International Journal of Computer Application(0975-8887), Volume 12- No. 6 December (2010).
Raya M. and Hubaux J-P, “The security of vehicular ad hoc networks”, Proceedings of the 3rd ACM workshop on Security of adhoc and sensor networks. New York, NY, USA: ACM,, pp. 11.21, (2005).
Mahmood, RA Raja, and A. I. Khan. “A survey on detecting black hole attack in AODV-based mobile ad hoc networks.” In 2007 International Symposium on High Capacity Optical Networks and Enabling Technologies, pp. 1–6. IEEE, (2007).
Ramaswamy S.,Huirong Fu, Manohar S. “Prevention of Cooperative Black hole attack in wireless Ad-Hoc Network”, International Conference on Wireless Networks, pp. 570–575, June (2003).
Almutairi H, Chelloug S, Alqarni H, Aljaber R, Alshehri A, Alotaish D, “A new Black Hole Detection Scheme for Vanets” ACM, September (2014).
Kozma W, Lazos L (2009) REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits. Paper presented at the Second ACM conference on Wireless Network Security, Zurich Switzerland, 16–18 March (2009).
Tamilselvan, L., Sankaranarayanan, V., Prevention of Blackhole Attack in MANET. Paper presented at the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, Sydney, Australia, 27–30 August(2007).
Marti S, Giuli TJ, Lai K, Baker M: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. Paper presented at the 6th annual International Conference on Mobile Computing and Networking, Boston, Massachusetts, 6–11 August (2000).
Dhingra S, Arora K, “Detection and Prevention of Black Hole Attack in VANET” International Journal of Computer Science & Management studies, Vol. 13, June (2013).
Aware A.A, Bhandari K, “Prevention of Black hole Attack on AODV in MANET using Hash Function”, 3rd IEEE International Conference on Reliability, Infocom Technologies and Optimization (ICRITO 2014), pp 388–393, October (2014).
Rani J, Kumar N “Improving AOMDV Protocol for Black Hole Detection in Mobile Ad hoc Network” IEEE International Conference on Control, Computing, Communication and Materials (ICCCCM), (2013).
Su, M.-Y. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications, 34(1) 107–117, January (2011).
Huang J-W, Woungang I, Chao H-C, Obaidat M-S, Chi T-Y, Dhurandher S, “Multi-Path Trust-Based Secure AOMDV Routing in Ad Hoc Networks” IEEE Globecom, (2011).
Ros, Francisco J., and. Ruiz M. P. “Implement ing a new manet unicast rout ing protocol in ns2.” Sun Microsystems Inc (2004).
Khamayseh, Y., Bader, A., Mardini, W., BaniYasein, M.,“A New Protocol for Detecting Black hole Nodes in Ad Hoc Networks”, “International journal communication network & information security” April (2011).
Chauhan, R. K. “An assessment based approach to detect black hole attack in MANET.” In Computing, Communication & Automation (ICCCA), 2015 International Conference on, pp. 552–557. IEEE, (2015).
Beraldi, R., Querzoni, L., and Baldoni, R., “A Hint-Based Probabilistic Protocol for Unicast Communications in MANETs”, in Proc. of IEEE 11th International Conference on Parallel and Distributed Systems (ICPADS’05), (2005).
Khan, Mohammad Arifin Rahman. “Analysis the channel allocation for removing the traffic problems from the roaming systems.” International Journal of Advanced Research in Engineering and Applied Sciences 3.7,74–86 (2014).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dhyani, I., Goel, N., Sharma, G., Mallick, B. (2017). A Reliable Tactic for Detecting Black Hole Attack in Vehicular Ad Hoc Networks. In: Bhatia, S., Mishra, K., Tiwari, S., Singh, V. (eds) Advances in Computer and Computational Sciences. Advances in Intelligent Systems and Computing, vol 553. Springer, Singapore. https://doi.org/10.1007/978-981-10-3770-2_31
Download citation
DOI: https://doi.org/10.1007/978-981-10-3770-2_31
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3769-6
Online ISBN: 978-981-10-3770-2
eBook Packages: EngineeringEngineering (R0)