Detection and Ignoring of Blackhole Attack in Vanets Networks

Detection and Ignoring of Blackhole Attack in Vanets Networks

Chaima Bensaid, Sofiane Boukli Hacene, Kamel Mohamed Faraoun
Copyright: © 2016 |Pages: 10
DOI: 10.4018/IJCAC.2016040101
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Vehicular networks or VANET announce as the communication networks of the future, where the mobility is the main idea. These networks should be able to interconnect vehicles. The optimal goal is that these networks will contribute to safer roads and more effective in the future by providing timely information to drivers and concerned authorities. They are therefore vulnerable to many types of attacks among them the black hole attack. In this attack, a malicious node disseminates spurious replies for any route discovery in order to monopolize all data communication and deteriorate network performance. Many studies have focused on detecting and isolating malicious nodes in VANET. In this paper, the authors present two mechanisms to detect this attack. The main goal is detecting as well as bypass cooperative black hole attack. The authors' approaches have been evaluated by the detailed simulation study with NS2 and the simulation results shows an improvement of protocol performance.
Article Preview
Top

2. The Aodv Routing Protocol

The AODV protocol is the most widely adopted and well known reactive routing protocol in which routes are created only when they are needed (Ochola EO & Eloff2011). The mobile devices or nodes in the network exchange the routing packets between them when they want to communicate with each other and maintain only these established routes (Ei Khin and Thandar 2014). The AODV routing protocol in an adaptation of the DSDV (Destination-Sequenced Distance Vector) protocol to get dynamic link conditions (E. Perkins & Elizabeth-Royer 2003). Whenever a node wants to send the data packet to another node, it checks its routing table. If it has a fresh route to the destination node, it uses that route to send the data packet. If it does not have a route or it is not fresh enough route, then the node starts the route discovery process. So, it broadcasts Route Request message (RREQ) to its neighbors. The intermediate nodes check whether it is the destination node or it has a fresh route to go to the destination node. If it is available, the intermediate node sends back Route Reply message (RREP) to the source node. Otherwise, it forwards the RREQ message to its neighbors by using flooding approach. This process is repeated until either the destination node or a node that has a fresh enough route to the destination is found. After finishing the route discovery process, the source and the destination node can be communicated and exchange packets between them. When any node detects a link break or failure, a Route Error (RERR) message is sent to all other nodes to notify the loss of link. Hello message is used for detecting and monitoring links to neighbors (Nital Mistry, Devesh.c 2010). Figure 1 illustrates the function of the routing protocol AODV.

Figure 1.

RREQ and RREP packets in AODV

IJCAC.2016040101.f01

External node can attack by following way (Mr. Ravi, Ms. Khushbu, 2005)(Y.-C. Hu, D.B. Johnson 2002).

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing