We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Black Hole Attack Prevention and Detection in VANET using Modified DSR Protocol

by A. Malathi, N. Sreenath
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 168 - Number 7
Year of Publication: 2017
Authors: A. Malathi, N. Sreenath
10.5120/ijca2017914432

A. Malathi, N. Sreenath . Black Hole Attack Prevention and Detection in VANET using Modified DSR Protocol. International Journal of Computer Applications. 168, 7 ( Jun 2017), 27-30. DOI=10.5120/ijca2017914432

@article{ 10.5120/ijca2017914432,
author = { A. Malathi, N. Sreenath },
title = { Black Hole Attack Prevention and Detection in VANET using Modified DSR Protocol },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2017 },
volume = { 168 },
number = { 7 },
month = { Jun },
year = { 2017 },
issn = { 0975-8887 },
pages = { 27-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume168/number7/27888-2017914432/ },
doi = { 10.5120/ijca2017914432 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:15:31.713674+05:30
%A A. Malathi
%A N. Sreenath
%T Black Hole Attack Prevention and Detection in VANET using Modified DSR Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 168
%N 7
%P 27-30
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Vehicular Ad hoc Network is one of the interesting and attractive topics in the recent years. It has a potential to achieve intelligent inter vehicle communication for the benefit of the vehicle user. The VANET has lot of challenges. These decentralized dynamic networks require a secure communication. These networks are vulnerable to various attacks. In this paper the security features of routing protocols and about the black hole attacks are examined and an enhanced DSR algorithm called MDSR protocol to detect and prevent from black hole attack is proposed. The simulation is performed in NS2. The simulation result ensures that the attack detection by using Modified DSR (MDSR) protocol for message authentication provides a secured communication.

References
  1. Yi S, Naldurg P, Kravets R. Security-aware ad hoc routing for wireless networks. In: Proc. 2nd ACM symp. mobile Ad Hoc networking and computing (Mobihoc‟01), Long Beach, CA, October. 2001. p. 299–302.
  2. Sanzgiri Kimaya, Dahill B. A secure routing protocol for Ad hoc networks. In:10th IEEE international conference on network protocols (ICNP‟ 02). 2002. p.78–87. Nov.
  3. Hu YC, Johnson DB, Perrig A. SEAD: secure efficient distance vector routing for mobile wireless Ad Hoc networks. Ad Hoc Networks J 2003;1:175–92.
  4. Yih-Chun, Perrig Adrian, Johnson David B. Ariadne: a secure on- demand routing protocol for AdHoc networks. In: MobiCom’02 proceedings of the 8th annual international conference on mobile computing and networking. 2002. p. 12–23.
  5. Shurman MA, Yoo SM, Park S. Black hole attack in mobile Ad Hoc networks. In: ACM Southeast Regional Conference. 2004. p. 96–7.
  6. Dokurer Semih, Erten YM, Acar Can Erkin. Performance analysis of ad-hoc networks under black hole attacks. In: Southeast con. proceedings. IEEE; 2007.p. 148–53.
  7. Raj Payal N, Swadas Prashant B. DPRAODV: a dynamic learning system against black hole Attack in AODV based manet. Int J Comput Sci Issues 2009;2:54–9.
  8. Kurosawa Satoshi et al. Detecting black hole attack on AODV-based mobile Ad Hoc networks by dynamic learning method. Int J Network Security 2007;5(3):338–46. Nov.
  9. Mistry NH, Jinwala DC, Zaveri MA. MOSAODV: solution to secure AODV againstblack hole attack. (IJCNS) Int J Comput Network Security 2009;1(3). December.
  10. Hu, Y., and Maltz, D. The Dynamic Source Routing Protocol (DSR) for Mobile Ad hoc Networks for IPv4. RFC 4728, February 2007, pp. 2-100.
Index Terms

Computer Science
Information Sciences

Keywords

VANET security AODV DSR Black Hole attack Packet delivery Ratio End-to-end delay