CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Performance analysis of Black Hole Attack on Vanet’s Reactive Routing Protocols

by Sonia, Padmavati
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 9
Year of Publication: 2013
Authors: Sonia, Padmavati
10.5120/12771-9819

Sonia, Padmavati . Performance analysis of Black Hole Attack on Vanet’s Reactive Routing Protocols. International Journal of Computer Applications. 73, 9 ( July 2013), 22-26. DOI=10.5120/12771-9819

@article{ 10.5120/12771-9819,
author = { Sonia, Padmavati },
title = { Performance analysis of Black Hole Attack on Vanet’s Reactive Routing Protocols },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 9 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 22-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number9/12771-9819/ },
doi = { 10.5120/12771-9819 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:39:39.287776+05:30
%A Sonia
%A Padmavati
%T Performance analysis of Black Hole Attack on Vanet’s Reactive Routing Protocols
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 9
%P 22-26
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Vehicle Ad-hoc Network is vulnerable to several attacks. One of the main attacks is the black hole attack which absorbs all the data packets in the network. In this paper, we have analyzed the performance of VANET in presence of black hole node by using different routing protocols AODV, DSR and AOMDV. This paper analyzed that which protocol is more vulnerable to the black hole attack and how much is the impact of attack on these three protocols. The main parameters considered are throughput, end-to-end delay and scalability. These parameters are compared for each routing protocol both using with black hole attack and without black hole attack. Simulation shows that DSR has high performance in terms of throughput, delay and scalability. The simulation setup comprises of 20 Vehicular nodes moving with constant speed of 10 meter per second. Simulation is carried using Network Simulator (NS2) 2. 35.

References
  1. C. Hernandez-Goya et al. , "Cooperation Requirements for Packet Forwarding in Vehicular Ad-Hoc Networks (VANETs)", ACM International Conference On Computer Systems and Technologies, 2009, pp. 1-6.
  2. Fan-Hsun Tseng, Li-Der Chou, and Han-Chieh Chao , "A Survey of black hole attacks in Wireless Mobile Ad Hoc Networks ", SPRINGER Human-centric Computing and Information Sciences, 2011, 22 Nov. 2011, pp. 1-16 .
  3. Vimal Bibhu et al. , "Performance Analysis of black hole attack in VANET ", International Journal Of Computer Network and Information Security, Oct. 2012, pp. 47-54.
  4. Ajay Rawat, Santosh Sharma, and Rama Sushil, "VANET: Security Attacks and its possible solution", Journal of Information and Operations Management , vol. 3, Issue 1, 2012, pp. 301-304 .
  5. Arti Sharma, Satendra Jain, "A Behavioral Study of AODV with and without black hole attack in MANET " , IJMER International Journal of Modern Engineering Research (IJMER) , vol. 1, Issue 2, pp. 391-395.
  6. P. Manickam et al. , "Performance Comparison of Routing Protocols in Mobile Ad Hoc Networks", International Journal of Wireless & Mobile Networking (IJWMN), vol. 3, no. 1, Feb. 2011 , pp. 98-106.
  7. M. Geetha et al. , "Performance Comparison and Analysis of AODV and DSDV Gateway Discovery Protocol in MANET ", International Journal of Engineering Science and Technology , vol. 2(11), 2010, pp. 6521-6531
  8. Anuj K. Gupta, Dr. Harsh Sadawarti, and Dr. Anil K. Verma , "Performance analysis of AODV, DSR & TORA Routing Protocols", IACSIT International Journal of Engineering and Technology, vol. 2, no. 2, April 2010, pp. 226-231
  9. Yih-Chun Hu and David B. Johnson, "Caching Strategies in On-Demand Routing Protocols for Wireless Ad hoc Networks", ACM 2000, pp. 1-12.
  10. Rajeev K. Shakya, NS2 Guide, 2010; http://home. iitk. ac. in/~rajeevs/research-ns2. html
  11. Mahesh K. Marina, Samir R. Das, "Ad Hoc On Demand Multipath Distance Vector Routing", Wireless Communication & Mobile Computing, 2006, pp. 969-980
  12. S. R. Biradar et al. , "Performance Evaluation and Comparison of AODV and AOMDV ", IJCSE , vol. 02, no. 02, 2010, pp. 373-377 .
  13. Sheenu Sharma, Roopam Gupta, "Simulation study of black hole attack in Mobile Ad Hoc Network", Journal of Engineering Science and Technology, vol. 4, no. 2, 2009, pp. 243-250.
  14. Uma Nagaraj, Dr. M. U. Kharat, Poonam Dhamal, "Study of Various Routing Protocols in VANET," IJCST International Journal of Computer Science & Technology, vol. 2, Dec. 2011, pp. 45-52 .
  15. Shaikhul Islam Chowdhury et. al. , "Performance Evaluation of Reactive Routing Protocols in VANET," IEEE, Oct. 2011, pp. 559-564.
Index Terms

Computer Science
Information Sciences

Keywords

VANET – Vehicle Ad-hoc Network AODV – Ad Hoc On Demand Distance Vector Routing DSR – Dynamic Source Routing RREQ – Route Request RREP – Route Reply AOMDV – Ad Hoc On Demand Multipath Distance Vector Routing black hole attack