Abstract
Background and Objective: VANET is an application used for the intelligent transportation system which improves traffic safety as well as its efficiency. We have reviewed the patents related to vehicular Ad-Hoc Network and their issue. To avoid road accidents a lot of information we need in advance. This paper has developed a framework which minimizes the possibilities of the black hole attack in VANET. According to us, there are two possible solutions for this purpose. The first is to see alternative routes for the same destination. The second compromises of exploiting the packet header's packet sequence number which is always included in each packet header. The second procedure is able to verify that 72% to 96% of route which is discovered depends on pause time t which is the minimum time for delay in the packet transition in the network when AODV routing protocol is used for packet transitions.
Methods: In this approach we used twenty five nodes. In which two are source nodes, two are destination nodes and four are invaders. We analyses the effects of these invaders on the network and studied their behavior on the network on different time-period to analyses if invader is black hole invader or the invader is Gray hole. To calculate send packets, received packets, packet drop, packet drop fraction, end-to-end delay, AWK script is used.
Results and Discussion: Through this work we simulate the result in the time frame of 100 ms manually and on graph the time frame is not available so the time frame is processed by trace graph accordingly. In the simulation we took 25 nodes initially and start the procedure to send the packets over nodes. At first packets are broadcasted to every node to find out the location of nodes and packets are dropped once the path is established and then the packets are transferred to the path established over network.
Conclusion: VANET is seen as the future of the network, and the need to secure it is crucial for the safety of it from various attacks. A secured VANET is essential for the future of the network and also currently acquiring this network will also boost the possibility of VANET to develop and reduce the time of its implementation in the real world scenarios. In this work, we have designed a framework and analyzed it for the possible attacks by the black hole, and Gray Hole attacks and also effects of the attacks are recorded and studied by practically using it. After analyzing it’s concluded that the attacks can be implemented and detected over the network.
Keywords: MANET, VANET, authentication, privacy, security services, obu, black hole attack, gray hole attack.
Graphical Abstract
[http://dx.doi.org/10.1109/VETECF.2007.22]
[http://dx.doi.org/10.14257/ijhit.2015.8.7.30]
[http://dx.doi.org/10.1016/j.adhoc.2018.11.006]
[http://dx.doi.org/10.1016/j.adhoc.2016.10.011]
[http://dx.doi.org/10.1016/j.adhoc.2016.07.004]
[http://dx.doi.org/10.7763/JACN.2015.V3.155]
[http://dx.doi.org/10.1109/CONFLUENCE.2017.7943177]
[http://dx.doi.org/10.1109/CCI.2016.7778893]
[http://dx.doi.org/10.1007/978-3-319-64719-7_18]
[http://dx.doi.org/10.1109/TST.2016.7787005]
[http://dx.doi.org/10.2174/1872212112666180601090209]
[http://dx.doi.org/10.2174/1872212112666180731114046]
[http://dx.doi.org/10.1080/09720529.2019.1637154]]
[http://dx.doi.org/10.2174/1872212111666170614115605]
[http://dx.doi.org/10.1080/09720510.2017.1395171]
[http://dx.doi.org/10.5121/ijasuc.2014.5201]
[http://dx.doi.org/10.5120/cae2015651598]
[http://dx.doi.org/10.1080/09720529.2019.1637153]
[http://dx.doi.org/10.4018/978-1-5225-3981-0.ch007]
[http://dx.doi.org/10.2174/1872212111666170808104744]
[http://dx.doi.org/10.1080/09720510.2018.1471258]
[http://dx.doi.org/10.1109/IndiaCom.2014.6828071]
[http://dx.doi.org/10.1016/j.comnet.2014.11.002]
[http://dx.doi.org/10.1109/ICTUS.2017.8286119]