Generic placeholder image

Recent Patents on Engineering

Editor-in-Chief

ISSN (Print): 1872-2121
ISSN (Online): 2212-4047

General Research Article

A Novel Scheme for Prevention and Detection of Black Hole & Gray Hole Attack in VANET Network

Author(s): Ankit Kumar*, Pankaj Dadheech, Dinesh Goyal, Pawan K. Patidar, S.R. Dogiwal and Neha Janu

Volume 15, Issue 2, 2021

Published on: 12 May, 2020

Page: [263 - 274] Pages: 12

DOI: 10.2174/1872212114999200512120211

Price: $65

Abstract

Background and Objective: VANET is an application used for the intelligent transportation system which improves traffic safety as well as its efficiency. We have reviewed the patents related to vehicular Ad-Hoc Network and their issue. To avoid road accidents a lot of information we need in advance. This paper has developed a framework which minimizes the possibilities of the black hole attack in VANET. According to us, there are two possible solutions for this purpose. The first is to see alternative routes for the same destination. The second compromises of exploiting the packet header's packet sequence number which is always included in each packet header. The second procedure is able to verify that 72% to 96% of route which is discovered depends on pause time t which is the minimum time for delay in the packet transition in the network when AODV routing protocol is used for packet transitions.

Methods: In this approach we used twenty five nodes. In which two are source nodes, two are destination nodes and four are invaders. We analyses the effects of these invaders on the network and studied their behavior on the network on different time-period to analyses if invader is black hole invader or the invader is Gray hole. To calculate send packets, received packets, packet drop, packet drop fraction, end-to-end delay, AWK script is used.

Results and Discussion: Through this work we simulate the result in the time frame of 100 ms manually and on graph the time frame is not available so the time frame is processed by trace graph accordingly. In the simulation we took 25 nodes initially and start the procedure to send the packets over nodes. At first packets are broadcasted to every node to find out the location of nodes and packets are dropped once the path is established and then the packets are transferred to the path established over network.

Conclusion: VANET is seen as the future of the network, and the need to secure it is crucial for the safety of it from various attacks. A secured VANET is essential for the future of the network and also currently acquiring this network will also boost the possibility of VANET to develop and reduce the time of its implementation in the real world scenarios. In this work, we have designed a framework and analyzed it for the possible attacks by the black hole, and Gray Hole attacks and also effects of the attacks are recorded and studied by practically using it. After analyzing it’s concluded that the attacks can be implemented and detected over the network.

Keywords: MANET, VANET, authentication, privacy, security services, obu, black hole attack, gray hole attack.

Graphical Abstract

[1]
V. Meadows, and S.N. Zellner, Method and system for monitoring vehicular traffic using a wireless communications network U.S. Patent No. 6,690,292, 2004..
[2]
A. Nayyar, and R. Singh, "A comprehensive review of simulation tools for wireless sensor networks (WSNs)", J. Wireless Netw. Commun., vol. 5, no. 1, pp. 19-47, 2015.
[3]
C. Harsch, A. Festag, and P. Papadimitratos, "Secure position-based routing for VANETs", Proceedings of IEEE 66th vehicular technology conference (VTC-2007), 2007pp. 26-30
[http://dx.doi.org/10.1109/VETECF.2007.22]
[4]
K. Dixit, K.K. Joshi, and N. Joshi, "A Novel Approach of Trust Based Routing to Select Trusted Location in AODV Based VANET: A Survey", Int. J. Hybrid Info. Technol., vol. 8, no. 7, pp. 335-344, 2015.
[http://dx.doi.org/10.14257/ijhit.2015.8.7.30]
[5]
Y. He, F.R. Yu, Z. Wei, and V. Leung, "Trust management for secure cognitive radio vehicular ad hoc networks", Ad Hoc Netw., vol. 86, pp. 154-165, 2019.
[http://dx.doi.org/10.1016/j.adhoc.2018.11.006]
[6]
X. Yao, X. Zhang, H. Ning, and P. Li, "Using trust model to ensure reliable data acquisition in VANETs", Ad Hoc Netw., vol. 55, pp. 107-118, 2017.
[http://dx.doi.org/10.1016/j.adhoc.2016.10.011]
[7]
M. Salehi, A. Boukerche, and A. Darehshoorzadeh, "Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks", Ad Hoc Netw., vol. 50, pp. 88-101, 2016.
[http://dx.doi.org/10.1016/j.adhoc.2016.07.004]
[8]
B. Lipinski, W. Mazurczyk, K. Szczypiorski, and P. Smietanka, "Towards Effective Security Framework for Vehicular Ad-Hoc Networks", J. Adv. Comput. Netw., vol. 3, no. 2, pp. 134-140, 2015.
[http://dx.doi.org/10.7763/JACN.2015.V3.155]
[9]
A. Malik, and B. Pandey, "Asymmetric encryption based secure and efficient data gathering technique in VANET", 7th International Conference on Cloud Computing, Data Science & Engineering – Confluence, 2017
[http://dx.doi.org/10.1109/CONFLUENCE.2017.7943177]
[10]
R. Mehra, G. Shrivastava, and A. Suman, NAODV A Routing Protocol to Prevent Wormhole Attack in Ad-hoc Network HCTL Open Int. J. Technol. Innov. Res., HCTL Open IJTIR, vol. 3, 2013.
[11]
H. Liu, Y. Chen, H. Tian, T. Wang, and Y. Cai, "A novel secure message delivery and authentication method for vehicular ad hoc networks", First IEEE International Conference on Computer Communication and the Internet (ICCCI), 2016
[http://dx.doi.org/10.1109/CCI.2016.7778893]
[12]
H. Barkouk, and E-N. El Mokhta, "A New Alert Message Dissemination Protocol for VANETs and Simulation in a Real Scenario", International Conference on Information Technology and Communication Systems, 2018
[http://dx.doi.org/10.1007/978-3-319-64719-7_18]
[13]
M. Kalinin, V. Krundyshev, P. Zegzhda, and V. Belenko, "Network security architectures for VANET Proceedings of the 10th International Conference on Security of Information and Networks - SIN ’17, 2017",
[14]
H. Zhong, J. Wen, J. Cui, and S. Zhang, "Efficient conditional privacy-preserving and authentication scheme for secure service provision in VANET", Tsinghua Sci. Technol., vol. 21, no. 6, pp. 620-629, 2016.
[http://dx.doi.org/10.1109/TST.2016.7787005]
[15]
Mr. Ankit Kumar, A Novel Framework for Performance Optimization of Routing Protocol in VANET Network J. Adv. Res. Dynam. Control Sys., vol. 10, no. 02-Special Issue, pp. 2110-2121, 2018. ISSN: 1943-023X..
[16]
"Prashant Dixit*, Anuradha Pillai and Rahul Rishi, “QoS Enabled Improved Location Aided Routing (QEILA)", Recent Pat. Eng., vol. 13, p. 28, 2019.
[http://dx.doi.org/10.2174/1872212112666180601090209]
[17]
A. Chugh, and S. Panda, "Energy Efficient Techniques in Wireless Sensor Networks", Recent Pat. Eng., vol. 13, p. 13, 2019.
[http://dx.doi.org/10.2174/1872212112666180731114046]
[18]
N. Sharma, and A. Nayyar, "A comprehensive review of cluster based energy efficient routing protocols for wireless sensor networks", Int. J. Appl. Innov. Eng. Manag., vol. 3, no. 1, pp. 441-453, 2014. [IJAIEM
[19]
A. Kumar, P. Dadheech, V. Singh, L. Raja, and R.C. Poonia, "An Enhanced Quantum Key Distribution Protocol for Security Authentication", J. Discrete Math. Sci. Cryptography, vol. 22, no. 4, pp. 499-507, 2019.
[http://dx.doi.org/10.1080/09720529.2019.1637154]]
[20]
Mr. Pankaj Dadheech, A Scalable Data Processing Using Hadoop & MapReduce for Big Data J. Adv. Res. Dynam. Control Sys., vol. 10, no. 02-Special Issue, pp. 2099-2109, 2018..
[21]
"T. Bhatia*, A.K. Verma, G. Sharma and S. Bala, “A Novel Defense Scheme against Flooding Attack in Mobile Adhoc Networks", Recent Pat. Eng., vol. 12, p. 15, 2018.
[http://dx.doi.org/10.2174/1872212111666170614115605]
[22]
A. Nayyar, and S. Sharma, "A Survey on Coverage and Connectivity Issues Surrounding Wireless Sensor Network", International J. Res. Comput. Commun. Technol., vol. 3, no. 1, pp. 111-118, 2014. [IJRCCT
[23]
A. Nayyar, and R. Singh, "Simulation and performance comparison of ant colony optimization (ACO) routing protocol with AODV, DSDV, DSR routing protocols of wireless sensor networks using NS-2 simulator", American J. Intelligent Sys., vol. 7, no. 1, pp. 19-30, 2017.
[24]
V. Puri, A. Nayyar, and L. Raja, "Agriculture drones: A modern breakthrough in precision agriculture", J. Stat. Manag. Sys., vol. 20, no. 4, pp. 507-518, 2017.
[http://dx.doi.org/10.1080/09720510.2017.1395171]
[25]
V.S. Dhaka, R.C. Poonia, and L. Raja, "“The Realistic Mobility Evaluation of Vehicular Ad-Hoc Network for Indian Automotive Networks”, International Journal of Ad hoc", Sensor & Ubiquitous Computing, vol. 5, no. 2, p. 1, 2014.
[http://dx.doi.org/10.5121/ijasuc.2014.5201]
[26]
L. Raja, V. S. Dhaka, and R. C. Poonia, The Performance based Evaluation of Models and Routing Protocols for Indian Automotive Networks Communications on Applied Electronics (CAE), vol. 3, no. 1, pp. 6-11..
[http://dx.doi.org/10.5120/cae2015651598]
[27]
A. Kumar, P. Dadheech, V. Singh, R.C. Poonia, and L. Raja, "An Improved Quantum Key Distribution Protocol for Verification", J. Discrete Math. Sci. Cryptography, vol. 22, no. 4, pp. 491-498, 2019.
[http://dx.doi.org/10.1080/09720529.2019.1637153]
[28]
R.C. Poonia, and L. Raja, On-Demand Routing Protocols for Vehicular Cloud Computing”, Vehicular Cloud Computing for Traffic Management and Systems.. IGI Global, 2018, pp. 151-177..
[http://dx.doi.org/10.4018/978-1-5225-3981-0.ch007]
[29]
Md. Prabhat Kumar, "Zafarul Quadri, Kavita Sharma*, Nhu Nguyen Gia and Preetish Ranjan, “Persistent Cellular Telephony: Enhanced Secure GSM Architecture", Recent Pat. Eng., vol. 12, p. 23, 2018.
[http://dx.doi.org/10.2174/1872212111666170808104744]
[30]
P. Dadheech, D. Goyal, S. Srivastava, and C.M. Choudhary, "An Efficient Approach for Big Data Processing Using Spatial Boolean Queries", J. Stat. Manag. Sys., vol. 21, no. 4, pp. 583-591, 2018. [JSMS
[http://dx.doi.org/10.1080/09720510.2018.1471258]
[31]
A. Kumar, and M. Sinha, "Overview on vehicular ad hoc network and its security issues", International Conference on Computing for Sustainable Global Development (INDIACom), 2014pp. 792-797
[http://dx.doi.org/10.1109/IndiaCom.2014.6828071]
[32]
X. Fafoutis, A. Di Mauro, M.D. Vithanage, and N. Dragoni, "Receiver-initiated medium access control protocols for wireless sensor networks", Comput. Netw., vol. 76, pp. 55-74, 2015.
[http://dx.doi.org/10.1016/j.comnet.2014.11.002]
[33]
S. Kumar, M. Goyal, D. Goyal, and R.C. Poonia, "Routing Protocols and Security Issues in MANET", International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions), Dubai, 2017, pp. 818-824
[http://dx.doi.org/10.1109/ICTUS.2017.8286119]
[34]
V.K. Sagtani, and S. Kumar, "Modern Approach to Enhance Routing Recitation in MANET", Int. J. Emerg. Technol. Adv. Eng., vol. 4, no. 7, p. 265, 2014.

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy