INFORMATION CHANGE THE WORLD

International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.4, No.11, Oct. 2012

Performance Analysis of Black Hole Attack in Vanet

Full Text (PDF, 565KB), PP.47-54


Views:277   Downloads:22

Author(s)

Vimal Bibhu,Kumar Roshan,Kumar Balwant Singh,Dhirendra Kumar Singh

Index Terms

VANET – Vehicular Ad Hoc Network, DOS – Denial of Service, MAC – Medium Access Control, OPNET – Operation Network, AODV – Ad Hoc On Demand Distance Vector Routing, RREQ – Route Request

Abstract

Black hole attack in Vehicular Ad Hoc Network is major problem related with the field of computer networking. In this paper we present the performance analysis of the black hole attack in Vehicular Ad Hoc Network. We elaborate the different types of attacks and their depth in ad hoc network. The performance metric is taken for the evaluation of attack which depends on a packet end to end delay, network throughput and network load. The delay, throughput and load are simulated by the help of OPNET 14.5 modeler. The simulation setup comprises of 30 Vehicular nodes moving with constant speed of 10 meter per second. The data rate of Vehicular nodes is 11 Mbps with default transmitting power of 0.005 watts. With On Demand Distance Vector Routing and Optimized Link State Routing the malicious node buffer size is lowered to a level which increase packet drops.

Cite This Paper

Vimal Bibhu,Kumar Roshan,Kumar Balwant Singh,Dhirendra Kumar Singh,"Performance Analysis of Black Hole Attack in Vanet", IJCNIS, vol.4, no.11, pp.47-54, 2012.

Reference

[1]D. Djenouri, L. Khelladi and N. Badache, A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks, IEEE Communication Surveys & Tutorials, Vol. 7, No. 4, 4th Quarter 2005.

[2]E. A. Mary Anita and V. Vasudevan, Performance Evaluation of mesh based multicast reactive routing protocol under black hole attack, IJCSIS, Vol.3, No.1, 2009.

[3]Al-Shurman, M. Yoo, S. Park, Black hole attack in Mobile Ad Hoc Networks, ACM Southeast Regional Conference, 2004, pp. 96-97.

[4]S. Buchegger, C. Tissieres, and J. Y. Le Boudec. A test bed for misbehavior detection in mobile ad-hoc networks –how much can watchdogs really do. Technical Report IC/2003/72, EPFL-DI-ICA, November 2003. Available on:citeseer.ist.psu.edu/645200.html.

[5]C. Srdjan, B. Levente, and H. Jean-Pierre, Self- Organized Public-Key Management for Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, vol. 2, pp. 52-64, 2003.

[6]Satoshi Kurosawa; Hidehisa Nakayama; Nei Kato; Abbas Jamalipour; and Yoshiaki Nemoto (2007). Detecting blackhole attack on AODV based mobile Ad hoc networks by dynamic learning method. International Journal of Network Security, 5(3), 338–346.

[7]Chen Hongsong; Ji Zhenzhou; and Hu Mingzeng (2006). A novel security agent scheme for AODV routing protocol based on thread state transition. Asian Journal of Information Technology, 5(1), 54-60.

[8]Saini A, Kumar H (2010) Comparison between Various Black Hole Detection Techniques in VANET. Paper presented at the National Conference on Computational Instrumentation, Chandigarh, India, 19-20 March 2010

[9]Deng H, Li W, Agrawal DP (2002) Routing Security in Wireless Ad-hoc Networks. IEEE Communications Magazine 40(10):70–75. doi: 10.1109/MCOM.2002.1039859

[10]Sun B, Guan Y, Chen J, Pooch UW (2003) Detecting Black-hole Attack in Mobile Ad Hoc Networks. Paper presented at the 5th European Personal Mobile Communications Conference, Glasgow, United Kingdom, 22-25 April 2003

[11]Dokurer, Semih "Simulation of Black hole attack in wireless Ad-Hoc networks" Master's thesis, Atihm University, September 2006.

[12]Santoshi Kurosawal, hidehisa, Nakayama, Nei Kato, Abbas Jamalipour and Yoshiaki Nemoto. "Detecting Blackhole Attack on AODV – based Mobile Ad Hoc Networks by Dynamic Learning Method" in International Journal of Network Security, Vol.5, No.3, pp.338-346, Nov.2007.