International Journal of Computer Network and Information Security(IJCNIS)
ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)
Published By: MECS Press
IJCNIS Vol.4, No.11, Oct. 2012
Performance Analysis of Black Hole Attack in Vanet
Full Text (PDF, 565KB), PP.47-54
Black hole attack in Vehicular Ad Hoc Network is major problem related with the field of computer networking. In this paper we present the performance analysis of the black hole attack in Vehicular Ad Hoc Network. We elaborate the different types of attacks and their depth in ad hoc network. The performance metric is taken for the evaluation of attack which depends on a packet end to end delay, network throughput and network load. The delay, throughput and load are simulated by the help of OPNET 14.5 modeler. The simulation setup comprises of 30 Vehicular nodes moving with constant speed of 10 meter per second. The data rate of Vehicular nodes is 11 Mbps with default transmitting power of 0.005 watts. With On Demand Distance Vector Routing and Optimized Link State Routing the malicious node buffer size is lowered to a level which increase packet drops.
Cite This Paper
Vimal Bibhu,Kumar Roshan,Kumar Balwant Singh,Dhirendra Kumar Singh,"Performance Analysis of Black Hole Attack in Vanet", IJCNIS, vol.4, no.11, pp.47-54, 2012.
D. Djenouri, L. Khelladi and N. Badache, A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks, IEEE Communication Surveys & Tutorials, Vol. 7, No. 4, 4th Quarter 2005.
E. A. Mary Anita and V. Vasudevan, Performance Evaluation of mesh based multicast reactive routing protocol under black hole attack, IJCSIS, Vol.3, No.1, 2009.
Al-Shurman, M. Yoo, S. Park, Black hole attack in Mobile Ad Hoc Networks, ACM Southeast Regional Conference, 2004, pp. 96-97.
S. Buchegger, C. Tissieres, and J. Y. Le Boudec. A test bed for misbehavior detection in mobile ad-hoc networks –how much can watchdogs really do. Technical Report IC/2003/72, EPFL-DI-ICA, November 2003. Available on:citeseer.ist.psu.edu/645200.html.
C. Srdjan, B. Levente, and H. Jean-Pierre, Self- Organized Public-Key Management for Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, vol. 2, pp. 52-64, 2003.
Satoshi Kurosawa; Hidehisa Nakayama; Nei Kato; Abbas Jamalipour; and Yoshiaki Nemoto (2007). Detecting blackhole attack on AODV based mobile Ad hoc networks by dynamic learning method. International Journal of Network Security, 5(3), 338–346.
Chen Hongsong; Ji Zhenzhou; and Hu Mingzeng (2006). A novel security agent scheme for AODV routing protocol based on thread state transition. Asian Journal of Information Technology, 5(1), 54-60.
Saini A, Kumar H (2010) Comparison between Various Black Hole Detection Techniques in VANET. Paper presented at the National Conference on Computational Instrumentation, Chandigarh, India, 19-20 March 2010
Deng H, Li W, Agrawal DP (2002) Routing Security in Wireless Ad-hoc Networks. IEEE Communications Magazine 40(10):70–75. doi: 10.1109/MCOM.2002.1039859
Sun B, Guan Y, Chen J, Pooch UW (2003) Detecting Black-hole Attack in Mobile Ad Hoc Networks. Paper presented at the 5th European Personal Mobile Communications Conference, Glasgow, United Kingdom, 22-25 April 2003
Dokurer, Semih "Simulation of Black hole attack in wireless Ad-Hoc networks" Master's thesis, Atihm University, September 2006.
Santoshi Kurosawal, hidehisa, Nakayama, Nei Kato, Abbas Jamalipour and Yoshiaki Nemoto. "Detecting Blackhole Attack on AODV – based Mobile Ad Hoc Networks by Dynamic Learning Method" in International Journal of Network Security, Vol.5, No.3, pp.338-346, Nov.2007.