2022
DOI: 10.3390/s22051897
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Dynamic Solution for the Detection and Prevention of Black Hole Attack in VANETs

Abstract: Rapid and tremendous advances in wireless technology, miniaturization, and Internet of things (IoT) technology have brought significant development to vehicular ad hoc networks (VANETs). VANETs and IoT together play a vital role in the current intelligent transport system (ITS). However, a VANET is highly vulnerable to various security attacks due to its highly dynamic, decentralized, open-access medium, and protocol-design-related concerns. Regarding security concerns, a black hole attack (BHA) is one such th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 50 publications
(35 citation statements)
references
References 48 publications
0
35
0
Order By: Relevance
“…In this section, the SRMAD-AODV protocol is simulated using network simulator (NS2.34). Also, its efficiency is compared to the existing protocols by simulating them for black and gray-hole attacks detection: SRD-AODV [13], ITIM [14], ACIDS [19], ITAODV [20] and DPBHA [21]. This analysis is conducted according to the EED, PDR and throughput.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, the SRMAD-AODV protocol is simulated using network simulator (NS2.34). Also, its efficiency is compared to the existing protocols by simulating them for black and gray-hole attacks detection: SRD-AODV [13], ITIM [14], ACIDS [19], ITAODV [20] and DPBHA [21]. This analysis is conducted according to the EED, PDR and throughput.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Detection and prevention of a black hole attack (DPBHA) [21] were designed to protect and enhance the total confidentiality of the system by recognizing the blackhole attacks at an early phase of the path-finding task. It was depending on the determination of an adaptive threshold and the creation of the fake RREQ packet.…”
Section: Literature Surveymentioning
confidence: 99%
“…At the second level, the authorized RSUs aggregate the trust scores of each vehicle by a weighted average model and then use PBFT consensus to maintain a consortium blockchain. However, their applied Ad-hoc On-Demand Vector (AODV) protocol suffers from several security vulnerabilities and challenges that cannot be ignored [113]. Trust update is supported in both time-driven and event-driven ways.…”
Section: B Trust Value-based Bc-tmssmentioning
confidence: 99%
“…Two layers make up service-oriented VANET's architecture, as shown in [10] and [11]. A dedicated short-range communications (DSRC) standard is used for communications between vehicles and roadside infrastructure (V2I) or between vehicles themselves (V2V) in the first layer, which consists of the wireless communication devices in the RSUs and onboard vehicles [12]. A central authority (CA) and a service provider (SP) server make up the second layer [13].…”
Section: Literature Reviewmentioning
confidence: 99%