2017
DOI: 10.26438/ijcse/v5i11.2532
|View full text |Cite
|
Sign up to set email alerts
|

Blackhole Attack and its effect on VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 3 publications
0
7
0
Order By: Relevance
“…Chadha et al [12] and Jain et al [13] developed a different approach that assumes the first received route reply is usually from a black-hole node and the subsequent route reply messages are safe. Alternatively, Upadhyaya et al [14] used the AODV protocol to implement three approaches for black-hole detection. The first approach is based on the awareness of neighbours each neighbour observes the trusted values of the others.…”
Section: Traditional Trusted Routing Approachesmentioning
confidence: 99%
“…Chadha et al [12] and Jain et al [13] developed a different approach that assumes the first received route reply is usually from a black-hole node and the subsequent route reply messages are safe. Alternatively, Upadhyaya et al [14] used the AODV protocol to implement three approaches for black-hole detection. The first approach is based on the awareness of neighbours each neighbour observes the trusted values of the others.…”
Section: Traditional Trusted Routing Approachesmentioning
confidence: 99%
“…This included protocols for message exchange, data formats, and transmission mechanism, incorporates security and privacy features to safeguard the integrity of communications and protect sensitive information exchanged in vehicular networks. This is crucial given the potential risks associated with unauthorized access and malicious attacks in VANETs [35].…”
Section: Vanets Historymentioning
confidence: 99%
“…Authors in [35] explored the architecture of VANETs into three major domains, creating a holistic framework that integrates the ad hoc, infrastructure, and in-vehicle domains to create a connected and intelligent vehicular communication system as shown in Figure 2.…”
Section: Figure 1 Basic Architecture Of Vanetsmentioning
confidence: 99%
“…Fabrication [2] Malware [10] Authenticity Sybil Attack [4] • Allowing the unauthorized user to access to network. GPS Spoofing [5] Replay Attack [3][8] Confidentiality Eavesdropping [10] • Access and share the vital information at network.…”
Section: Integritymentioning
confidence: 99%
“…GPS Spoofing [5] Replay Attack [3][8] Confidentiality Eavesdropping [10] • Access and share the vital information at network. ID Disclosure [12] Traffic Analyze [10] Availability DOS [4] • Making the vehicle out of service in the network and for other vehicle.…”
Section: Integritymentioning
confidence: 99%