2021
DOI: 10.1007/s11277-021-09390-3
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Mitigation of Smart Blackhole and Gray Hole Attacks in VANET Using Dynamic Time Warping

Abstract: VANET topology is highly dynamic, wherein the vehicles frequently move across locations. Due to the continually changing topology and lack of security infrastructure, routing protocols in VANET are vulnerable to several attacks. In this paper, we focus on the black hole and the gray hole attacks due to its severity. In black hole and gray hole attacks, the attacker gains access to the wireless network and drops the received packets fully/ selectively that impacts on the safety applications of VANET. This paper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(14 citation statements)
references
References 41 publications
(72 reference statements)
0
14
0
Order By: Relevance
“…In this model, the periodic exchange of trust values among various nodes results in a huge routing overhead. Arun et al [32] proposed the SBGM (Smart Black-hole and Gray-hole Mitigation) mechanism based on the Dynamic Time Warping (DTW) technique. The RSU is deployed in the promiscuous mode that observes the flow of packets from each vehicle.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In this model, the periodic exchange of trust values among various nodes results in a huge routing overhead. Arun et al [32] proposed the SBGM (Smart Black-hole and Gray-hole Mitigation) mechanism based on the Dynamic Time Warping (DTW) technique. The RSU is deployed in the promiscuous mode that observes the flow of packets from each vehicle.…”
Section: Related Workmentioning
confidence: 99%
“…Reviewing the relevant literature critically, it is evident that there are many limitations in the existing approaches. For example, the majority of these approaches [15], [30], [32] rely on additional IDS and control packets, which cause excessive routing overhead and delay. Similarly, approaches like [22], [29], [31] are dependent on clustering, trust value, and cryptographic techniques.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Researchers have proposed some works in detecting and mitigating Gray Hole and Sybile attacks in VANET that, as FANET, represent a particular type of MANET where the mobile nodes are vehicles or drones, respectively. For example, in [19] the authors have proposed a study focused on the detection of Gray Hole attacks in a vehicular network providing a solution mechanism called Smart Black Hole and Gray Hole Mitigation (SBGM) using a time series analysis of the dropped packets of each node based on Dynamic Time Warping able to improve the detection accuracy in SBGM. Also in [20], a Gray Hole attack aimed at disrupting traffic between cars and on the roadside in the field of autonomous and connected vehicles (ACVs), which represents a critical environment, is presented.…”
Section: Gray Hole and Sybil Attacks And Mitigationsmentioning
confidence: 99%
“…In order to effectively mitigate attack severity and ensure the security of VCN, this section categorizes and summarizes the corresponding solutions, as shown in Figure 6. Techniques based on thresholds, trust, encryption, and machine learning are frequently used to combat routing attacks [31]. The threshold-based detection approach identifies the attack behavior by observing the packet drops or sequence number values in a certain time period.…”
Section: B Security Solutionsmentioning
confidence: 99%