2022
DOI: 10.35377/saucis...1175613
|View full text |Cite
|
Sign up to set email alerts
|

FA-AODV: Flooding Attacks Detection Based Ad Hoc On-Demand Distance Vector Routing Protocol for VANET

Abstract: Vehicular Ad-Hoc Networks (VANET) is anticipated to be the most effective way of increasing performance and safety in transportation in the near future. VANETs are the sub-branch of Ad-Hoc Networks which provide safety and comfort features together with related services for the vehicle operators. RREQ flood attack mostly encountered in the literature for security of VANET. Due to the nature of the reactive protocols, the AODV routing protocol is quite open to attack types such as flood attack. Flood attacks o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…This leads to the creation of fabricated and harmful routes. Once a route is established, the node must decide whether to transmit the packet to an unfamiliar destination or discard it [53,54]. Despite lacking a legitimate route to the destination, the black hole node successfully deceives the source node by falsely claiming to possess a valid, efficient, and recently updated route to the intended destination node [55].…”
Section: Methodsmentioning
confidence: 99%
“…This leads to the creation of fabricated and harmful routes. Once a route is established, the node must decide whether to transmit the packet to an unfamiliar destination or discard it [53,54]. Despite lacking a legitimate route to the destination, the black hole node successfully deceives the source node by falsely claiming to possess a valid, efficient, and recently updated route to the intended destination node [55].…”
Section: Methodsmentioning
confidence: 99%
“…This model uses a classification approach and is generic in nature. Numerous researchers have proposed a variety of algorithms, including trust-based algorithms [7] and cryptographic solutions [8]. If the attacker is an insider, trust-based solutions are useful.…”
Section: Related Workmentioning
confidence: 99%