Abstract
Future communication systems have become the most commonly categorized as Mobile Ad hoc Networks and Vehicular Ad hoc Network (VANET). A VANET aims to protect vehicle drivers by initiating autonomous contact with nearby vehicles. Each vehicle operates as an intelligent mobile node in the ad-hoc network characterized by high mobility and complex networks. In VANET, malicious attacks impact cybersecurity, and such security attacks need to be detected and prevented. In VANET, any node can be determined as a router with the other nodes; a malicious node can interpret and modify the connection to the internet, thereby disrupting the network activity. VANETs are vulnerable to various security attacks such as blackhole attacks, Wormhole attacks, Denial-of-Service attacks, etc. This paper provides a novel cryptographic approach incorporated in AODV protocol to identify and eliminate the common attack strategy, called the blackhole attack in VANET, known as Secure AODV protocol (SAODV). This strategy store modifies the RREQ and RREP packets and stores the results in a lookup table. Any changes in these received packets and lookup tables imply that the intruder modifies the packet. The result analysis shows that the proposed approach is efficient in terms of various performance metrics, such as a higher packet delivery ratio of 95%, higher throughput of 87%, higher blackhole attack detection ratio of 98% compared to the existing approaches. It is inferred from the result that the proposed SAODV has a lower end-to-end delay of 75%, a lower collision rate of 71%, and a lower normalized routing load of 89%. Because of its better performance, the proposed SAODV approach will significantly impact the security application Intelligent Transport System.
Graphic abstract
Similar content being viewed by others
Data availability
This manuscript has no associated data.
References
Dhiviya, S., Malathy, S., & Monikha, M. (2018). Enhancing the network lifetime using on demand tree based routing protocol for manet. In 2018 4th International Conference on Computing Communication and Automation (ICCCA) (pp. 1–6). IEEE.
Rajasekar, V., Sathya, K., & Premalatha, J. (2018). Energy efficient cluster formation in wireless sensor networks based on multi objective bat algorithm. In 2018 International Conference on Intelligent Computing and Communication for Smart World (I2C2SW) (pp. 116–120). IEEE.
Rajasekar, V., Premalatha, J., & Sathya, K. (2021). Cancelable iris template for secure authentication based on random projection and double random phase encoding. Peer-to-Peer Networking and Applications, 14(2), 747–762.
Rawat, A., Sharma, S., & Sushil, R. (2012). Vanet: Security attacks and its possible solutions. Journal of Information and Operations Management, 3(1), 301.
Vanitha, K., Vanitha, C., Musthafa, M. M., & Malathy, S. (2020). Efficient semantic interrogation scheme over cryptographic data in cloud. In 2020 International Conference on Inventive Computation Technologies (ICICT) (pp. 271–275). IEEE.
Rani, P., Verma, S., Nguyen, G. N., et al. (2020). Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network. IEEE Access, 8, 121755–121764.
Premalatha, J., & Rajasekar, V. (2020). 9 industrial internet, Internet of Things: Integration and Security Challenges 135.
Hasrouny, H., Samhat, A. E., Bassil, C., & Laouiti, A. (2017). Vanet security challenges and solutions: A survey. Vehicular Communications, 7, 7–20.
Nithya, B., Abhinaya, S., & Lavanya, V. (2018). A party-based cluster head selection algorithm for wireless sensor networks. In 2018 International Conference on Computing, Power and Communication Technologies (GUCON) (pp. 327–332). IEEE.
Ucar, S., Ergen, S. C., & Ozkasap, O. (2015). Multihop-cluster-based ieee 802.11 p and lte hybrid architecture for vanet safety message dissemination. IEEE Transactions on Vehicular Technology, 65(4), 2621–2636.
Hezam, M. A., Junaid, A., Syed, A., Nazri, M., Warip, M., Fazira, K. N., Azir, K., & Nurul Hidayah, R. (2018). Classification of security attacks in vanet: A review of requirements and perspectives.
Hussain, R., Hussain, F., & Zeadally, S. (2019). Integration of vanet and 5g security: A review of design and implementation issues. Future Generation Computer Systems, 101, 843–864.
Yang, A., Weng, J., Cheng, N., Ni, J., Lin, X., & Shen, X. (2019). Deqos attack: Degrading quality of service in vanets and its mitigation. IEEE Transactions on Vehicular Technology, 68(5), 4834–4845.
Cui, J., Wu, D., Zhang, J., Xu, Y., & Zhong, H. (2019). An efficient authentication scheme based on semi-trusted authority in vanets. IEEE Transactions on Vehicular Technology, 68(3), 2972–2986.
Kumar, A., Varadarajan, V., Kumar, A., Dadheech, P., Choudhary, S. S., Kumar, V. A., et al. (2021). Black hole attack detection in vehicular ad-hoc network using secure aodv routing algorithm. Microprocessors and Microsystems, 80, 103352.
El-Semary, A. M., & Diab, H. (2019). Bp-aodv: Blackhole protected aodv routing protocol for manets based on chaotic map. IEEE Access, 7, 95197–95211.
Gurung, S., & Chauhan, S. (2018). A dynamic threshold based approach for mitigating black-hole attack in manet. Wireless Networks, 24(8), 2957–2971.
Hussain, R., Lee, J., & Zeadally, S. (2020). Trust in vanet: A survey of current solutions and future research opportunities, IEEE Transactions on Intelligent Transportation Systems.
Tyagi, P., & Dembla, D. (2017). Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (vanet). Egyptian Informatics Journal, 18(2), 133–139.
Baiad, R., Alhussein, O., Otrok, H., & Muhaidat, S. (2016). Novel cross layer detection schemes to detect blackhole attack against qos-olsr protocol in vanet. Vehicular Communications, 5, 9–17.
Yadav, K. A., & Vijayakumar, P. (2016). Vanet and its security aspects: A review. Indian Journal of Science and Technology, 9(18), 104–118.
Ali Zardari, Z., He, J., Zhu, N., Mohammadani, K. H., Pathan, M. S., Hussain, M. I., & Memon, M. Q. (2019). A dual attack detection technique to identify black and gray hole attacks using an intrusion detection system and a connected dominating set in manets. Future Internet, 11(3), 61.
Mohammadani, K. H., Memon, K. A., Memon, I., Hussaini, N. N., & Fazal, H. (2020). Preamble time-division multiple access fixed slot assignment protocol for secure mobile ad hoc networks. International Journal of Distributed Sensor Networks, 16(5), 1550147720921624.
Junejo, M. H., Ab Rahman, A. A.-H., Shaikh, R. A., Mohamad Yusof, K., Memon, I., Fazal, H., & Kumar, D. (2020). A privacy-preserving attack-resistant trust model for internet of vehicles ad hoc networks, Scientific Programming 2020.
Junejo, M. H., Ab Rahman, A.A.-H., Shaikh, R. A., Yusof, K. M., Kumar, D., & Memon, I. (2021). Lightweight trust model with machine learning scheme for secure privacy in vanet. Procedia Computer Science, 194, 45–59.
SathyaNarayanan, P. (2019). A sensor enabled secure vehicular communication for emergency message dissemination using cloud services. Digital Signal Processing, 85, 10–16.
Kumar, A., & Sinha, M. (2019). Design and development of new framework for detection and mitigation of wormhole and black hole attacks in vanet. Journal of Statistics and Management Systems, 22(4), 753–761.
Rajasekar, V., Premalatha, J., Sathya, K., & Saračević, M. (2021). Secure remote user authentication scheme on health care, iot and cloud applications: A multilayer systematic survey. Acta Polytechnica Hungarica, 18(3), 87–106.
Krishnamoorthi, S., Jayapaul, P., Dhanaraj, R. K., Rajasekar, V., Balusamy, B., & Islam, S. (2021). Design of pseudo-random number generator from turbulence padded chaotic map. Nonlinear Dynamics, 104(2), 1627–1643.
Velliangiri, S., Manoharn, R., Ramachandran, S., Krishnasamy, V., Rajasekar, V. R., Karthikeyan, P., Kumar, P., Abishek, K., & Dhanabalan, S. S. (2021). An efficient lightweight privacy preserving mechanism for industry 4.0 based on elliptic curve cryptography, IEEE Transactions on Industrial Informatics.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants performed by any of the authors.
Conflict of interests
The authors also declare that all contributions in this work are novel, and there are no similarities with our previous publications.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Dhanaraj, R.K., Islam, S.H. & Rajasekar, V. A cryptographic paradigm to detect and mitigate blackhole attack in VANET environments. Wireless Netw 28, 3127–3142 (2022). https://doi.org/10.1007/s11276-022-03017-6
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-022-03017-6