Back
 JIS  Vol.11 No.1 , January 2020
Real Time Vehicular Traffic Simulation for Black Hole Attack in the Greater Detroit Area
Abstract: Vehicular Ad-hoc Networks (VANETs) technology has recently emerged, and gaining significant attention from the research because it is promising technologies related to Intelligent Transportation System (ITSs) and smart cities. Wireless vehicular communication is employed to improve traffic safety and to reduce traffic congestion. Each vehicle in the ad-hoc network achieves as a smart mobile node categorized by high mobility and forming of dynamic networks. As a result of the movement of vehicles in a continuous way, VANETs are vulnerable to many security threats so it requisites capable and secure communication. Unfortunately, Ad hoc networks are liable to varied attacks like Block Hole attacks and Grey Hole attacks, Denial of service attacks, etc. Among the most known attacks are the Black Hole attacks while the malicious vehicle is able to intercept the data and drops it without forwarding it to the cars. The main goal of our simulation is to analyze the performance impact of black hole attack in real time vehicular traffic in the Greater Detroit Area using NS-2 and SUMO (Simulation of Urban). The simulation will be with AODV protocol.
Cite this paper: Alshammari, A. , Zohdy, M. , Debnath, D. and Corser, G. (2020) Real Time Vehicular Traffic Simulation for Black Hole Attack in the Greater Detroit Area. Journal of Information Security, 11, 71-80. doi: 10.4236/jis.2020.111004.
References

[1]   Zaidi, K. and Rajarajan, M. (2015) Vehicular Internet: Security & Privacy Challenges and Opportunities. Future Internet, 7, 257-275.
https://doi.org/10.3390/fi7030257

[2]   Alshammari, A., Zohdy, M., Debnath, D. and Corser, G. (2018) Classification Approach for Intrusion Detection in Vehicle Systems. Wireless Engineering and Technology, 9, 79-94. https://doi.org/10.4236/wet.2018.94007

[3]   Kaur, T. and Verma, A.K. (2012) Simulation and Analysis of AODV Routing Protocol in VANET. International Journal of Soft Computing and Engineering, 2, 293-301.

[4]   Jamali, S.B.S. (2015) A Survey over Black Hole Attack Detection in Mobile ad Hoc Network. International Journal of Computer Science and Network Security, 15, 44.

[5]   Miller, C. and Valasek, C. (2015) Remote Exploitation of an Unaltered Passenger Vehicle. Black Hat USA.

[6]   Van Glabbeek, R., Höfner, P., Portmann, M. and Tan, W.L. (2016) Modelling and Verifying the AODV Routing Protocol. Distributed Computing, 29, 279-315.
https://doi.org/10.1007/s00446-015-0262-7

[7]   Kumar, J., Kulkarni, M. and Gupta, D. (2013) Effect of Black Hole Attack on MANET Routing Protocols. International Journal of Computer Network and Information Security, 5, 64. https://doi.org/10.5815/ijcnis.2013.05.08

[8]   Singh, H. and Singh, M. (2013) Securing MANETs Routing Protocol under Black Hole Attack. International Journal of Innovative Research in Computer and Communication Engineering, 1, 808-813.

[9]   Shahabi, S., Ghazvini, M. and Bakhtiarian, M. (2016) A Modified Algorithm to Improve Security and Performance of AODV Protocol against Black Hole Attack. Wireless Networks, 22, 1505-1511.
https://doi.org/10.1007/s11276-015-1032-y

[10]   Abdulkader, Z.A., Abdullah, A., Abdullah, M.T. and Zukarnain, Z.A. (2017) LI-AODV: Lifetime Improving AODV Routing for Detecting and Removing Black-Hole Attack from VANET. Journal of Theoretical & Applied Information Technology, 95, 196-209.

[11]   Bibhu, V., Kumar, R., Kumar, B.S. and Singh, D.K. (2012) Performance Analysis of Black Hole Attack in VANET. International Journal of Computer Network and Information Security, 4, 47. https://doi.org/10.5815/ijcnis.2012.11.06

[12]   Alheeti, K.M.A., Gruebler, A. and McDonald-Maier, K.D. (2015) An Intrusion Detection System against Black Hole Attacks on the Communication Network of Self-Driving Cars. 6th International Conference on Emerging Security Technologies, Braunschweig, 3-5 September 2015, 86-91.
https://doi.org/10.1109/EST.2015.10

[13]   Grimaldo, J. and Martí, R. (2018) Performance Comparison of Routing Protocols in VANETs under Black Hole Attack in Panama City. International Conference on Electronics, Communications and Computers, Cholula, 126-132.
https://doi.org/10.1109/CONIELECOMP.2018.8327187

[14]   Ahmed, E.F., Abouhogail, R.A. and Yahya, A. (2014) Performance Evaluation of Blackhole Attack on Vanet’s Routing Protocols. Science and Engineering Research Support Society, 8, 39-54.

[15]   Afdhal, A., Muchallil, S., Walidainy, H. and Yuhardian, Q. (2017) Black Hole Attacks Analysis for AODV and AOMDV Routing Performance in VANETs. International Conference on Electrical Engineering and Informatics, Banda Aceh, 18-20 October 2017, 29-34. https://doi.org/10.1109/ICELTICS.2017.8253244

[16]   Gurung, S. and Chauhan, S. (2019) Performance Analysis of Black-Hole Attack Mitigation Protocols under Gray-Hole Attacks in MANET. Wireless Networks, 25, 975-988.

[17]   Moudni, H., Er-rouidi, M., Mouncif, H. and El Hadadi, B. (2016) Performance Analysis of AODV Routing Protocol in MANET under the Influence of Routing Attacks. International Conference on Electrical and Information Technologies, Tangiers, 4-7 May 2016, 536-542. https://doi.org/10.1109/EITech.2016.7519658

[18]   Deshmukh, S.R., Chatur, P.N. and Bhople, N.B. (2016) AODV-Based Secure Routing against Blackhole Attack in MANET. IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology, Bangalore, 20-21 May 2016, 1960-1964. https://doi.org/10.1109/RTEICT.2016.7808179

[19]   Kaushik, N. and Dureja, A. (2013) Performance Evaluation of Modified AODV against Black Hole Attack in MANET. European Scientific Journal, 9, 182-193.

[20]   Open Street Map.
https://www.openstreetmap.org

 
 
Top