73
Views
12
CrossRef citations to date
0
Altmetric
Articles

Evaluation of black hole attack with avoidance scheme using AODV protocol in VANET

, , , &

References

  • Buchegger S, BoudecLeJ. Performance analysis of the CONFIDANT protocol, in dynamic ad-hoc networks. In: proceeding of ACM international symposium on mobile ad-hoc networking and computing (MobiHoc’02); pp.202-236 (June 2002).
  • Michiardi, P. and Molva, R. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceeding of IFIP TC6/TC II Sixth Joint Working Conference on Communication and Multimedia Security, 107-121 (2002).
  • Marti S, Giuli TJ, Lai K, Baker M. Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of international conference on mobile computing and networking (MOBICOM’OO); pp. 255-265 (August 2000).
  • Pissinou, N., Ghosh, T. and Makki, K. Collaborative trust-based secure routing in multihop ad hoc networks. Networking (Athens, Greece 2004). Lecture Notes in Computer Science, vol. 3042, 1446-1451 (2004). doi: 10.1007/978-3-540-24693-0_133
  • Pedro B. VeUoso, Rafael P. Laufer, Daniel de O. Cunha, Otto Carlos M. B. Duarte, and Guy Pujolle. “Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model”. IEEE transactions on network and service management, vol. 7, no. 3, © 2011 IET (September 2010)
  • Venkat Balakrishnan, Vijay Varadharajan, Phillip Lues, Udaya Kiran Tupakula. Trust Enhanced Secure Mobile Ad-hoc Network Routing. 21st IEEE International Conference on AINA W 2007, Niagara Falls, Canada, pp. 27-33 (May 2007).
  • Wang, C., Yang, X. and Gao, Y. A Routing Protocol Based on Trust for MANETs. In Proceeding of Sixth Annual International Conference on Grid and Cooperative Computing (Bejing, China). LNCS, vol. 3795, 959–964 ( 2005).
  • HamssaHasrouny, Abed EllatifSamhat, Carole Bassil and Anis Laouitia, “VANet security challenges and solutions: A survey”, Vehicular Communications, Volume 7, ELSEVIER (January 2017)
  • Sparsh Sharma and Ajay Kaul, “A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud”, Vehicular Communications, Volume 12, ELSEVIER (January 2018)
  • Ikjot Saini, Sherif Saad, and Arunita Jaekel, “Identifying Vulnerabilities and Attacking Capabilities Against Pseudonym Changing Schemes in VANET”, International Conference on Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, Springer (2018)
  • Ghassan Samara and Yousef Al-Raba’nah, “Security Issues in Vehicular Ad Hoc Networks (VANET): A survey”, IJSAR (2015)
  • Xin Li, Zhiping Jia, Peng Zhang, Haiyang Wang, “A Trust-based MuItipath Routing Framework for Mobile Ad Hoc Networks”, 7th FSKD (2010).
  • C.E. Perkins, E.M.B. Royer and S.R. Das, “Ad Hoc On-Demand Distance Vector (AODV) routing”, RFC 3561 (July 2003).
  • Maxim Raya et al., “The Security of Vehicular Ad Hoc Networks”, SASN’05, Alexandria, Verginia, USA, pp. 11-21 (Nov 7 2005).
  • Yaseer Toor et al., “Vehicle Ad Hoc Networks: Applications and Related Technical issues”, IEEE Communications Surveys & Tutorials, vol 10, No 3, pp. 74-88 (3rd quarter 2008). doi: 10.1109/COMST.2008.4625806
  • Network Simulator Official Site for Package Distribution, web reference, http://www.isi.edu/nsnam
  • Clayson Celes, Fabrício A. Silva, Azzedine Boukerche, Rossana Maria de Castro Andrade and Antonio A. F. Loureiro, “Improving VANET Simulation with Calibrated Vehicular Mobility Traces”, IEEE Transactions on Mobile Computing, Volume: 16, Issue: 12, Dec. 1 (2017). doi: 10.1109/TMC.2017.2690636
  • Bo Yang, Ryo Yamamoto, Y. Tanaka, “Historical Evidence-Based Trust Management Strategy against Black Hole Attacks in MANET”, ICACT, pp. 394-399 (Feb. 2012).
  • S. Dokurer, Y. M. Erten, C. E. Acar, “Performance analysis of ad-hoc networks under black hole attacks”, Southeast Conf. Proceedings IEEE, pp. 148-153 (2007).
  • Mohammed Erritali, Bouabid El Ouahidi, “A Review and Classification of Various VANET Intrusion Detection Systems”, Security Days (JNS3), IEEE (2013)
  • Ujjval Jain, Ravikant, Jogendra Kumar. A Modified AODV (MA-ODV) against Black Hole attacks in MANETs. International Journal of Recent Research Aspects, 5(1): 100-105 (2018).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.