119
Views
36
CrossRef citations to date
0
Altmetric
Articles

Design and analysis of an improved AODV protocol for black hole and flooding attack in vehicular ad-hoc network (VANET)

&

References

  • Raya, M., & Hubaux, J. The security of vehicular ad hoc networks. In Proceedings of the 3rdACM workshop on the security of ad hoc and sensor networks, SASN-2005, pp. 1–11 (2005).
  • Nayyar, A., & Singh, R. A comprehensive review of simulation tools for wireless sensor networks (WSNs). Journal of Wireless Networking and Communications, 5(1), 19-47 (2015).
  • Dhaka, V. S., Poonia, R. C., & Raja, L. The Realistic Mobility Evaluation of Vehicular Ad-Hoc Network for Indian Automotive Networks. International Journal of Ad hoc, Sensor & Ubiquitous Computing, 5(2), 1 (2014).
  • Dhaka, V. S., Poonia, R. C., & Raja, L. A literature review on dedicated short range communication for intelligent transport. International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), 3(9), 1066-1071 (2013).
  • He, Y., Yu, F. R., Wei, Z., & Leung, V. Trust management for secure cognitive radio vehicular ad hoc networks. Ad Hoc Networks, 86, pp. 154-165 (2019). doi: 10.1016/j.adhoc.2018.11.006
  • Yao, X., Zhang, X., Ning, H., & Li, P. Using trust model to ensure reliable data acquisition in VANETs, Ad Hoc Networks, 55, pp. 107-118 (2017). doi: 10.1016/j.adhoc.2016.10.011
  • Salehi, Mahmood, Azzedine Boukerche, and Amir Darehshoorzadeh. Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks,Ad Hoc Networks, 50: pp. 88-101 (2016). doi: 10.1016/j.adhoc.2016.07.004
  • Singh, V., Poonia, R. C., Raja, L., Sharma, G., & Trivedi, N. K. Source Redundancy Management and Host Intrusion Detection in Wireless Sensor Networks. Recent Patents on Computer Science, 12(1) (2019).
  • Raksha Mehra, Gourav Shrivastava, Amrit Suman, NAODV A Routing Protocol to Prevent Wormhole Attack in Ad-hoc Network, HCTL Open Int. J. of Technology Innovations and Research, Volume 3, e-ISSN: 2321-1814 (2013), ISBN (Print): 978-1-62776-443-8.
  • Kaushik, Ramesh C. Poonia & Sunil Kumar Khatri. Comparative study of various protocols of DDS, Journal of Statistics and Management Systems, 20:4, pp. 647-658 (2017), DOI: 10.1080/09720510.2017.1395184
  • Ramesh C. Poonia (2018). Integration of traffic and network simulators for vehicular ad-hoc networks, Journal of Information and Optimization Sciences, 39:7, pp. 1583-1589, DOI: 10.1080/02522667.2017.1406580
  • Manish Kumar, Vanita Jain, Achin Jain, Uttam Singh Bisht & Neha Gupta. Evaluation of black hole attack with avoidance scheme using AODV protocol in VANET, Journal of Discrete Mathematical Sciences and Cryptography, 22:2, pp. 277-291 (2019). doi: 10.1080/09720529.2019.1585635
  • Gupta, S., Poonia, R. C., Singh, V., & Raja, L. Tier Application in Multi-Cloud Databases to Improve Security and Service Availability. In Handbook of Research on Cloud Computing and Big Data Applications in IoT (pp. 82-93) (2019). IGI Global.
  • Mr.Ankit Kumar, Dr.Dinesh Goyal, Mr.Pankaj Dadheech, A Novel Framework for Performance Optimization of Routing Protocol in VANET Network, Journal of Advanced Research in Dynamical & Control Systems, Vol. 10, 02-Special Issue, 2018, pp-2110-2121 (2018). ISSN: 1943-023X.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.