Advertisement

A Fuzzy Logic-Based Control System for Detection and Mitigation of Blackhole Attack in Vehicular Ad Hoc Network

  • Ankit KumarEmail author
  • Pankaj Dadheech
  • Mahender Kumar Beniwal
  • Basant Agarwal
  • Pawan Kumar Patidar
Conference paper

Abstract

Vehicular ad hoc network enables the vehicle in the network to establish a connection when they required to communicate with the other vehicle in the network. These networks are the attraction point for many researchers for last five to six years because of its recompense. There are various researches surrounding VANET to increase its competence to put good use of the advantage these networks tend to provide. The proposed paper will not only provide a comparative analysis of traditional protocol approaches but also will suggest design and analysis of the framework against blackhole and their effect on the difference performance parameter. We have studied and analyzed the AODV protocol in different scenarios in VANET and identified the vulnerabilities available in this protocol. We have proposed a new technique based on fuzzy logic-based control. This technique is used for detection and identification of blackhole attack in VANET. In our proposed technique, every node wants to transmit the packet to other node; they have to send the route request packet and wait until they receive the acknowledgement from receiver node. Then, the packet receiver node analyzes the packet and identifies and calculates the trust value of the packet based on how this packet is used by the sender. It is used as how this packet is transmitted in the network and how it is used by the node whose behavior is as malicious node. It increases the throughput of the network in data transmission speed.

Keywords

VANET Fuzzy logic control Blackhole attack Cooperative blackhole attack 

References

  1. 1.
    Harsch, C., Festag, A., Papadimitratos, P.: Secure position-based routing for VANETs. IEEE, 2(12) (2007)Google Scholar
  2. 2.
    Hortelano, J., Ruiz, J.C., Manzoni, P.: Evaluating the usefulness of watchdogs for intrusion detection in VANETs. IEEE Xplore 11 (2010)Google Scholar
  3. 3.
    Mathew, M.E., Arun Raj Kumar, P.: Threat analysis and defence mechanisms in VANET. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(1) (2013)Google Scholar
  4. 4.
    Gonzalez-Tablas, A.I., Ribagorda, A., de Fuentes, J.M.: Overview of security issues in vehicular Ad-hoc networks. In: Handbook of Research on Mobility and Computing: Evolving Technologies and Ubiquitous Impacts, vol. 12(10) (2011)Google Scholar
  5. 5.
    Singh, A.P., Kateshiya, J.K.: Review to detect and isolate malicious vehicle in VANET. Int. J. Innov. Res. Sci., Eng. Technol. 4(2) (2015)Google Scholar
  6. 6.
    Cavalli, A., LA, V.H.: Security attacks and solutions in vehicular Ad-hoc networks: a survey. Int. J. Ad-Hoc Netw. Syst. (IJANS) 4(2) (2014)Google Scholar
  7. 7.
    Joshi, N., Dixit, K., Joshi, K.K.: A novel approach of trust based routing to select trusted location in AODV based VANET: a survey. Int. J. Hybrid Inf. Technol. 8(7) (2015)Google Scholar
  8. 8.
    Mittal, M.: Prevention of gray hole attack in mobile Ad-Hoc Networks by enhanced multipath approach. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(5) (2015)Google Scholar
  9. 9.
    Biswas, S., Misic, J., Misic. V.: DDoS Attack on WAVE enabled VANET through synchronization. In: IEEE Global Communications Conference (GLOBECOM ’12) (2012)Google Scholar
  10. 10.
    Agrawal, A., Garg, A., Chaudhiri, N., Gupta, S., Devesh, P., Roy, T.: Security on vehicular ad hoc networks (VANET): a review paper. Int. J. Emerg. Technol. Adv. Eng. 3(1) (2013)Google Scholar
  11. 11.
    Zeadally, S., Hunt, R., Chen, Y.S., Irwin, A., Hassan, A.: Vehicular ad hoc networks (VANETS): status, results, and challenges. Springer 50(4) (2012)CrossRefGoogle Scholar
  12. 12.
    Gajbhiye, T., Waoo, A.A., Pathija, P.S.: Traffic Management through inter-communication between cars using VANET system. Int. J. Adv. Comput. Eng. Commun. Technol. 1(1) (2007)Google Scholar
  13. 13.
    Avinash, P., Jadhao, Chaudhari, D.N.: Security aware Adhoc on demand distance vector routing protocol in vehicular Adhoc network. Int. J. Eng. Appl. Technol. 2(12), (2015)Google Scholar
  14. 14.
    Aaseri, R., Roberts, N., Choudhary, P.: Trust value algorithm: a secure approach against packet drop attack in wireless ad-hoc networks. Int. J. Netw. Secur. Appl. (IJNSA) 5(3) (2013)CrossRefGoogle Scholar
  15. 15.
    ViswaJhananie, K.R., Chandrasekar, C.: Detection and removal of blackhole attack using handshake mechanism in MANET and VANET”. IOSR J. Mob. Comput. Appl. (IOSR-JMCA), 2(1) (2015)Google Scholar
  16. 16.
    Yadav, R., Hemrajani, N., Goyal, D., Shivani, S.: Vulnerabilities, attacks and their detection techniques in ad hoc network. Int. J. Comput. Appl. 2(11) (2011)Google Scholar
  17. 17.
    Gurpreet, S.S.: Malicious data detection in VANET. Int. J. Adv. Res. Comput. Commun. Eng. 1(7) (2012)Google Scholar
  18. 18.
    Abumansoor, O., Boukerche, A.: Towards a secure trust model for vehicular ad hoc networks services. IEEE Xplore 5(9) (2011)Google Scholar
  19. 19.
    Bhatia, J., Shah, B.: Review on various security threats & solutions and network coding based security approach for VANET. Int. J. Adv. Eng. Technol. 2(11) (2013)Google Scholar
  20. 20.
    Mustary, N.R., Chander, R.P., Ahmed Baig, M.N.: A performance evaluation of VANET for intelligent transportation system. World J. Sci. Technol. 2(10) (2013)Google Scholar
  21. 21.
    Prajapati, N.K., Grover, J., Gaur, M.S.: Implementation of temporal attacks in vehicular ad hoc networks. Int. J. Comput. Appl. 12(5) (2011)Google Scholar
  22. 22.
    Dadheech, D., Goyal, D., Srivastava, S., Choudhary, C.M.: An efficient approach for big data processing using spatial Boolean queries, J. Stat. Manag. Syst. (JSMS), Taylor & Fr. Group J. ISSN:0972-0510 (Print), ISSN 2169-0014 (Online), 21(4), 583–591 (2018).  https://doi.org/10.1080/09720510.2018.1471258CrossRefGoogle Scholar
  23. 23.
    Lipiński, B., Mazurczyk, W., Szczypiorski, K., Śmietanka, P.: Towards effective security framework for vehicular Ad-Hoc networks. J. Adv. Comput. Netw. 3(2) (2015)CrossRefGoogle Scholar
  24. 24.
    Kumar, A., Sinha, M.: Overview on vehicular ad hoc network and its security issues. In: 2014 International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, pp. 792–797.  https://doi.org/10.1109/indiacom.2014.6828071

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Ankit Kumar
    • 1
    Email author
  • Pankaj Dadheech
    • 1
  • Mahender Kumar Beniwal
    • 1
  • Basant Agarwal
    • 1
  • Pawan Kumar Patidar
    • 2
  1. 1.Swami Keshvanand Institute of Technology, Management & GramothanJaipurIndia
  2. 2.Poornima College of EngineeringJaipurIndia

Personalised recommendations