Network Security Analysis in Vanet Against Black Hole and Jellyfish Attack with Intrusion Detection System Algorithm
DOI:
https://doi.org/10.21512/commit.v11i2.3886Keywords:
Black hole attack, IDS, jellyfish attack, and VANETAbstract
VANET is the key to the Intelligent Transportation Systems (ITS), where vehicles can communicate with others to exchange information in real time. VANET is an ad-hoc that has no fixed infrastructure and rapidly changing network topology. As the result, the network is insecure and vulnerable to various attacks both from within and outside the network. This research analyzes AODV routing protocol comparing the conditions without the attacks and with the attacks with the of black hole and jellyfish using the algorithm of Intrusion Detection System with the number of nodes changing from 10 to 100 nodes at the change speeds of 70, 80, 90, 100, 110, and 120 km/h. This research is simulated using Network Simulator 2 to model the network and ONE
Simulator to model node mobility. The analyzed QoS parameters are packet delivery ratio (PDR), throughput, and end-to-end delay. The results of the simulation show that changing the number of nodes and node velocity affects the performance in the network. On the number of nodes scenario with attacks, the average value of PDR decreases by 48.03%, throughput decreases by 50.23%, and delay, for black hole, decreases by 80.18% but increases by 47.87% for jellyfish. Whereas in the node velocity scenario, the average values of PDR, throughput, and delay decrease by 58.52%, 60.34%, 13.81% for black
hole attack, respectively. However, the delay increases by 123.91% for jellyfish attack.
Plum Analytics
References
A. Muhtadi, D. Perdana, and R. Munadi, “Performance evaluation of aodv, dsdv, and zrp using vehicular traffic load balancing scheme on vanets,” International Journal of Simulation System,
Science and Technology (IJSSST), pp. 13.1–13.7, 2015.
B. Heru, B. Benny, D. Defendy, and W. Hento, “Keamanan jaringan menggunakan unified threat management pada server berbasiskan linux,” CommIT (Communication and Information Technology) Journal, vol. 1, no. 1, pp. 48–59, 2007.
D. Perdana, M. Nanda, R. Ode, and R. F. Sari, “Performance evaluation of puma routing protocol for manhattan mobility model on vehicular ad-hoc network,” in Telecommunications (ICT), 2015 22nd International Conference. IEEE, 2015, pp. 80–84.
R. S. Raw, M. Kumar, and N. Singh, “Security challenges, issues and their solutions for vanet,” International Journal of Network Security & Its Applications (IJNSA), vol. 5, no. 5, 2013.
K. S. Nisha and S. K. Arora, “Analysis of black hole effect and prevention through ids in manet,” American Journal of Engineering Research (AJER), vol. 2, no. 10, pp. 214–220, 2013.
H. R. Khirasariya, “Simulation study of jellyfish attack in manet using aodv routing protocol,” Journal of Information, Knowledge, and Research in Computer Engineering, vol. 2, no. 2, pp. 344–347,2013.
L. Wenshuang, L. Zhuorong, Z. Hongyang, W. Shenling, and B. Rongfang, “Vehicular ad hoc networks: Architectures, research issues, methodologies, challenges, and trends,” International
Journal of Distributed Sensor Networks, vol. 11, no. 8, pp. 1–11, Jan. 2015.
L. Mamta and P. Sharda Prasad, “Simulation of blackhole attack,” International Journal of Engineering Technology & Management Research (IJETMR), vol. 2, no. 2, pp. 23–30, 2014.
A. K. Gupta, N. Kaur, and A. Kaur, “A survey on behaviour of aodv and olsr routing protocol of manets under black hole attack,” International Journal of Computer Science & Technology, vol. 2, no. 4, pp. 349–352, 2011.
S. Dokurer, “Simulation of black hole attack in wireless ad-hoc network,” Master’s thesis, Ankara, Atilim University, 2006.
V. Bibhu, R. Kumar, B. S. Kumar, and D. K. Singh, “Performance analysis of black hole attack in vanet,” International Journal Of Computer Network and Information Security, vol. 4, no. 11, pp. 47–54, 2012.
B. Cherkaoui, A. Beni-hssane, and M. Erritali, “A clustering algorithm for detecting and handling black hole attack in vehicular ad hoc networks,” in Advances in Intelligent Systems and Computing. Springer, 2017, pp. 481–490.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License - Share Alike that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
USER RIGHTS
All articles published Open Access will be immediately and permanently free for everyone to read and download. We are continuously working with our author communities to select the best choice of license options, currently being defined for this journal as follows: Creative Commons Attribution-Share Alike (CC BY-SA)