Network Security Analysis in Vanet Against Black Hole and Jellyfish Attack with Intrusion Detection System Algorithm

Authors

  • Elsa Mustikawati Telkom University
  • Doan Perdana Telkom University
  • Ridha Muldina Negara Telkom University

DOI:

https://doi.org/10.21512/commit.v11i2.3886

Keywords:

Black hole attack, IDS, jellyfish attack, and VANET

Abstract

VANET is the key to the Intelligent Transportation Systems (ITS), where vehicles can communicate with others to exchange information in real time. VANET is an ad-hoc that has no fixed infrastructure and rapidly changing network topology. As the result, the network is insecure and vulnerable to various attacks both from within and outside the network. This research analyzes AODV routing protocol comparing the conditions without the attacks and with the attacks with the of black hole and jellyfish using the algorithm of Intrusion Detection System with the number of nodes changing from 10 to 100 nodes at the change speeds of 70, 80, 90, 100, 110, and 120 km/h. This research is simulated using Network Simulator 2 to model the network and ONE
Simulator to model node mobility. The analyzed QoS parameters are packet delivery ratio (PDR), throughput, and end-to-end delay. The results of the simulation show that changing the number of nodes and node velocity affects the performance in the network. On the number of nodes scenario with attacks, the average value of PDR decreases by 48.03%, throughput decreases by 50.23%, and delay, for black hole, decreases by 80.18% but increases by 47.87% for jellyfish. Whereas in the node velocity scenario, the average values of PDR, throughput, and delay decrease by 58.52%, 60.34%, 13.81% for black
hole attack, respectively. However, the delay increases by 123.91% for jellyfish attack.

Dimensions

Plum Analytics

Author Biographies

Elsa Mustikawati, Telkom University

Faculty of Electrical Engineering

Doan Perdana, Telkom University

Faculty of Electrical Engineering

Ridha Muldina Negara, Telkom University

Faculty of Electrical Engineering

References

A. Muhtadi, D. Perdana, and R. Munadi, “Performance evaluation of aodv, dsdv, and zrp using vehicular traffic load balancing scheme on vanets,” International Journal of Simulation System,

Science and Technology (IJSSST), pp. 13.1–13.7, 2015.

B. Heru, B. Benny, D. Defendy, and W. Hento, “Keamanan jaringan menggunakan unified threat management pada server berbasiskan linux,” CommIT (Communication and Information Technology) Journal, vol. 1, no. 1, pp. 48–59, 2007.

D. Perdana, M. Nanda, R. Ode, and R. F. Sari, “Performance evaluation of puma routing protocol for manhattan mobility model on vehicular ad-hoc network,” in Telecommunications (ICT), 2015 22nd International Conference. IEEE, 2015, pp. 80–84.

R. S. Raw, M. Kumar, and N. Singh, “Security challenges, issues and their solutions for vanet,” International Journal of Network Security & Its Applications (IJNSA), vol. 5, no. 5, 2013.

K. S. Nisha and S. K. Arora, “Analysis of black hole effect and prevention through ids in manet,” American Journal of Engineering Research (AJER), vol. 2, no. 10, pp. 214–220, 2013.

H. R. Khirasariya, “Simulation study of jellyfish attack in manet using aodv routing protocol,” Journal of Information, Knowledge, and Research in Computer Engineering, vol. 2, no. 2, pp. 344–347,2013.

L. Wenshuang, L. Zhuorong, Z. Hongyang, W. Shenling, and B. Rongfang, “Vehicular ad hoc networks: Architectures, research issues, methodologies, challenges, and trends,” International

Journal of Distributed Sensor Networks, vol. 11, no. 8, pp. 1–11, Jan. 2015.

L. Mamta and P. Sharda Prasad, “Simulation of blackhole attack,” International Journal of Engineering Technology & Management Research (IJETMR), vol. 2, no. 2, pp. 23–30, 2014.

A. K. Gupta, N. Kaur, and A. Kaur, “A survey on behaviour of aodv and olsr routing protocol of manets under black hole attack,” International Journal of Computer Science & Technology, vol. 2, no. 4, pp. 349–352, 2011.

S. Dokurer, “Simulation of black hole attack in wireless ad-hoc network,” Master’s thesis, Ankara, Atilim University, 2006.

V. Bibhu, R. Kumar, B. S. Kumar, and D. K. Singh, “Performance analysis of black hole attack in vanet,” International Journal Of Computer Network and Information Security, vol. 4, no. 11, pp. 47–54, 2012.

B. Cherkaoui, A. Beni-hssane, and M. Erritali, “A clustering algorithm for detecting and handling black hole attack in vehicular ad hoc networks,” in Advances in Intelligent Systems and Computing. Springer, 2017, pp. 481–490.

Downloads

Published

2017-10-31
Abstract 824  .
PDF downloaded 597  .