Skip to main content
Log in

A cryptographic paradigm to detect and mitigate blackhole attack in VANET environments

  • Original Paper
  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Future communication systems have become the most commonly categorized as Mobile Ad hoc Networks and Vehicular Ad hoc Network (VANET). A VANET aims to protect vehicle drivers by initiating autonomous contact with nearby vehicles. Each vehicle operates as an intelligent mobile node in the ad-hoc network characterized by high mobility and complex networks. In VANET, malicious attacks impact cybersecurity, and such security attacks need to be detected and prevented. In VANET, any node can be determined as a router with the other nodes; a malicious node can interpret and modify the connection to the internet, thereby disrupting the network activity. VANETs are vulnerable to various security attacks such as blackhole attacks, Wormhole attacks, Denial-of-Service attacks, etc. This paper provides a novel cryptographic approach incorporated in AODV protocol to identify and eliminate the common attack strategy, called the blackhole attack in VANET, known as Secure AODV protocol (SAODV). This strategy store modifies the RREQ and RREP packets and stores the results in a lookup table. Any changes in these received packets and lookup tables imply that the intruder modifies the packet. The result analysis shows that the proposed approach is efficient in terms of various performance metrics, such as a higher packet delivery ratio of 95%, higher throughput of 87%, higher blackhole attack detection ratio of 98% compared to the existing approaches. It is inferred from the result that the proposed SAODV has a lower end-to-end delay of 75%, a lower collision rate of 71%, and a lower normalized routing load of 89%. Because of its better performance, the proposed SAODV approach will significantly impact the security application Intelligent Transport System.

Graphic abstract

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

Data availability

This manuscript has no associated data.

References

  1. Dhiviya, S., Malathy, S., & Monikha, M. (2018). Enhancing the network lifetime using on demand tree based routing protocol for manet. In 2018 4th International Conference on Computing Communication and Automation (ICCCA) (pp. 1–6). IEEE.

  2. Rajasekar, V., Sathya, K., & Premalatha, J. (2018). Energy efficient cluster formation in wireless sensor networks based on multi objective bat algorithm. In 2018 International Conference on Intelligent Computing and Communication for Smart World (I2C2SW) (pp. 116–120). IEEE.

  3. Rajasekar, V., Premalatha, J., & Sathya, K. (2021). Cancelable iris template for secure authentication based on random projection and double random phase encoding. Peer-to-Peer Networking and Applications, 14(2), 747–762.

    Article  Google Scholar 

  4. Rawat, A., Sharma, S., & Sushil, R. (2012). Vanet: Security attacks and its possible solutions. Journal of Information and Operations Management, 3(1), 301.

    Google Scholar 

  5. Vanitha, K., Vanitha, C., Musthafa, M. M., & Malathy, S. (2020). Efficient semantic interrogation scheme over cryptographic data in cloud. In 2020 International Conference on Inventive Computation Technologies (ICICT) (pp. 271–275). IEEE.

  6. Rani, P., Verma, S., Nguyen, G. N., et al. (2020). Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network. IEEE Access, 8, 121755–121764.

    Article  Google Scholar 

  7. Premalatha, J., & Rajasekar, V. (2020). 9 industrial internet, Internet of Things: Integration and Security Challenges 135.

  8. Hasrouny, H., Samhat, A. E., Bassil, C., & Laouiti, A. (2017). Vanet security challenges and solutions: A survey. Vehicular Communications, 7, 7–20.

    Article  Google Scholar 

  9. Nithya, B., Abhinaya, S., & Lavanya, V. (2018). A party-based cluster head selection algorithm for wireless sensor networks. In 2018 International Conference on Computing, Power and Communication Technologies (GUCON) (pp. 327–332). IEEE.

  10. Ucar, S., Ergen, S. C., & Ozkasap, O. (2015). Multihop-cluster-based ieee 802.11 p and lte hybrid architecture for vanet safety message dissemination. IEEE Transactions on Vehicular Technology, 65(4), 2621–2636.

    Article  Google Scholar 

  11. Hezam, M. A., Junaid, A., Syed, A., Nazri, M., Warip, M., Fazira, K. N., Azir, K., & Nurul Hidayah, R. (2018). Classification of security attacks in vanet: A review of requirements and perspectives.

  12. Hussain, R., Hussain, F., & Zeadally, S. (2019). Integration of vanet and 5g security: A review of design and implementation issues. Future Generation Computer Systems, 101, 843–864.

    Article  Google Scholar 

  13. Yang, A., Weng, J., Cheng, N., Ni, J., Lin, X., & Shen, X. (2019). Deqos attack: Degrading quality of service in vanets and its mitigation. IEEE Transactions on Vehicular Technology, 68(5), 4834–4845.

    Article  Google Scholar 

  14. Cui, J., Wu, D., Zhang, J., Xu, Y., & Zhong, H. (2019). An efficient authentication scheme based on semi-trusted authority in vanets. IEEE Transactions on Vehicular Technology, 68(3), 2972–2986.

    Article  Google Scholar 

  15. Kumar, A., Varadarajan, V., Kumar, A., Dadheech, P., Choudhary, S. S., Kumar, V. A., et al. (2021). Black hole attack detection in vehicular ad-hoc network using secure aodv routing algorithm. Microprocessors and Microsystems, 80, 103352.

    Article  Google Scholar 

  16. El-Semary, A. M., & Diab, H. (2019). Bp-aodv: Blackhole protected aodv routing protocol for manets based on chaotic map. IEEE Access, 7, 95197–95211.

    Article  Google Scholar 

  17. Gurung, S., & Chauhan, S. (2018). A dynamic threshold based approach for mitigating black-hole attack in manet. Wireless Networks, 24(8), 2957–2971.

    Article  Google Scholar 

  18. Hussain, R., Lee, J., & Zeadally, S. (2020). Trust in vanet: A survey of current solutions and future research opportunities, IEEE Transactions on Intelligent Transportation Systems.

  19. Tyagi, P., & Dembla, D. (2017). Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (vanet). Egyptian Informatics Journal, 18(2), 133–139.

    Article  Google Scholar 

  20. Baiad, R., Alhussein, O., Otrok, H., & Muhaidat, S. (2016). Novel cross layer detection schemes to detect blackhole attack against qos-olsr protocol in vanet. Vehicular Communications, 5, 9–17.

    Article  Google Scholar 

  21. Yadav, K. A., & Vijayakumar, P. (2016). Vanet and its security aspects: A review. Indian Journal of Science and Technology, 9(18), 104–118.

    Google Scholar 

  22. Ali Zardari, Z., He, J., Zhu, N., Mohammadani, K. H., Pathan, M. S., Hussain, M. I., & Memon, M. Q. (2019). A dual attack detection technique to identify black and gray hole attacks using an intrusion detection system and a connected dominating set in manets. Future Internet, 11(3), 61.

    Article  Google Scholar 

  23. Mohammadani, K. H., Memon, K. A., Memon, I., Hussaini, N. N., & Fazal, H. (2020). Preamble time-division multiple access fixed slot assignment protocol for secure mobile ad hoc networks. International Journal of Distributed Sensor Networks, 16(5), 1550147720921624.

    Article  Google Scholar 

  24. Junejo, M. H., Ab Rahman, A. A.-H., Shaikh, R. A., Mohamad Yusof, K., Memon, I., Fazal, H., & Kumar, D. (2020). A privacy-preserving attack-resistant trust model for internet of vehicles ad hoc networks, Scientific Programming 2020.

  25. Junejo, M. H., Ab Rahman, A.A.-H., Shaikh, R. A., Yusof, K. M., Kumar, D., & Memon, I. (2021). Lightweight trust model with machine learning scheme for secure privacy in vanet. Procedia Computer Science, 194, 45–59.

    Article  Google Scholar 

  26. SathyaNarayanan, P. (2019). A sensor enabled secure vehicular communication for emergency message dissemination using cloud services. Digital Signal Processing, 85, 10–16.

    Article  Google Scholar 

  27. Kumar, A., & Sinha, M. (2019). Design and development of new framework for detection and mitigation of wormhole and black hole attacks in vanet. Journal of Statistics and Management Systems, 22(4), 753–761.

    Article  Google Scholar 

  28. Rajasekar, V., Premalatha, J., Sathya, K., & Saračević, M. (2021). Secure remote user authentication scheme on health care, iot and cloud applications: A multilayer systematic survey. Acta Polytechnica Hungarica, 18(3), 87–106.

    Article  Google Scholar 

  29. Krishnamoorthi, S., Jayapaul, P., Dhanaraj, R. K., Rajasekar, V., Balusamy, B., & Islam, S. (2021). Design of pseudo-random number generator from turbulence padded chaotic map. Nonlinear Dynamics, 104(2), 1627–1643.

    Article  Google Scholar 

  30. Velliangiri, S., Manoharn, R., Ramachandran, S., Krishnasamy, V., Rajasekar, V. R., Karthikeyan, P., Kumar, P., Abishek, K., & Dhanabalan, S. S. (2021). An efficient lightweight privacy preserving mechanism for industry 4.0 based on elliptic curve cryptography, IEEE Transactions on Industrial Informatics.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to SK Hafizul Islam.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants performed by any of the authors.

Conflict of interests

The authors also declare that all contributions in this work are novel, and there are no similarities with our previous publications.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dhanaraj, R.K., Islam, S.H. & Rajasekar, V. A cryptographic paradigm to detect and mitigate blackhole attack in VANET environments. Wireless Netw 28, 3127–3142 (2022). https://doi.org/10.1007/s11276-022-03017-6

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-022-03017-6

Keywords

Navigation