Abstract
This research will compare two main VANET protocols, dynamic source routing (DSR) and ad-hoc on-demand distance vector (AODV), subjected to two malicious attacks: black hole and wormhole attacks. Then, propose a mitigation method to countermeasure these attacks. This research uses NS3 to simulate a network of 100 nodes spread across a terrain of 300 × 1500 m2 with a simulation time of 10 s. The simulation aims to measure the average throughput (ATP), end-to-end average delay (AEED), packet delivery ratio (PDR) and packet loss ratio (PLR) from the data gathered during the simulations to evaluate the performance of the network. The results generated from this investigation show that DSR performs better than AODV regarding the average end-to-end delay, packet delivery ratio and packet loss balance when subjecting these two protocols to black hole and wormhole attacks. However, AODV outperforms DSR when measuring the average throughput under the same attacks. To countermeasure the effect of the malicious node on the VANET protocol, a proposed algorithm called soft encryption is applied to mitigate these attacks. The proposed algorithm aims to detect misbehaving nodes, isolating them from the network and dropping their packets. On the other hand, reward the well-behaving nodes by forwarding their traffic.
Similar content being viewed by others
Data availability
Data is generated using NS3 simulator which can be downloaded from the link: https://www.nsnam.org/releases/ns-3-29/download/.
References
Chowdhury A, Karmakar G, Kamruzzaman J, Jolfaei A, Das R. Attacks on self-driving cars and their countermeasures: a survey. IEEE Access. 2020;8:207308–42.
Wang W, Xie F, Chatterjee M. Small-scale and large-scale routing in vehicular ad hoc networks. IEEE Trans Veh Technol. 2009;58(9):5200–13.
P. Sathya Narayanan and C. S. Joice, 2019 Vehicle-to-Vehicle (V2V) Communication using Routing Protocols: A Review, International Conference on Smart Structures and Systems (ICSSS)
T. Mantoro and M. Reza, 2016 Performance analysis of AODV and DSDV using SUMO, MOVE and NS2, International Conference on Informatics and Computing (ICIC).
Devangavi AD, Gupta R. Routing protocols in VANET-A survey. Int Conf Smart Technol For Smart Nation. 2017;2017:163–7.
Kaur H. Analysis of VANET geographic routing protocols on real city map in recent trends in electronics, information & communication technology (RTEICT) 2017. Int Conf. 2017;44:895–9.
Malik S, Sahu PK. A comparative study on routing protocols for VANETs. Heliyon. 2019;5:8.
Karthigha, M., Latha, L. and Sripriyan, K. (2020) A Comprehensive Survey of Routing Attacks in Wireless Mobile Ad hoc Networks. International Conference on Inventive Computation Technologies (ICICT)
A. M. Yassin and M. A. Azer, 2022 Performance Comparison of AODV and DSDV In Vehicular Ad Hoc Networks. 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC).
Upadhyaya AN, Shah JS. Effect on AODV Routing Protocol under Blackhole Attack in VANET. Int J Comp Eng Technol (IJCET). 2019;10(3):166–74.
Richhriya V, Maurya JP, Saxena T. Performance of AODV against Malicious node in Mobile Ad Hoc Network. Int J Eng Cur Trends (IJERCT). 2020;2:3.
Siddiqui, M.N., Malik, K.R. and Malik, T.S. 2021 Performance Analysis of Blackhole and Wormhole Attack in MANET Based IoT, International Conference on Digital Futures and Transformative Technologies (ICoDT2).
R. Mena, F. Zumárraga, L. Urquiza and X. Calderón, 2019 Google Maps Route Color Mapping with SUMO Simulator. International Conference on Information Systems and Software Technologies (ICI2ST)
Gorine and Saleh, R. (2019) Performance Analysis of Routing Protocols in MANET Under Malicious Attacks. International Journal of Network Security & Its Applications.
Khan AU, Chawhan MD, Mushrif MM, Neole B. Performance Analysis of Adhoc On-demand Distance Vector Protocol under the influence of Blackhole, Gray-Hole and Wormhole Attacks in Mobile Adhoc Network. Int Conf Intel Comp Control Syst (ICICCS). 2021;20:238–43.
Chaudhary R, Sethi S, Keshari R, Goel S. A study of Comparison of Network Simulator-3 and Network Simulator-2. Int J Comp Sci Infor Technol. 2012;3(1):3085–92.
Shaban AM, Kurnaz S, Shantaf AM. Evaluation DSDV, AODV and OLSR routing protocols in real live by using SUMO with NS3 simulation in VANET. Int Cong Human-Comp Inter Opt Rob Appl (HORA). 2020;2020:1–5.
Iqbal S, Ball P, Kamarudin MH, Bradley A. Simulating malicious attacks on VANETs for connected and autonomous vehicle cybersecurity: a machine learning dataset. 13th international symposium on communication systems. Net Dig Sig Proc (CSNDSP). 2022;2022:332–7.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have no financial or proprietary interests in any material discussed in this article.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the topical collection “Cyber Security and Privacy in Communication Networks” guest edited by Rajiv Misra, R K Shyamsunder, Alexiei Dingli, Natalie Denk, Omer Rana, Alexander Pfeiffer, Ashok Patel and Nishtha Kesswani.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Gorine, A., Adeyemo, A. Performance of Vehicle Ad-Hoc Networks (VANETs) Operating in a Hostile Environment. SN COMPUT. SCI. 4, 347 (2023). https://doi.org/10.1007/s42979-023-01784-3
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-023-01784-3