Detection and Ignoring of Blackhole Attack in Vanets Networks

Detection and Ignoring of Blackhole Attack in Vanets Networks

Chaima Bensaid, Sofiane Boukli Hacene, Kamel Mohamed Faraoun
Copyright: © 2016 |Volume: 6 |Issue: 2 |Pages: 10
ISSN: 2156-1834|EISSN: 2156-1826|EISBN13: 9781466693296|DOI: 10.4018/IJCAC.2016040101
Cite Article Cite Article

MLA

Bensaid, Chaima, et al. "Detection and Ignoring of Blackhole Attack in Vanets Networks." IJCAC vol.6, no.2 2016: pp.1-10. http://doi.org/10.4018/IJCAC.2016040101

APA

Bensaid, C., Hacene, S. B., & Faraoun, K. M. (2016). Detection and Ignoring of Blackhole Attack in Vanets Networks. International Journal of Cloud Applications and Computing (IJCAC), 6(2), 1-10. http://doi.org/10.4018/IJCAC.2016040101

Chicago

Bensaid, Chaima, Sofiane Boukli Hacene, and Kamel Mohamed Faraoun. "Detection and Ignoring of Blackhole Attack in Vanets Networks," International Journal of Cloud Applications and Computing (IJCAC) 6, no.2: 1-10. http://doi.org/10.4018/IJCAC.2016040101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Vehicular networks or VANET announce as the communication networks of the future, where the mobility is the main idea. These networks should be able to interconnect vehicles. The optimal goal is that these networks will contribute to safer roads and more effective in the future by providing timely information to drivers and concerned authorities. They are therefore vulnerable to many types of attacks among them the black hole attack. In this attack, a malicious node disseminates spurious replies for any route discovery in order to monopolize all data communication and deteriorate network performance. Many studies have focused on detecting and isolating malicious nodes in VANET. In this paper, the authors present two mechanisms to detect this attack. The main goal is detecting as well as bypass cooperative black hole attack. The authors' approaches have been evaluated by the detailed simulation study with NS2 and the simulation results shows an improvement of protocol performance.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.