2019
DOI: 10.34218/ijcet.10.3.2019.019
|View full text |Cite
|
Sign up to set email alerts
|

Effect on Aodv Routing Protocol Under Blackhole Attack in Vanet

Abstract: Vehicular Ad-hoc Networks (VANETs) is an advancement over Mobile Ad Hoc Networks (MANETs) which is mainly design for inter vehicle communication. VANET is a scalable and unbounded network which is completely independent from the number of nodes. It can be implemented for one or several cities even for whole country. VANET is a self organizing network emergent technology with a promising advantages but having high challenges in its security. VANET communication must be secure and having guarantee that transmitt… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…In VANET, if the destination vehicle is far away, then the sender node takes the help of an intermediate node to transmit data to the destined node. Here intermediate node act as a malicious node and it break up the trust and use trial and error approach to decrypt the data [41][42].…”
Section: An Overview Of the Taxonomy Of Authentication Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…In VANET, if the destination vehicle is far away, then the sender node takes the help of an intermediate node to transmit data to the destined node. Here intermediate node act as a malicious node and it break up the trust and use trial and error approach to decrypt the data [41][42].…”
Section: An Overview Of the Taxonomy Of Authentication Attacksmentioning
confidence: 99%
“…Here the attacker has a deep sense of knowledge about the structure and design of the network before launching an attack. The attacker sends malicious data that lead to jamming, accidents as well as create chaos in the network [41][45].…”
Section: An Overview Of the Taxonomy Of Authentication Attacksmentioning
confidence: 99%
“…In [20], a rather detailed analysis of the main attacks on vehicle privacy as well as solutions to this problem is presented. Thus, both cryptographic methods [21] and noise techniques [22] are used against eavesdropping and traffic analysis.…”
Section: Related Workmentioning
confidence: 99%
“…In this section, nine research papers discussing the different attacks are analyzed. The papers are Nanda et al [18], Kaur et al [20], Junaid et al [21] Cui et al [22], Upadhyaya and Shah [23], Chowdhury et al [24], Ghori et al [25], Sirola et al [26] and Samara [27]. In total, 30 unique attacks were reviewed in these studies.…”
Section: Comparative Analysis Of Avs Attacksmentioning
confidence: 99%