2020
DOI: 10.1109/access.2020.3034327
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent Detection of Black Hole Attacks for Secure Communication in Autonomous and Connected Vehicles

Abstract: Detection of Black Hole attacks is one of the most challenging and critical routing security issues in vehicular ad hoc networks (VANETs) and autonomous and connected vehicles (ACVs). Malicious vehicles or nodes may exist in the cyber-physical path on which the data and control packets have to be routed converting a secure and reliable route into a compromised one. However, instead of passing packets to a neighbouring node, malicious nodes bypass them and drop any data packets that could contain emergency alar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 42 publications
(21 citation statements)
references
References 53 publications
0
21
0
Order By: Relevance
“…To evaluate the enhancement in routing performance achieved by SBGM mechanism, we first created the Attack-AODV (original AODV modified to perform the attack) protocol to simulate the smart black and gray hole attack in the network. Then, we compared the proposed approach (SBGM-AODV) with the Attack-AODV, and existing methods, Tyagi and Dembla [19], SVODR [43], Verma et al [12], and IDBA [8] based on packet delivery ratio, throughput, average end-to-end delay, and packet drop percentage.…”
Section: Results Analysis and Performance Comparison In Highway Scenariomentioning
confidence: 99%
See 3 more Smart Citations
“…To evaluate the enhancement in routing performance achieved by SBGM mechanism, we first created the Attack-AODV (original AODV modified to perform the attack) protocol to simulate the smart black and gray hole attack in the network. Then, we compared the proposed approach (SBGM-AODV) with the Attack-AODV, and existing methods, Tyagi and Dembla [19], SVODR [43], Verma et al [12], and IDBA [8] based on packet delivery ratio, throughput, average end-to-end delay, and packet drop percentage.…”
Section: Results Analysis and Performance Comparison In Highway Scenariomentioning
confidence: 99%
“…Figure 13 shows that in the case of Attack-AODV, the average delay is higher because malicious nodes drop data packets fully/selectively. The proposed SBGM outperforms the existing approaches in SVODR [43] and IDBA [8].…”
Section: Average End-to-end Delaymentioning
confidence: 87%
See 2 more Smart Citations
“…Over time, various routing protocols and security mechanisms have been developed [18]. Out of these, the ad hoc on-demand distance vector (AODV) [19] was found to be one of the most famous and commonly used routing protocols in VANETs [20,21]. AODV is also known as a demand-driven protocol since it discovers a new route only when it is required, rather than in advance.…”
Section: Introductionmentioning
confidence: 99%