Performance Analysis of Reactive Routing Protocol on VANET with Wormhole Attack Schemeaper
Main Article Content
Abstract
Entering the information era, the current needs of the global community is increasing very rapidly. Vehicular Ad-hoc Networks (VANET) has drawn significant attention from both industry and academia as an important development of vehicular communication technology. VANET is one of open network and communication media without security mechanism. There are many kinds of security threat that can interrupt data communication in VANET. Wormhole attacks as one of security threat can be a good challenge in VANET security research. In this paper, we evaluate the performance of the reactive routing protocol on VANET with wormhole attack scheme. The project is simulated using NS-3 in Ubuntu platform with performance analysis of routing protocol by changing initial power and node density. We conclude that throughput values are increasing along with the changing of initial power while the delay values are decreasing rapidly. By the changing of node density, the highest delay value is 0.122 ns on 10 nodes condition and 0.215 Mbps for throughput value on 8 nodes condition.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
References
[2] B. S. M., J. C. Bernandos and C. Guerrero, "Posisition Based Routing in Vehicular Netwroks : A Survery," Journal of Network and Computer Application, 2012.
[3] E. and A. , "Simulation of Vehicular Movement in VANET," National Institute of Technology Rourkela, 2013.
[4] K. "AODV Routing in VANET for Message Authentication Using ECDSA," in IEEE Conference on Communication and Signal Processing (ICCSP), 2014.
[5] S. Sulistyo and S. Alam, "Distributed Channel and Power Level Selection in VANET Based on SINR using Game Model," International Journal of Communication Networks and Information Security (IJCNIS), vol. 9, no. 3, pp. 432 - 438, 2017.
[6] R. A. and M. K. Mishra, "Mobility Adaptive Density Connected Clustering Approach," International Journal of Communication Networks and Information Security (IJCNIS), vol. 9, no. 2, pp. 222 - 229, 2017.
[7] E. Mustikawati, D. Perdana and R. M. Negara, "Network Security Analysis in VANET Against Black Hole and Jellyfish Attach with Intrusion Detection Algorithm," CommIT (Communication & Information Technology, vol. 11, no. 2, pp. 77 - 83, 2017.
[8] I. P. E and P. Sukanto, "Wireless Sensor Network Teori & Praktek Berbasiskan Open Source," 2015.
[9] M. Zhang and R. S. Wolff, "Routing Protocols for Vehicular Ad Hoc Network in Rural Areas," pp. 1-8.
[10] S. G. N., "Security Threats on Vehicular Ad Hoc Networks (VANET) : A Review Paper," vol. 4, no. 6, pp. 196 - 200, 2013.
[11] R. V. and S. Jain, "Denial of Service Attack in VANET : A Survey," vol. 28, no. 1, pp. 15 - 20, 2015.
[12] V. Bibhu, "Performance Analysis of Black Hole Attack in VANET," pp. 47 - 54, 2012.
[13] T. Wulandari, D. Perdana, and R. M. Negara, "Node Density Performance Analysis on IEEE 802.11ah Standard for VoIP Service," International Journal of Communication Network and Information Security (IJCNIS), vol. 10, no. 1, 2017.
[14] D. Perdana and R. F. Sari, "Performance Evaluation of Corrupted Signal Caused by Random Way Point and Gauss Markov Mobility Model on IEEE 1609.4 Standards," Next Generation Electronics (ISNE), 2015.
[15] G. Carneiro and M. Ricardo, "FlowMonitor - a network monitoring framework for the Network Simulator 3 (NS-3)," [Online]. Available: telecom.inestec.pt/~gjc/flowmon-presentation.pdf. [Accessed 29 March 2017].