Visible to the public Performance Analysis of Black Hole Attack and Flooding Attack AODV Routing Protocol on VANET (Vehicular Ad-Hoc Network)

TitlePerformance Analysis of Black Hole Attack and Flooding Attack AODV Routing Protocol on VANET (Vehicular Ad-Hoc Network)
Publication TypeConference Paper
Year of Publication2020
AuthorsFiade, A., Triadi, A. Yudha, Sulhi, A., Masruroh, S. Ummi, Handayani, V., Suseno, H. Bayu
Conference Name2020 8th International Conference on Cyber and IT Service Management (CITSM)
KeywordsAODV, Black hole attack, Black hole attacks, Blackhole attack, data communication, delays, different network conditions, energy, Energy efficiency, energy parameters, energy-efficient AODV, Flooding Attack, flooding attack AODV routing protocol, largest remaining energy, malicious nodes, normal network conditions, ns2, Packet loss, Performance analysis, pubcrawl, quality of service, Resiliency, Routing protocols, Scalability, telecommunication security, Throughput, VANET, vehicular ad hoc networks, Vehicular Ad-hoc Network, Wireless communication, Wireless sensor networks, wireless technology
AbstractWireless technology is widely used today and is growing rapidly. One of the wireless technologies is VANET where the network can communicate with vehicles (V2V) which can prevent accidents on the road. Energy is also a problem in VANET so it needs to be used efficiently. The presence of malicious nodes or nodes can eliminate and disrupt the process of data communication. The routing protocol used in this study is AODV. The purpose of this study is to analyze the comparison of blackhole attack and flooding attack against energy-efficient AODV on VANET. This research uses simulation methods and several supporting programs such as OpenStreetMap, SUMO, NS2, NAM, and AWK to test the AODV routing protocol. Quality of service (QOS) parameters used in this study are throughput, packet loss, and end to end delay. Energy parameters are also used to examine the energy efficiency used. This study uses the number of variations of nodes consisting of 20 nodes, 40 nodes, 60 nodes, and different network conditions, namely normal network conditions, network conditions with black hole attacks, and network conditions with flooding attacks. The results obtained can be concluded that the highest value of throughput when network conditions are normal, the greatest value of packet loss when there is a black hole attack, the highest end to end delay value and the largest remaining energy when there is a flooding attack.
Citation Keyfiade_performance_2020