6 CONCLUSIONS
This work analyses some routing threats over
VANET. The black hole attack has been evaluated
proposing two possible attacks: one simple attack
applied at the destination and another one that can be
applied by intermediate nodes that can forge a RREP
packet and then can perform an inside attack dropping
data packets. To face these security issues, it is
necessary to use cryptography to provide integrity to
some field in the RREQ and RREP packets or to use
a more complex asymmetric cryptography to
authenticate the RREQ and RREP packets providing
both authentication and integrity. Both security
solutions have been evaluated considering different
scenarios where attackers can perform the simplest
attack or the smarter black hole attack. The second
mitigation technique has been shown to be more
effective increasing a little bit more the AODV
protocol complexity.
REFERENCES
Arif, M., et al., J., 2019. A survey on security attacks in
VANETs: Communication, applications and
challenges, Vehicular Communications, Volume 19.
K. Singh, G. Mishra, A. Raheem and M. Kumar Sharma,
Survey Paper on Routing Protocols in VANET, 2020
2nd International Conference on Advances in
Computing, Communication Control and Networking
(ICACCCN), Greater Noida, India.
A. D. Devangavi and R. Gupta, 2017. Routing protocols in
VANET — A survey, 2017 International Conference On
Smart Technologies For Smart Nation
(SmartTechCon), Bengaluru, India.
S. Hayat, X. Liu, Y. Li and Y. Zhou, 2019. Comparative
Analysis of VANET’s Routing Protocol Classes: An
Overview of Existing Routing Protocol Classes and
Futuristic Challenges, 2019 IEEE 2nd Int. Con. on
Electronics Technology (ICET), Chengdu, China, 2019.
A.F. Santamaria, P. Fazio, P. Raimondo, M. Tropea, F. De
Rango, 2019. A New Distributed Predictive Congestion
Aware Re-Routing Algorithm for CO
2
Emissions
Reduction, in IEEE Trans. on Vehicular Technology,
Vol. 68 (5), 2019, pp.4419-4433.
C. Perkins, E. Belding-Royer, and S. Das. 2003. RFC3561:
Ad hoc On-Demand Distance Vector (AODV) Routing,
2003. RFC Editor, USA.
N. Phull and P. Singh, 2019. A Review on Security Issues in
VANETs, in 6th International Conference on
Computing for Sustainable Global Development
(INDIACom), New Delhi, India, 2019, pp. 1084-1088.
A. K. Goyal, A. Kumar Tripathi and G. Agarwal, 2019.
Security Attacks, Requirements and Authentication
Schemes in VANET, 2019 Int. Conf. on Issues and
Challenges in Intelligent Computing Techniques
(ICICT), Ghaziabad, India, 2019.
A. Fiade, A. et al. 2020. Performance Analysis of Black
Hole Attack and Flooding Attack AODV Routing
Protocol on VANET (Vehicular Ad-Hoc Network), 2020
8th International Conference on Cyber and IT Service
Management (CITSM), Pangkal, Indonesia, 2020.
M. J. Haidari and Z. Yetgin, 2019. Veins based studies for
vehicular ad hoc networks, 2019 Int.l Artificial
Intelligence and Data Processing Symposium, Malatya,
Turkey, 2019.
OMNeT++ -Simulation Manual.” [Online]. Available:
https://doc.omnetpp.org/omnetpp/manual.
Inet Framework.” [Online]. Available:
https://inet.omnetpp.org/.
SUMO User Documentation -Sumo.” [Online].
Available:https://sumo.dlr.de/wiki/SUMO_User_Docu
mentation#Introduction.
Documentation -Veins. [Online]. Available:
https://veins.car2x.org/documentation/.
Crypto++ Library: free C++ class library of cryptographic
schemes[Online]
https://github.com/weidai11/cryptopp.
P. Fazio, M.Tropea, M.Voznak, & F. De Rango, (2020). On
packet marking and Markov modeling for IP
Traceback: A deep probabilistic and stochastic analysis.
Computer Networks, 182, 107464.
F. De Rango, M. Tropea, & P. Fazio, (2020, July).
Mitigating DoS attacks in IoT EDGE Layer to preserve
QoS topics and nodes' energy. In IEEE INFOCOM
2020-IEEE Conference on Computer Communications
Workshops.
F. De Rango, G. Potrino, M. Tropea, & P.Fazio, (2020).
Energy-aware dynamic Internet of Things security
system based on Elliptic Curve Cryptography and
Message Queue Telemetry Transport protocol for
mitigating Replay attacks. Pervasive and Mobile
Computing, 61, 101105.
F. Rezac, et al., Security analysis system to detect threats
on a SIP VoIP infrasctructure elements. (2011)
Advances in Electrical and Electronic Engineering, 9
(5), pp. 225-232.
M. Mehic, P. Fazio, M. Voznak, E. Chromy, Toward
designing a quantum key distribution network
simulation model, (2016) Advances in Electrical and
Electronic Engineering, 14 (4), pp. 413-420.
F De Rango, DC Lentini, S Marano, (2006). Static and
dynamic 4-way handshake solutions to avoid denial of
service attack in Wi-Fi protected access and IEEE
802.11i, in EURASIP Journal on Wireless
Communications and Networking 2006, pp.1-19.