Journal of Intelligent Systems and Internet of Things

Journal DOI

https://doi.org/10.54216/JISIoT

Submit Your Paper

2690-6791ISSN (Online) 2769-786XISSN (Print)

Volume 16 , Issue 1 , PP: 102-117, 2025 | Cite this article as | XML | Html | PDF | Full Length Article

Multi-Dimensional Trust based Data Dissemination mechanism (MDTD) for Ensuring Authentication by Eliminating Blackhole Attack in VANET

C. Balakumar 1 * , S. Vydehi 2

  • 1 Research Scholar, Department of Computer Science, Dr.SNS Rajalakshmi College of Arts and Science (Autonomous), Coimbatore, India - (balakumarc.cbk@gmail.com)
  • 2 Associate Professor & Head, Department of Information Technology, Dr.SNS Rajalakshmi College of Arts and Science (Autonomous), Coimbatore, India - (vydehi.s@gamil.com)
  • Doi: https://doi.org/10.54216/JISIoT.160109

    Received: November 25, 2024 Revised: January 02, 2025 Accepted: January 29, 2025
    Abstract

    Vehicular Ad Hoc Networks also known as VANET, and it is a special type of ad hoc networks since it is deployed on demand.  Here the nodes are representing as vehicles, and they are communicating with each other to ensure the reliable and secure safety driving. Since it is open environment, ensuring secure routing is always a challenging task. Routing is one of the essential things in ad hoc networks because it is carrying road safety information always. However, most of the time, it is affected by attacks. Black hole is one of the attacks where the malicious nodes that is black hole vehicles advertise itself that having the shortest path to the destination by the way it tries to disturb the entire environment. In this paper, multi-dimensional trust-based data dissemination mechanism is proposed. The main objective is to ensure authentication by eliminating black hole attack. The proposed method makes use of multiple trusts such as direct, indirect, integrity, intimacy, and mobility over Dynamic Source Routing (DSR) protocol by the way authentication can be achieved. Simulation results shows that the proposed model works efficiently compare with existing models.

    Keywords :

    Vehicular Ad Hoc Networks , Security , Routing, Trust , Data Dissemination , Authentication , Dynamic Source Routing

    References

    [1]          G. Jyoti, M. S. Gaur, and S. Auerbach, Security of Self-organizing Networks MANET, WSN, WMN, VANET, CRC Press, 2010.

    [2]          Y. Wang and F. Li, Vehicular Ad Hoc Networks, Springer-Verlag, London, 2009.

    [3]          C. Wei, Y. Jianding, and L. Xiangjun, “The design of electronic license plate recognition terminal system based on nRF24LE1,” in Proc. 2012 Fifth Int. Symp. Computational Intelligence and Design (ISCID), 2012, pp. 127–129.

    [4]          W. Liang, Z. Li, H. Zhang, S. Wang, and R. Bie, “Vehicular Ad Hoc Networks: Architectures, Research Issues, Methodologies, Challenges, and Trends,” Int. J. Distributed Sensor Networks, vol. 2015, Article ID 745303, 11 pages.

    [5]          S. Zeadally, R. Hunt, Y.-S. Chen, A. Irwin, and A. Hassan, Vehicular Ad Hoc Networks (VANETS): Status, Results, and Challenges, Springer Science, 2010.

    [6]          Z. Stampoulis and Z. Chai, “A Survey of Security in Vehicular Networks,” Project CPSC 534, 2007.

    [7]          T. Zhou, R. R. Choudhury, P. Ning, and K. Chakrabarty, “Privacy-preserving detection of sybil attacks in vehicular ad hoc networks,” in Proc. 4th Annual Int. Conf. Mobile and Ubiquitous Systems: Networking and Services. MobiQuitous, 2007, pp. 1–8.

    [8]          H. Hasrounya, A. E. Samhat, C. Bassil, and A. Laouitia, “VANet security challenges and solutions: A survey,” Vehicular Communications, vol. 7, pp. 7–20, 2017.

    [9]          M.-C. Chuang and J.-F. Lee, “TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks,” IEEE Syst. J., DOI: 10.1109/JSYST.2012.2231792.

    [10]       F. Gómez-Mármol and G. Martínez Pérez, “TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks,” J. Netw. Comput. Appl., vol. 35, pp. 934–941, 2012.

    [11]       D. Huang, X. Hong, and M. Gerla, “Situation-Aware Trust Architecture for Vehicular Networks,” IEEE Commun. Mag., vol. 48, no. 11, pp. 128–135, Nov. 2010.

    [12]       X. Lai, J. Zhou, and H. Li, “APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks,” LNCS 7001, pp. 293–308, 2011.

    [13]       C. Caballero-Gil, P. Caballero-Gil, and J. Molina-Gil, “Mutual authentication in self-organized VANETs,” Comput. Stand. Interfaces, vol. 36, no. 4, pp. 25–30, 2013.

    [14]       A. Malathi and N. Sreenath, “Black Hole Attack Prevention and Detection in VANET using Modified DSR Protocol,” Int. J. Comput. Appl., vol. 168, no. 7, pp. 1–8, Jun. 2017.

    [15]       P. Tyagi and D. Dembla, “Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET),” Egypt. Informat. J., vol. 18, no. 2, pp. 133–139, Jul. 2017.

    [16]       I. Dhyani, N. Goel, G. Sharma, and B. Mallick, “Black hole Attack Prevention in VANET,” Int. J. Futur. Revol. Comput. Sci. Commun. Eng., vol. 3, no. 10, pp. 1–6, 2017.

    [17]       M.-Y. Su, “Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems,” Comput. Commun, vol. 34, no. 1, pp. 107–117, Jan. 2011.

    [18]       E. Karthikeyan et al., “A review analysis on emergency data dissemination techniques in vehicular adhoc networks,” Int. J. Sci. Technol. Res., vol. 8, pp. 1209–1215, 2019.

    [19]       S. Sibichen et al., “An Efficient AODV Protocol and Encryption Mechanism for Security Issues in Adhoc Networks,” in Proc. Int. Conf. Microelectronics, Commun. and Renewable Energy (ICMiCR-2013), IEEE, 2013.

    [20]       S. Majeed and M. Abdala, “Blackhole Attack effect Elimination in VANET Networks using IDA-AODV, RAODV and AntNet Algorithm,” J. Telecommun., vol. 36, no. 1, pp. 15–19, Feb. 2017.

    [21]       R. S. Raw, M. Kumar, and N. Singh, “Security challenges, issues and their solutions for vanet,” Sept. 2013.

    [22]       G. Karagiannis, O. Altintas, et al., “Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions,” IEEE Commun. Surv. Tutor, vol. 13, no. 3, pp. 1–22, 2011.

    [23]       S. Kannan et al., “Secure Data Transmission in MANETs using AODV,” Int. J. Comput. Commun. Eng. Res., vol. 2, no. 2, pp. 1–9, 2014.

    [24]       S. M. Arumugam, N. Neelavathy Pari, H. V. S., “Detection of Single and Collaborative Black Hole Attack in MANET,” in Proc. Int. Conf. Wireless Commun, Signal Process. and Networking (WiSPNET), IEEE, pp. 2040–2044, 2016.

    [25]       A. K. Chaker, A. Lakasy, and N. Lagraa, “Detection of Intelligent Malicious and Selfish Nodes in VANET using Threshold Adaptive Control,” in Proc. 5th Int. Conf. Electronic Devices, Syst. and Appl. (ICEDSA), IEEE, 2016.

    [26]       P. S. Hiremath and A. T., “Adaptive Method for Detection and Prevention of Cooperative Black Hole Attack in MANETs,” Int. J. Electr. Electron. Data Commun, vol. 3, no. 4, pp. 1–7, 2015.

    [27]       A. Fiade, A. Y. Triadi, A. Sulhi, S. U. Masruroh, V. Handayani, and H. B. Suseno, “Performance Analysis of Black Hole Attack and Flooding Attack AODV Routing Protocol on VANET,” in Proc. 2020 8th Int. Conf. Cyber and IT Service Manag. (CITSM), IEEE, 2020.

    [28]       R. Dhanaraj, R. K. Rajesh Kumar, S. K. Hafizul Islam, and V. Rajasekar, “A cryptographic paradigm to detect and mitigate blackhole attack in VANET environments,” Wireless Netw, vol. 28, no. 7, pp. 3127–3142, 2022.

    [29]       B. Alaya and L. Sellami, “Clustering method and symmetric/asymmetric cryptography scheme adapted to securing urban VANET networks,” J. Inf. Secur. Appl., vol. 58, pp. 102779, 2021.

    [30]       T. Nandy et al., “A secure, privacy-preserving, and lightweight Authentication scheme for VANETs,” IEEE Sensors J., vol. 21, no. 18, pp. 20998–21011, 2021.

    [31]       B. Karthiga et al., “Intelligent intrusion detection system for VANET using machine learning and deep learning approaches,” Wireless Commun. and Mobile Comput, vol. 2022, pp. 1–11, 2022.

    [32]       H. Bangui, M. Ge, and B. Buhnova, “A hybrid machine learning model for intrusion detection in VANET,” Computing, vol. 104, no. 3, pp. 503–531, 2022.

    [33]       F. Ghaleb et al., “Misbehavior-aware on-demand collaborative intrusion detection system using distributed ensemble learning for VANET,” Electronics, vol. 9, no. 9, pp. 1411, 2020.

    [34]       Z. Ma et al., “An efficient decentralized key management mechanism for VANET with blockchain,” IEEE Trans. Vehicular Technol., vol. 69, no. 6, pp. 5836–5849, 2020.

    [35]       L. Wei et al., “Proven secure tree-based authenticated key agreement for securing V2V and V2I communications in VANETs,” IEEE Trans. Mobile Comput., vol. 21, no. 9, pp. 3280–3297, 2021.

    [36]       A. Kumar et al., “Distribution Key Scheme for Secure Group Management in VANET Using Polynomial Interpolation,” Int. Symp. Security and Privacy in Social Networks and Big Data, Singapore: Springer Singapore, 2021.

    [37]       N. Ravi et al., “Securing VANET using blockchain technology,” J. Phys.: Conf. Ser., vol. 1979, no. 1, 2021.

    [38]       Y. Inedjaren et al., “Blockchain-based distributed management system for trust in VANET,” Vehicular Commun., vol. 30, pp. 100350, 2021.

    [39]       Z. Ma et al., “An efficient decentralized key management mechanism for VANET with blockchain,” IEEE Trans. Vehicular Technol., vol. 69, no. 6, pp. 5836–5849, 2020.

    [40]       K. Prathapchandran and T. Janani, “A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest–RFTRUST,” Comput. Netw, vol. 198, 2021, Art. 108413.

    Cite This Article As :
    Balakumar, C.. , Vydehi, S.. Multi-Dimensional Trust based Data Dissemination mechanism (MDTD) for Ensuring Authentication by Eliminating Blackhole Attack in VANET. Journal of Intelligent Systems and Internet of Things, vol. , no. , 2025, pp. 102-117. DOI: https://doi.org/10.54216/JISIoT.160109
    Balakumar, C. Vydehi, S. (2025). Multi-Dimensional Trust based Data Dissemination mechanism (MDTD) for Ensuring Authentication by Eliminating Blackhole Attack in VANET. Journal of Intelligent Systems and Internet of Things, (), 102-117. DOI: https://doi.org/10.54216/JISIoT.160109
    Balakumar, C.. Vydehi, S.. Multi-Dimensional Trust based Data Dissemination mechanism (MDTD) for Ensuring Authentication by Eliminating Blackhole Attack in VANET. Journal of Intelligent Systems and Internet of Things , no. (2025): 102-117. DOI: https://doi.org/10.54216/JISIoT.160109
    Balakumar, C. , Vydehi, S. (2025) . Multi-Dimensional Trust based Data Dissemination mechanism (MDTD) for Ensuring Authentication by Eliminating Blackhole Attack in VANET. Journal of Intelligent Systems and Internet of Things , () , 102-117 . DOI: https://doi.org/10.54216/JISIoT.160109
    Balakumar C. , Vydehi S. [2025]. Multi-Dimensional Trust based Data Dissemination mechanism (MDTD) for Ensuring Authentication by Eliminating Blackhole Attack in VANET. Journal of Intelligent Systems and Internet of Things. (): 102-117. DOI: https://doi.org/10.54216/JISIoT.160109
    Balakumar, C. Vydehi, S. "Multi-Dimensional Trust based Data Dissemination mechanism (MDTD) for Ensuring Authentication by Eliminating Blackhole Attack in VANET," Journal of Intelligent Systems and Internet of Things, vol. , no. , pp. 102-117, 2025. DOI: https://doi.org/10.54216/JISIoT.160109