About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
mca 22(21): e2

Research Article

Performance Analysis of RACODSR Protocol in Smart Grayhole Attacks on VANets

Download548 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/eai.1-6-2022.174088,
        author={Kaoutar Ourouss and Najib Naja and Abdellah Jamali},
        title={Performance Analysis of RACODSR Protocol in Smart Grayhole Attacks on VANets},
        journal={EAI Endorsed Transactions on Mobile Communications and Applications},
        volume={7},
        number={21},
        publisher={EAI},
        journal_a={MCA},
        year={2022},
        month={6},
        keywords={Mobile ad hoc networks, Vehicular networks, DDoS Attacks, Reputation System, Trust Management, ACO},
        doi={10.4108/eai.1-6-2022.174088}
    }
    
  • Kaoutar Ourouss
    Najib Naja
    Abdellah Jamali
    Year: 2022
    Performance Analysis of RACODSR Protocol in Smart Grayhole Attacks on VANets
    MCA
    EAI
    DOI: 10.4108/eai.1-6-2022.174088
Kaoutar Ourouss1,*, Najib Naja1, Abdellah Jamali1
  • 1: National Institute of Posts and Telecommunications, Rabat
*Contact email: ourouss@inpt.ac.ma

Abstract

As a subclass of Mobile Adhoc Networks (MANets), Vehicular Ad Hoc Network (VANET) is a set of interconnecting vehicles that aim to provide a wide spectrum of encouraging road services, such as safety and traffic management. This key component of Intelligent Transportation Systems (ITS), is impacted by the vehicle’s mobility and suffers from frequent link disruptions caused voluntarily or intentionally by malicious attackers, which make the security issue more challenging and even life-threatening when critical attacks occurred. This work focuses on analyzing the smart grayhole attacks within VANets environments and evaluating the Reputation-based Ant Colony Optimization Dynamic Source Routing (RACODSR) and Dynamic Source Routing (DSR) protocols performances under two different scenarios. For this purpose, VANets mobility models with and without collisions are generated using OpenStreetMap and Simulation of Urban Mobility (SUMO) tools and simulated in Network Simulator NS2 to assess the effectiveness of the compared protocols using the Drop rate, Packet Delivery Ratio, Throughput, Jitter, End-to-End delay, and consumed energy metrics.

Keywords
Mobile ad hoc networks, Vehicular networks, DDoS Attacks, Reputation System, Trust Management, ACO
Received
2022-04-06
Accepted
2022-05-30
Published
2022-06-01
Publisher
EAI
http://dx.doi.org/10.4108/eai.1-6-2022.174088

Copyright © 2022 Kaoutar Ourouss et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL