Implementation of GPSR Routing Protocol in VANET for Analyzing Black Hole Attack Using CBR/UDP Traffic Pattern With Security Algorithm

Main Article Content

Hari Krishan, Manish Choubisa

Abstract

In implementing VANET security is one of biggest challenges due to dynamic topology. There are possibilities of active and passive attack in network to alter the authentic data. With pace of time tremendous development occurred in the field of VANET. Security is one of biggest challenges which need to handle effectively in adhoc network. In VANET nodes are mobiles and therefore they continuously change their respective location therefore due to dynamic topology, network becomes prone to attack. With advancement in technology in parallel unethical activity also take place which try to access the data illegally to fetch personnel profit. There are various types of attack possibilities in adhoc network but generally attacks are categorized into active attack and passive attack. Our research article based upon black hole attack which is very common to the networks. In this attack a malicious node with high priority number is deployed in between other nodes and malicious node acquire this data instead of destination node and also send an acknowledgement to source node that data received by destination node successfully. In this research paper proposed work executed by GPSR protocol and performance analysis of the black hole attack in Vehicular Ad Hoc Network is tested. The networking parameters of GPSR routing protocol are better than existed protocol in term of end to end delay, packet loss, energy consumption. Further implemented research work can be extended in better way with help of IoT, M2M and artificial intelligence for various network configurations with security algorithm.

Article Details

How to Cite
Hari Krishan, Manish Choubisa. (2019). Implementation of GPSR Routing Protocol in VANET for Analyzing Black Hole Attack Using CBR/UDP Traffic Pattern With Security Algorithm. International Journal on Future Revolution in Computer Science &Amp; Communication Engineering, 5(8), 54–60. Retrieved from http://www.ijfrcsce.org/index.php/ijfrcsce/article/view/2015
Section
Articles