Performance Evaluation of Vehicular Ad Hoc Networks Considering Malicious Node Impact on Quality of Services Metrics
DOI:
https://doi.org/10.15575/join.v10i2.1568Keywords:
Blackhole, Malicious, TIPHON, VANETs, WormholeAbstract
References
[1] K. Y. Tsao, T. Girdler, and V. G. Vassilakis, “A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks,” Aug. 01, 2022, Elsevier B.V. doi: 10.1016/j.adhoc.2022.102894.
[2] M. T. Nuruzzaman and H.-W. Ferng, “Routing Protocol for a Heterogeneous MSN With an Intermittent Mobile Sink,” IEEE Sens J, vol. 22, no. 22, pp. 22255–22263, 2022, doi: 10.1109/JSEN.2022.3212197.
[3] M. T. Nuruzzaman and H.-W. Ferng, “Beaconless Geographical Routing Protocol for a Heterogeneous MSN,” IEEE Trans Mob Comput, vol. 21, no. 7, pp. 2332–2343, 2022, doi: 10.1109/TMC.2020.3038628.
[4] M. T. Nuruzzaman and H.-W. Ferng, “Design and evaluation of an LQI-based beaconless routing protocol for a heterogeneous MSN,” Wireless Networks, vol. 26, no. 1, pp. 699–721, 2020, doi: 10.1007/s11276-019-02177-2.
[5] M. ul Hassan et al., “ANN-Based Intelligent Secure Routing Protocol in Vehicular Ad Hoc Networks (VANETs) Using Enhanced AODV,” Sensors, vol. 24, no. 3, Feb. 2024, doi: 10.3390/s24030818.
[6] M. A. Al-Absi, A. A. Al-Absi, M. Sain, and H. Lee, “Moving ad hoc networks—a comparative study,” Sustainability (Switzerland), vol. 13, no. 11, Jun. 2021, doi: 10.3390/su13116187.
[7] V. Chandrasekar et al., “Secure malicious node detection in flying ad-hoc networks using enhanced AODV algorithm,” Sci Rep, vol. 14, no. 1, Dec. 2024, doi: 10.1038/s41598-024-57480-6.
[8] A. Sarwar, S. Anwar, G. Husnain, and M. Akmal, “Crayfish-Inspired Cluster Optimization for Efficient Routing in Vehicular Ad Hoc Networks (COANET),” 2024. [Online]. Available: http://xisdxjxsu.asia
[9] A. Dutta, L. M. Samaniego Campoverde, M. Tropea, and F. De Rango, “A Comprehensive Review of Recent Developments in VANET for Traffic, Safety & Remote Monitoring Applications,” Journal of Network and Systems Management, vol. 32, no. 4, Oct. 2024, doi: 10.1007/s10922-024-09853-5.
[10] Ö. Aslan, S. S. Aktuğ, M. Ozkan-Okay, A. A. Yilmaz, and E. Akin, “A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions,” Mar. 01, 2023, MDPI. doi: 10.3390/electronics12061333.
[11] N. G. Praveena, K. Selvaraj, T. Kalaiselvi, S. S. Nath, and D. Prabakaran, “A fuzzy based efficient and blockchain oriented secured routing vehicular Ad-Hoc networks,” Iranian Journal of Fuzzy Systems, vol. 21, no. 6, pp. 15–31, Nov. 2024, doi: 10.22111/ijfs.2024.48069.8461.
[12] M. Lee and T. Atkison, “VANET applications: Past, present, and future,” Vehicular Communications, vol. 28, p. 100310, Apr. 2021, doi: 10.1016/J.VEHCOM.2020.100310.
[13] M. N. Tahir, P. Leviäkangas, and M. Katz, “Connected Vehicles: V2V and V2I Road Weather and Traffic Communication Using Cellular Technologies,” Sensors, vol. 22, no. 3, Feb. 2022, doi: 10.3390/s22031142.
[14] M. A. Al-Shabi and M. A. Al-Shabi, “Evaluation The Performance of MAODV and AODV Protocols In VANETs Models,” 2020. [Online]. Available: https://www.researchgate.net/publication/343473429
[15] A. Sheela Rini and C. Meena, “Dynamic Integration of Fast Furious Cheetah Optimization for Efficient and Secure Routing in Vehicular Ad Hoc Networks,” International Journal of Computer Networks and Applications, vol. 11, no. 2, pp. 248–273, Mar. 2024, doi: 10.22247/ijcna/2024/224449.
[16] M. ul Hassan et al., “ANN-Based Intelligent Secure Routing Protocol in Vehicular Ad Hoc Networks (VANETs) Using Enhanced AODV,” Sensors, vol. 24, no. 3, Feb. 2024, doi: 10.3390/s24030818.
[17] G. Farahani, “Black Hole Attack Detection Using K-Nearest Neighbor Algorithm and Reputation Calculation in Mobile Ad Hoc Networks,” Security and Communication Networks, vol. 2021, 2021, doi: 10.1155/2021/8814141.
[18] M. T. Ahmed, A. A. Rubi, M. S. Rahman, and M. Rahman, “Red-aodv: A prevention model of black hole attack for vanet protocols and identification of malicious nodes in vanet,” International Journal of Computer Networks and Applications, vol. 8, no. 5, pp. 524–537, 2021, doi: 10.22247/ijcna/2021/209985.
[19] D. S. Bhatti, S. Saleem, A. Imran, H. J. Kim, K. Il Kim, and K. C. Lee, “Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions,” Sci Rep, vol. 14, no. 1, Dec. 2024, doi: 10.1038/s41598-024-53938-9.
[20] F. Alifo, D. Martin, and M. Awinsongya Yakubu, “Wormhole Attack Vulnerability Assessment of MANETs: Effects on Routing Protocols and Network Performance,” 2023.
[21] F. Azam, S. K. Yadav, N. Priyadarshi, S. Padmanaban, and R. C. Bansal, “A comprehensive review of authentication schemes in vehicular ad-hoc network,” 2021, Institute of Electrical and Electronics Engineers Inc. doi: 10.1109/ACCESS.2021.3060046.
[22] N. Torabi and B. S. Ghahfarokhi, “Implementation of the IEEE 802.11p/1609.4 DSRC/WAVE in NS-2,” in Proceedings of the 4th International Conference on Computer and Knowledge Engineering, ICCKE 2014, Institute of Electrical and Electronics Engineers Inc., Dec. 2014, pp. 519–524. doi: 10.1109/ICCKE.2014.6993388.
[23] R. Dong, C. She, W. Hardjawana, Y. Li, and B. Vucetic, “Deep Learning for Radio Resource Allocation with Diverse Quality-of-Service Requirements in 5G,” Mar. 2020, [Online]. Available: http://arxiv.org/abs/2004.00507
[24] M. Taufiq, M. F. A. bin Abdullah, and D. Choi, “Wireless LAN Access Point Placement Based on User Mobility,” Wirel Pers Commun, vol. 60, no. 3, pp. 431–440, 2011, doi: 10.1007/s11277-011-0300-0.
Downloads
Published
Issue
Section
Citation Check
License
Copyright (c) 2025 Naufal Faiz Alfarizi, Muhammad Taufiq Nuruzzaman, Shofwatul Uyun, Bambang Sugiantoro, Mohd. Fikri Azli bin Abdullah

This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
-
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
-
NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.
-
No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
- You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation.
- No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License