Performance Evaluation of Vehicular Ad Hoc Networks Considering Malicious Node Impact on Quality of Services Metrics

Authors

  • Naufal Faiz Alfarizi Department of Informatics, UIN Sunan Kalijaga Yogyakarta, Indonesia
  • Muhammad Taufiq Nuruzzaman Department of Informatics, UIN Sunan Kalijaga Yogyakarta, Indonesia
  • Shofwatul Uyun Department of Informatics, UIN Sunan Kalijaga Yogyakarta, Indonesia
  • Bambang Sugiantoro Department of Informatics, UIN Sunan Kalijaga Yogyakarta, Indonesia
  • Mohd. Fikri Azli bin Abdullah Faculty of Information Science and Technology, Multimedia University (MMU), Malaka, Malaysia

DOI:

https://doi.org/10.15575/join.v10i2.1568

Keywords:

Blackhole, Malicious, TIPHON, VANETs, Wormhole

Abstract

Vehicular Ad Hoc Networks (VANETs), a subset of mobile ad hoc networks (MANETs), is essential for enabling communication between vehicles in intelligent transportation systems. However, their dynamic and decentralized nature exposes them to significant security threats, particularly from malicious nodes. Attacks such as black holes and wormholes can severely degrade network performance by causing packet loss and increasing end-to-end delays. This paper aims to evaluate the impact of malicious node behavior on VANET performance using key Quality of Service (QoS) parameters, including throughput, end-to-end delay, jitter, packet delivery ratio (PDR), and packet loss ratio (PLR). The specific objective is to analyze how black hole and wormhole attacks affect communication efficiency in VANET environments. The main contribution of this work lies in the integration of Simulation of Urban Mobility (SUMO) for realistic traffic scenario generation with Network Simulator 3 (NS-3) for detailed network performance evaluation. This approach enables comprehensive simulation of VANET behavior under attack conditions. The findings provide valuable insights into the vulnerabilities of VANETs and form a basis for the design of more robust and secure vehicular communication systems.

References

[1] K. Y. Tsao, T. Girdler, and V. G. Vassilakis, “A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks,” Aug. 01, 2022, Elsevier B.V. doi: 10.1016/j.adhoc.2022.102894.

[2] M. T. Nuruzzaman and H.-W. Ferng, “Routing Protocol for a Heterogeneous MSN With an Intermittent Mobile Sink,” IEEE Sens J, vol. 22, no. 22, pp. 22255–22263, 2022, doi: 10.1109/JSEN.2022.3212197.

[3] M. T. Nuruzzaman and H.-W. Ferng, “Beaconless Geographical Routing Protocol for a Heterogeneous MSN,” IEEE Trans Mob Comput, vol. 21, no. 7, pp. 2332–2343, 2022, doi: 10.1109/TMC.2020.3038628.

[4] M. T. Nuruzzaman and H.-W. Ferng, “Design and evaluation of an LQI-based beaconless routing protocol for a heterogeneous MSN,” Wireless Networks, vol. 26, no. 1, pp. 699–721, 2020, doi: 10.1007/s11276-019-02177-2.

[5] M. ul Hassan et al., “ANN-Based Intelligent Secure Routing Protocol in Vehicular Ad Hoc Networks (VANETs) Using Enhanced AODV,” Sensors, vol. 24, no. 3, Feb. 2024, doi: 10.3390/s24030818.

[6] M. A. Al-Absi, A. A. Al-Absi, M. Sain, and H. Lee, “Moving ad hoc networks—a comparative study,” Sustainability (Switzerland), vol. 13, no. 11, Jun. 2021, doi: 10.3390/su13116187.

[7] V. Chandrasekar et al., “Secure malicious node detection in flying ad-hoc networks using enhanced AODV algorithm,” Sci Rep, vol. 14, no. 1, Dec. 2024, doi: 10.1038/s41598-024-57480-6.

[8] A. Sarwar, S. Anwar, G. Husnain, and M. Akmal, “Crayfish-Inspired Cluster Optimization for Efficient Routing in Vehicular Ad Hoc Networks (COANET),” 2024. [Online]. Available: http://xisdxjxsu.asia

[9] A. Dutta, L. M. Samaniego Campoverde, M. Tropea, and F. De Rango, “A Comprehensive Review of Recent Developments in VANET for Traffic, Safety & Remote Monitoring Applications,” Journal of Network and Systems Management, vol. 32, no. 4, Oct. 2024, doi: 10.1007/s10922-024-09853-5.

[10] Ö. Aslan, S. S. Aktuğ, M. Ozkan-Okay, A. A. Yilmaz, and E. Akin, “A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions,” Mar. 01, 2023, MDPI. doi: 10.3390/electronics12061333.

[11] N. G. Praveena, K. Selvaraj, T. Kalaiselvi, S. S. Nath, and D. Prabakaran, “A fuzzy based efficient and blockchain oriented secured routing vehicular Ad-Hoc networks,” Iranian Journal of Fuzzy Systems, vol. 21, no. 6, pp. 15–31, Nov. 2024, doi: 10.22111/ijfs.2024.48069.8461.

[12] M. Lee and T. Atkison, “VANET applications: Past, present, and future,” Vehicular Communications, vol. 28, p. 100310, Apr. 2021, doi: 10.1016/J.VEHCOM.2020.100310.

[13] M. N. Tahir, P. Leviäkangas, and M. Katz, “Connected Vehicles: V2V and V2I Road Weather and Traffic Communication Using Cellular Technologies,” Sensors, vol. 22, no. 3, Feb. 2022, doi: 10.3390/s22031142.

[14] M. A. Al-Shabi and M. A. Al-Shabi, “Evaluation The Performance of MAODV and AODV Protocols In VANETs Models,” 2020. [Online]. Available: https://www.researchgate.net/publication/343473429

[15] A. Sheela Rini and C. Meena, “Dynamic Integration of Fast Furious Cheetah Optimization for Efficient and Secure Routing in Vehicular Ad Hoc Networks,” International Journal of Computer Networks and Applications, vol. 11, no. 2, pp. 248–273, Mar. 2024, doi: 10.22247/ijcna/2024/224449.

[16] M. ul Hassan et al., “ANN-Based Intelligent Secure Routing Protocol in Vehicular Ad Hoc Networks (VANETs) Using Enhanced AODV,” Sensors, vol. 24, no. 3, Feb. 2024, doi: 10.3390/s24030818.

[17] G. Farahani, “Black Hole Attack Detection Using K-Nearest Neighbor Algorithm and Reputation Calculation in Mobile Ad Hoc Networks,” Security and Communication Networks, vol. 2021, 2021, doi: 10.1155/2021/8814141.

[18] M. T. Ahmed, A. A. Rubi, M. S. Rahman, and M. Rahman, “Red-aodv: A prevention model of black hole attack for vanet protocols and identification of malicious nodes in vanet,” International Journal of Computer Networks and Applications, vol. 8, no. 5, pp. 524–537, 2021, doi: 10.22247/ijcna/2021/209985.

[19] D. S. Bhatti, S. Saleem, A. Imran, H. J. Kim, K. Il Kim, and K. C. Lee, “Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions,” Sci Rep, vol. 14, no. 1, Dec. 2024, doi: 10.1038/s41598-024-53938-9.

[20] F. Alifo, D. Martin, and M. Awinsongya Yakubu, “Wormhole Attack Vulnerability Assessment of MANETs: Effects on Routing Protocols and Network Performance,” 2023.

[21] F. Azam, S. K. Yadav, N. Priyadarshi, S. Padmanaban, and R. C. Bansal, “A comprehensive review of authentication schemes in vehicular ad-hoc network,” 2021, Institute of Electrical and Electronics Engineers Inc. doi: 10.1109/ACCESS.2021.3060046.

[22] N. Torabi and B. S. Ghahfarokhi, “Implementation of the IEEE 802.11p/1609.4 DSRC/WAVE in NS-2,” in Proceedings of the 4th International Conference on Computer and Knowledge Engineering, ICCKE 2014, Institute of Electrical and Electronics Engineers Inc., Dec. 2014, pp. 519–524. doi: 10.1109/ICCKE.2014.6993388.

[23] R. Dong, C. She, W. Hardjawana, Y. Li, and B. Vucetic, “Deep Learning for Radio Resource Allocation with Diverse Quality-of-Service Requirements in 5G,” Mar. 2020, [Online]. Available: http://arxiv.org/abs/2004.00507

[24] M. Taufiq, M. F. A. bin Abdullah, and D. Choi, “Wireless LAN Access Point Placement Based on User Mobility,” Wirel Pers Commun, vol. 60, no. 3, pp. 431–440, 2011, doi: 10.1007/s11277-011-0300-0.

Downloads

Published

2025-08-24

Issue

Section

Article

Citation Check