Impact of Blackhole and Wormhole Attacks on DSDV Routing Protocol in VANET: Behavioural Analysis

Impact of Blackhole and Wormhole Attacks on DSDV Routing Protocol in VANET: Behavioural Analysis

Authors

  • Ahmad Yusri Dak Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Perlis Branch, Arau Campus, 02600 Arau Perlis, Malaysia.
  • Nuramarina Nasruddin Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Perlis Branch, Arau Campus, 02600 Arau Perlis, Malaysia.
  • Nur Khairani Kamaruddin 1,2,3Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Perlis Branch, Arau Campus, 02600 Arau Perlis, Malaysia.

DOI:

https://doi.org/10.24191/jcrinn.v10i2.516

Keywords:

VANET, Blackhole, Wormhole, DSDV, SUMO

Abstract

Vehicular Ad-Hoc Networks (VANETs) play a crucial role in Intelligent Transportation Systems (ITS) and the advancement of intelligent vehicles, enabling seamless and reliable communication between vehicles and infrastructure. This communication supports real-time applications such as collision avoidance, traffic control, and driver assistance. However, due to their dynamic topology and open-access medium, VANETs are highly vulnerable to security threats, particularly blackhole and wormhole attacks, which can disrupt data routing and severely degrade network performance. Despite the growing importance of VANETs, there is a limited number of studies that specifically examine the impact of blackhole and wormhole attacks on the Destination-Sequenced Distance-Vector (DSDV) routing protocol. This research addresses that gap by evaluating VANET performance under three conditions: no attack, a blackhole attack, and a wormhole attack. Key performance metrics including Packet Delivery Ratio (PDR), throughput, End-to-End Delay (EED), and Routing Overhead (RO) are analysed across various node densities using NS-2.35 and SUMO 1.18.0. Notably, the results show a 76.9% decline in throughput under the wormhole attack compared to the baseline scenario, highlighting the significant performance degradation caused by such threats. Overall, this study provides valuable quantitative insights into the vulnerabilities of VANETs and underscores the urgent need for more secure and resilient routing protocols to defend against these emerging attacks.

Downloads

Download data is not yet available.

References

Al Rubaiei, M. H., Jassim, H. S., & Sharef, B. T. (2022). Performance analysis of black hole and worm hole attacks in MANETs. International Journal of Communication Networks and Information Security (IJCNIS), 14(1). https://doi.org/10.17762/ijcnis.v14i1.5078

Alifo, F., Doe, M., & Yakubu, M. A. (2023a). Wormhole attack vulnerability assessment of MANETs: Effects on routing protocols and network performance. International Journal of Computer Applications, 185(48), 24-29. https://doi.org/10.5120/ijca2023923312

Alifo, F., Yakubu, M. A., Doe, M., & Asante, M. (2023b). Performance analysis of AODV and DSR routing protocols under blackhole attack using NS-2. Computer Science & Information Technology, 485-496. https://doi.org/10.5121/csit.2023.131339

Asra, S. A. (2022). Security issues of vehicular ad hoc networks (VANET): A systematic review. TIERS Information Technology Journal, 3(1), 17–27. https://doi.org/10.38043/tiers.v3i1.3520

Bhatti, D. S., Saleem, S., Imran, A., Kim, H. J., Kim, K., & Lee, K. (2024). Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions. Scientific Reports, 14, 3428. https://doi.org/10.1038/s41598-024-53938-9

El-Dalahmeh, M., El-Dalahmeh, A., & Adeel, U. (2024). Analysing the performance of AODV, OLSR, and DSDV routing protocols in VANET based on the ECIE method. IET Networks, 13(5–6), 377–394. https://doi.org/10.1049/ntw2.12136

Kaur, G., Khurana, M., & Kaur, A. (2022). Gray hole attack detection and prevention system in vehicular adhoc network (VANET). In 3rd International Conference on Computing, Analytics and Networks (ICAN) (pp. 1-6). IEEE. https://doi.org/10.1109/ICAN56228.2022.10007192

Kaur, T., & Kumar, R. (2018). Mitigation of blackhole attacks and wormhole attacks in wireless sensor networks using AODV protocol. In IEEE International Conference on Smart Energy Grid Engineering (SEGE) (pp. 288–292). IEEE. https://doi.org/10.1109/SEGE.2018.8499473

Kumar, A., Varadarajan, V., Kumar, A., Dadheech, P., Choudhary, S. S., Kumar, V. D. A., Panigrahi, B. K., & Veluvolu, K. C. (2021). Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm. Microprocessors and Microsystems, 80, 103352. https://doi.org/10.1016/j.micpro.2020.103352

Mahmood, J., Duan, Z., Yang, Y., Wang, Q., Nebhen, J., & Bhutta, M. N. M. (2021). Security in vehicular ad hoc networks: Challenges and countermeasures. Security and Communication Networks, 2021(1), 9997771. https://doi.org/10.1155/2021/9997771

Malik, A., Khan, M. Z., Faisal, M., Khan, F., & Seo, J. (2022). An efficient dynamic solution for the detection and prevention of black hole attack in VANETs. Sensors, 22(5), 1897. https://doi.org/10.3390/s22051897

Masruroh, S. U., Farghani, Y. S., Kusdaryono, A., Fiade, A., Putri, R. A., & Pratiwi, L. A. (2022). Comparative analysis of testing black hole attack and rushing attack on VANET (Vehicular Ad-Hoc Network) with AOMDV routing protocol. In International Conference on Engineering and Emerging Technologies (ICEET) (pp. 1–6). IEEE. https://doi.org/10.1109/ICEET56468.2022.10007272

Reshi, I. A., Sholla, S., & Najar, Z. A. (2024). Safeguarding IoT networks: Mitigating black hole attacks with an innovative defense algorithm. Journal of Engineering Research, 12(1), 133–139. https://doi.org/10.1016/j.jer.2024.01.014

Sahoo, A., & Tripathy, A. K. (2023). On routing algorithms in the internet of vehicles: A survey. Connection Science, 35(1), 2272583. https://doi.org/10.1080/09540091.2023.2272583

Downloads

Published

2025-09-01

How to Cite

Dak, A. Y., Nasruddin, N., & Kamaruddin, N. K. (2025). Impact of Blackhole and Wormhole Attacks on DSDV Routing Protocol in VANET: Behavioural Analysis. Journal of Computing Research and Innovation, 10(2), 170–181. https://doi.org/10.24191/jcrinn.v10i2.516

Issue

Section

General Computing
Loading...