Attacks against security in the vehicular network and the impact of Sybil attack and Blackhole attack on the vehicular network performances: average Throughput as a study of case

By Ayoub Toubi, TOMADER Mazri


VANET networks presents a revolution for SMART CITY, networks VANET uses two modes of communication V2V and V2I. Wireless vehicle communication presents vulnerabilities and threats to vehicles and to RSU.  The Communication between vehicles and infrastructure presents a significant security challenge to protect the confidentiality and integrity of data. For this reason, we must understand the types of attacks and their classifications, and make simulations to study their impact on the environment and performance of the vehicular network. In this work we will discuss the challenges security in Vehicular network and we simulate two types of attacks, Blackhole attack and Sybil attack.

Full Text:



J.R. Douceur, The Sybil Attack, IPTPS ’01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, Springer-Verlag, London, UK, 251–260, 2002.

M. Raya, J.P. Hubaux, Securing vehicular ad hoc networks, JCS 15(1), 39–68, 2007

A. Aijaz, B. Bochow, F. Dötzer, A. Festag, M. Gerlach, R. Kroh, T. Leinmüller, Attacks on Inter Vehicle Communication Systems - an Analysis, Proc. WIT, 189–194, 2006.

J. Hortelano , J.C. Ruiz , P. Manzoni , Evaluating the usefulness of watchdogs for intrusion detection in vanets, in: 2010 IEEE International Conference on Com- munications Workshops, 2010, pp. 1–5 .

S. Marti , T.J. Giuli , K. Lai , M. Baker , Mitigating routing misbehavior in mobile ad hoc networks, in: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, 20 0 0, pp. 255–265 .

Loïc Martin. Design of a compact base station antenna for cellular networks. Electronic. UNIVERSITY OF NANTES, 2017. French. p 23

Loïc Martin. Design of a compact base station antenna for cellular networks. Electronic. UNIVERSITY OF NANTES, 2017. French. p 25

P. Papadimitratos , A. De La Fortelle , K. Evenssen , R. Brignolo , S. Cosenza , Vehicular communication systems: Enabling technolo-gies, applications, and future outlook on intelligent transportation, Comm. Mag. 47 (11) (2009) 84–95 .

J. Kenney , Dedicated short-range communications (dsrc) standards in the united states, Proc. IEEE 99 (7) (2011) 1162–1182 .

J. Kenney, "Dedicated Short Range Communication (DSRC) Applications Tutorial, IEEE 802.11-13/0541r1," 14 May 2013. [Online]. Available: [Accessed 29 August 2013].

M. Weiss, "WLAN Tests According to Standard 802.11a / b / g," 28 July 2004. [Online]. Available:

IEEE Std 802.11TM-2012, "IEEE Standard for Local and Metropolitan Area Networks: Wireless MAC LAN and PHY Specifications," [Online]. Available:

P.P.Ray. Journal of King Saud University – Computer and Information Sciences (2018) 30, p.297.

Y. Wang, F. Li, Vehicular Ad Hoc Networks, Springer-Verlag, London, 2009.

M. Raya, J.P. Hubaux, The security of vehicular ad hoc networks, in: Security in Ad Hoc and Sensor Networks (SASN), 2005.

G. Yan, B.B. Bista, D.B. Rawat, E.F. Shaner, General active position detectors protect VANET security, in: Broadband and Wireless Computing, Communication and Applications (BWCCA), 2011, pp. 11–17.

C. Wei, Y. Jianding, L. Xiangjun, The design of electronic license plate recognition terminal system based on nRF24LE1, in: 2012 Fifth International Symposium on Computational Intelligence and Design (ISCID), 2012, pp. 127–129.

F. Cunha, L. Villas, A. Boukerche, G. Maia, A. Viana , R. Mini, A. Loureiro, Data communication in VANETs: Protocols, applications and challenges. Ad Hoc Networks 44 (2016) 90–103 , p 2.

Fatih Sakiz, Sevil Sen,A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV,Ad Hoc Networks,Volume 61,2017,Pages 33-50.

I.A. Sumra , I. Ahmad , H. Hasbullah , others , “Classes of attacks in VANET, in: Electronics, Communications and Photonics Conference (SIECPC), 2011 Saudi International, 2011, pp. 1–5 .

P. Golle, D. Greene, J. Staddon, Detecting and correctingmalicious data in VANETs, VANET ’04: Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, ACM, Philadelphia, PA, USA, 29–37, 2004

S. Pal, A.K. Mukhopadhyay, P.P. Bhattacharya,Defending Mechanisms Against Sybil Attack in Next Generation Mobile Ad Hoc Networks, IEEE Technical Review 25(4), 209–214, 2004

B. Parno, A. Perrig, Challenges in securing vehicular networks, in: Workshop on Hot Topics in Networks (HotNets-IV), 2005.

F. Kargl, Z. Ma, E. Schoch, Security engineering for VANETs, in: 4th Workshop on Embedded Security in Cars, 2006.

M. Raya, J.-P. Hubaux, Securing vehicular ad hoc networks, J. Comput. Secur. 15 (2007) 39–68.

A. Toubi, M. Tomader Security challenges in V2I architectures and proposed solutions.In: 5TH EDITION INTERNATIONAL IEEE CONGRESS on INFORMATION SCIENCE and TECHNOLOGY, Marrakech, Morocco. PP 1-6,2018

International Journal of Information Science and Technology (iJIST) – ISSN: 2550-5114