p { margin-bottom: 0.1in; direction: ltr; line-height: 120%; text-align: left; }p.western { }p.cjk { }a:link { color: rgb(0, 0, 255); }

In the above scenario, the
malicious vehicle M launches packet drop attack by joining the
network and attracts an active vehicle to broadcast the packet
through itself. This is achieve by sending fake route request
claiming to be an active route with minimal hop count, the packet is
then broadcasted through the malicious vehicle route, when the packet
reaches the malicious vehicle, then it discard and drops the packets.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

The source vehicle

wants to verify location of vehicle

but no direct path exist between them, therefore, it broadcasts a
route request message

to its neighbours to discover a route for sending message to the
destination vehicle.
Hence, only vehicle

has direct path to.
vehicle

start the route discovery process by broadcasting route request
message
to its neighbour’s vehicle and wait for route reply message

. However, a malicious vehicle

will get the RReg message and reply with a fake

message immediately to vehicle

claiming to be correct vehicle having a route to destination
vehicle.
After receiving the false,
node

selects the route established by the malicious node and discards any
forthcoming

messages from valid vehicles. Then, vehicle
will forward the packet to the malicious vehicle and message is drop
by the malicious after receiving from vehicle.

This type of attack can affect
the performance of the network, damage network topology and increase
bandwidth consumption as well as creating unnecessary delay in the
network. These imply that, there is need for enhancing information
exchange in vehicular ad-hoc against malicious acts.

Scenario 2: An
insider attack is considered from a malicious vehicle; the vehicle
successfully masquerades as another by falsifying data and thereby
gaining an illegitimate advantage.
The malicious examines the
importance of the packet
during transmission and can selectively drop the packets. Malicious
node can use this type of threats to completely control the network
operations
(Sneha C.S, 2016).

Written by
admin
x

Hi!
I'm Colleen!

Would you like to get a custom essay? How about receiving a customized one?

Check it out