p { margin-bottom: 0.1in; direction: ltr; line-height: 120%; text-align: left; }p.western { }p.cjk { }a:link { color: rgb(0, 0, 255); }In the above scenario, themalicious vehicle M launches packet drop attack by joining thenetwork and attracts an active vehicle to broadcast the packetthrough itself. This is achieve by sending fake route requestclaiming to be an active route with minimal hop count, the packet isthen broadcasted through the malicious vehicle route, when the packetreaches the malicious vehicle, then it discard and drops the packets.

The source vehicle wants to verify location of vehicle but no direct path exist between them, therefore, it broadcasts aroute request message to its neighbours to discover a route for sending message to thedestination vehicle.Hence, only vehicle has direct path to.vehicle start the route discovery process by broadcasting route requestmessageto its neighbour’s vehicle and wait for route reply message . However, a malicious vehicle will get the RReg message and reply with a fake message immediately to vehicle claiming to be correct vehicle having a route to destinationvehicle.After receiving the false,node selects the route established by the malicious node and discards anyforthcoming messages from valid vehicles. Then, vehicle will forward the packet to the malicious vehicle and message is dropby the malicious after receiving from vehicle.

This type of attack can affectthe performance of the network, damage network topology and increasebandwidth consumption as well as creating unnecessary delay in thenetwork. These imply that, there is need for enhancing informationexchange in vehicular ad-hoc against malicious acts.Scenario 2: Aninsider attack is considered from a malicious vehicle; the vehiclesuccessfully masquerades as another by falsifying data and therebygaining an illegitimate advantage.

The malicious examines theimportance of the packetduring transmission and can selectively drop the packets. Maliciousnode can use this type of threats to completely control the networkoperations(Sneha C.S, 2016).

Written by

I'm Colleen!

Would you like to get a custom essay? How about receiving a customized one?

Check it out