Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


July Edition 2023

International Journal of Applied Information Systems solicits high quality original research papers for the July 2023 Edition of the journal. The last date of research paper submission is June 15, 2023.

Performance Evaluation of the Techniques to Mitigate Blackhole Attack in VANETs

Lalit Kumar, Pawan Kumar Dahiya Published in Wireless

International Journal of Applied Information Systems
Year of Publication: 2015
© 2015 by IJAIS Journal
Download full text
  1. Lalit Kumar and Pawan Kumar Dahiya. Article: Performance Evaluation of the Techniques to Mitigate Blackhole Attack in VANETs. International Journal of Applied Information Systems 9(4):69-72, July 2015. BibTeX

    	author = "Lalit Kumar and Pawan Kumar Dahiya",
    	title = "Article: Performance Evaluation of the Techniques to Mitigate Blackhole Attack in VANETs",
    	journal = "International Journal of Applied Information Systems",
    	year = 2015,
    	volume = 9,
    	number = 4,
    	pages = "69-72",
    	month = "July",
    	note = "Published by Foundation of Computer Science, New York, USA"


Vehicular Adhoc Network (VANET), an integrated part of Intelligent Transportation System (ITS), is a real-life illustration of a self-organized Adhoc network for communication between vehicles and roadside infrastructure. VANETS has several security issues and Blackhole attack is one of those. The paper discusses Blackhole attack in VANETs and various solutions for it.


  1. Lalit Kumar, Pawan Kumar Dahiya, "Security issues in VANETs: A Review," TEQIP Sponsored National Conference on Advances in Electronics and Communication Technologies, 29-30 January, 2015.
  2. Bhoomika Patel, Khushboo Trivedi, "A Review - Prevention and Detection of Black Hole Attack in AODV based on MANET," International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014, 2816-2818.
  3. Rashmi Raiya, Shubham Gandhi, "Survey of Various Security Techniques in VANET," International Journal of Advanced Research in Computer Science and Software Engineering, volume 4, Issue 6, June 2014.
  4. Priyambada Sahu, Sukant Kishoro Bisoy, Soumya Sahoo," Detecting and Isolating Malicious Node in AODV Routing Algorithm," International Journal of Computer Applications (0975 – 8887) Volume 66– No. 16, March 2013.
  5. Ram Shringar Raw, Manish Kumar, Nanhay Singh, "Security Challenges, Issues and Their Solutions for VANET," International Journal of Network Security & Its Applications (IJNSA), vol. 5, No. 5, September 2013.
  6. Mostofa Kamal Nasir, A. S. M. Delowar Hossain, Md. Sazzad Hossain, Md. Mosaddik Hasan, Md. Belayet Ali, "Security Challenges And Implementation Mechanism For Vehicular Ad Hoc Network," International Journal Of Scientific & Technology Research volume 2, Issue 4, April 2013.
  7. Harjeet Kaur, Manju Bala and Varsha Sahni, "Study of Blackhole Attack Using Different Routing Protocols in MANET," International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering Vol. 2, Issue 7, July 2013.
  8. Harmandeep Singh, Manpreeet Singh, "Effect of Black Hole Attack on AODV, OLSR and ZRP Protocol in MANETs," Volume 2, No. 3, May - June 2013 International Journal of Advanced Trends in Computer Science and Engineering.
  9. Himani Yadav and Rakesh Kumar, " Identification and Removal of Black Hole Attack for Secure Communication in MANETs," International Journal of Computer Science and Telecommunications [Volume 3, Issue 9, September 2012.
  10. Ajay Rawat, Santosh Sharma and Rama Sushil, "VANET: Security Attacks and Its Possible Solutions," Journal of Information and Operations Management, volume 3, Issue 1, 2012, pp-301-304.
  11. Vimal Bibhu, Kumar Roshan, Dr. Kumar Balwant Singh and Dr. Dhirendra Kumar Singh, "Performance Analysis of Black Hole Attack in VANETs," I. J. Computer Network and Information Security, 2012, 11, 47-54.
  12. Gagandeep, Aashima and Pawan Kumar, " Analysis of Different Security Attacks in MANETs on Protocol Stack A-Review," International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-5, June 2012.
  13. Priyanka Goyal, Vinti Parmar, Rahul Rishi, "MANET:Vulnerabilities, Challenges, Attacks, Application,"International Journal of Computational Engineering &Management (IJCEM), pp. 32-37, 2011.
  14. Ming-Yang Su, "Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems," Elsevier, Computer Communications 34 (2011) 107–117.
  15. Soufiene Djahel, Farid Na¨?t-abdesselam, and Zonghua Zhang, "Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges," Ieee Communications Surveys & Tutorials, Vol. 13, No. 4, Fourth Quarter 2011.
  16. Kamarularifin Abd. Jalil, Zaid Ahmad, Jamalul-Lail AbManan,"Mitigation of Black Hole Attacks for AODV Routing Protocol", Society of Digital Information and Wireless Communications (SDIWC) Vol01_No02_30, 2011.
  17. G. Samara, et al. , "Security Issues And Challenges Of Vehicular Ad Hoc Networks (VANET)," 4th International Conference on New Trends in Information Science and Service Science (NISS), 2010, pp. 393-398.
  18. E. A. Mary Anita and V. Vasudevan, "Performance Evaluation of mesh based multicast reactive routing protocol under black hole attack," IJCSIS, Vol. 3, No. 1, 2009.
  19. Payal N. Raj, Prashant B. Swadas, " DPRAODV: A Dyanamic Learning System Against Blackhole Attack In AODV Based Manet,"arXiv:0909. 2371,2009.
  20. Yaseer Toor et al. , "Vehicle Ad Hoc Networks: Applications and Related Technical issues," IEEE Communications surveys & Tutorials, 3rd quarter 2008, vol 10, No 3, pp. 74-88.
  21. Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto, " Detecting Blackhole Attack on AODV based Mobile Ad hoc networks by Dynamic Learning Method," International Journal of Network Security, Vol. 5, No. 3, PP. 338–346, Nov 2007.
  22. Bo, M. S. , Xiao, H. , Adereti, A. , Malcolm, A. J. ,Christianson, B, "A Performance Comparison of Wireless Ad hoc Network Routing Protocols under Security Attack," Third International Symposium on Information Assurance and Security, pp. 50-55, 2007.