An Efficient Black-hole and Worm-hole Attacks Resilient Scheme for Cloud and Fog-Assisted Internet of Vehicles

Article ID

CSTB703QR

Alt text: Infographic of cybersecurity, cloud security, and worm-hole attack prevention methods.

An Efficient Black-hole and Worm-hole Attacks Resilient Scheme for Cloud and Fog-Assisted Internet of Vehicles

Oladayo O. Olakanmi
Oladayo O. Olakanmi University of Ibadan
Mbadiwe S. Benyeogor
Mbadiwe S. Benyeogor
Kehinde O. Odeyemi
Kehinde O. Odeyemi
DOI
Library with multiple readers studying and researching with computers and bookshelves.

Abstract

The Internet of Vehicles (IoV) is a distributed network that supports the use of data created by connected cars and vehicular ad-hoc networks (VANETs) for real-time communication among the vehicles and other infrastructures in the network. Although, IoV increases safety and efficient information exchange in transportation, its inter-connectivity exposes the vehicles and the people to different cyber-attacks such as black-hole and worm-hole which are capable of disrupting the network. In this paper, we identify the black-hole and worm-hole attacks as the major security threats to the IoV technology. We then propose periodic-time slicing and trust factor approaches to detect and prevent a black-hole attack and a cryptography procedure to prevent other IoV related cyber-attacks.

An Efficient Black-hole and Worm-hole Attacks Resilient Scheme for Cloud and Fog-Assisted Internet of Vehicles

The Internet of Vehicles (IoV) is a distributed network that supports the use of data created by connected cars and vehicular ad-hoc networks (VANETs) for real-time communication among the vehicles and other infrastructures in the network. Although, IoV increases safety and efficient information exchange in transportation, its inter-connectivity exposes the vehicles and the people to different cyber-attacks such as black-hole and worm-hole which are capable of disrupting the network. In this paper, we identify the black-hole and worm-hole attacks as the major security threats to the IoV technology. We then propose periodic-time slicing and trust factor approaches to detect and prevent a black-hole attack and a cryptography procedure to prevent other IoV related cyber-attacks.

Oladayo O. Olakanmi
Oladayo O. Olakanmi University of Ibadan
Mbadiwe S. Benyeogor
Mbadiwe S. Benyeogor
Kehinde O. Odeyemi
Kehinde O. Odeyemi

No Figures found in article.

Oladayo O. Olakanmi. 2026. “. Global Journal of Computer Science and Technology – B: Cloud & Distributed GJCST-B Volume 22 (GJCST Volume 22 Issue B1): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Issue Cover
GJCST Volume 22 Issue B1
Pg. 41- 47
Classification
D.4.6
Keywords
Article Matrices
Total Views: 2511
Total Downloads: 20
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

An Efficient Black-hole and Worm-hole Attacks Resilient Scheme for Cloud and Fog-Assisted Internet of Vehicles

Oladayo O. Olakanmi
Oladayo O. Olakanmi University of Ibadan
Mbadiwe S. Benyeogor
Mbadiwe S. Benyeogor
Kehinde O. Odeyemi
Kehinde O. Odeyemi

Research Journals