An Efficient Black-hole and Worm-hole Attacks Resilient Scheme for Cloud and Fog-Assisted Internet of Vehicles

α
Oladayo O. Olakanmi
Oladayo O. Olakanmi
σ
Mbadiwe S. Benyeogor
Mbadiwe S. Benyeogor
ρ
Kehinde O. Odeyemi
Kehinde O. Odeyemi
α University of Ibadan University of Ibadan

Send Message

To: Author

An Efficient Black-hole and Worm-hole Attacks Resilient Scheme for Cloud and Fog-Assisted  Internet of Vehicles

Article Fingerprint

ReserarchID

CSTB703QR

An Efficient Black-hole and Worm-hole Attacks Resilient Scheme for Cloud and Fog-Assisted  Internet of Vehicles Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

An Efficient Black-Hole and Worm-Hole Attacks Resilient Scheme for Cloud and Fog-Assisted Internet of Vehicles Oladayo O. Olakanmi α

References

19 Cites in Article
  1. Badreddine Cherkaoui,Abderrahim Beni-Hssane,Mohammed Erritali (2017). Black Hole Attack Detection in Vehicular Ad Hoc Networks Using Statistical Process Control.
  2. Xuanxia Yao,Xinlei Zhang,Huansheng Ning,Pengjian Li (2017). Using trust model to ensure reliable data acquisition in VANETs.
  3. H Sanadiki,H Otrok,A Mourad,J.-M Robert (2013). Detecting attacks in QoS-OLSR protocol.
  4. Y-C Hu,A Perrig,D Johnson (2003). Packet leashes: a defense against wormhole attacks in wireless networks.
  5. Fatih Sakiz,Sevil Sen (2017). A Survey of Attacks and Detection Mechanisms on Intelligent Transportation Systems: VANETs and IoV.
  6. Jorge Hortelano,Juan Ruiz,Pietro Manzoni (2010). Evaluating the Usefulness of Watchdogs for Intrusion Detection in VANETs.
  7. T Delkesh,M Jamali (2019). EAODV: Detection and removal of multiple black hole attacks through sending forged packets in MANETs.
  8. Ameneh Daeinabi,Akbar Rahbar (2013). Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks.
  9. Megha Kadam,Suresh Limkar (2014). Performance Investigation of DMV (Detecting Malicious Vehicle) and D&PMV (Detection and Prevention of Misbehave/Malicious Vehicles): Future Road Map.
  10. Uzma Khan,Shikha Agrawal,Sanjay Silakari (2015). Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks.
  11. X Yao,X Zhang,H Ning,P Li (2017). Using trust model to ensure reliable data acquisition in VANETs.
  12. O Wahab,H Otrok,A Mourad (2014). A Dempster-Shafer based tit-fortat strategy to regulate the cooperation in VANET using QoS-OLSR protocol.
  13. Raghad Baiad,Hadi Otrok,Sami Muhaidat,Jamal Bentahar (2014). Cooperative cross layer detection for blackhole attack in VANET-OLSR.
  14. Yunchuan Sun,Lei Wu,Shizhong Wu,Shoupeng Li,Tao Zhang,Li Zhang,Junfeng Xu,Yongping Xiong,Xuegang Cui (2016). Attacks and countermeasures in the internet of vehicles.
  15. Seyed Safi,Ali Movaghar,Misagh Mohammadizadeh (2009). A novel approach for avoiding wormhole attacks in VANET.
  16. Subir Biswas,Jelena Misic (2013). A Cross-Layer Approach to Privacy-Preserving Authentication in WAVE-Enabled VANETs.
  17. Y-C Hu,A Perrig,D Johnson (2003). Packet leashes: a defense against wormhole attacks in wireless networks.
  18. S,L Buttya´n,J. -P Hubaux (2003). SECTOR: secure tracking of node encounters in multi-hop wireless networks.
  19. J Eriksson,S Krishnamurthy,M Faloutsos (2006). TrueLink: a practical countermeasure to the wormhole attack in wireless networks.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Oladayo O. Olakanmi. 2026. \u201cAn Efficient Black-hole and Worm-hole Attacks Resilient Scheme for Cloud and Fog-Assisted Internet of Vehicles\u201d. Global Journal of Computer Science and Technology - B: Cloud & Distributed GJCST-B Volume 22 (GJCST Volume 22 Issue B1): .

Download Citation

Alt text: Infographic of cybersecurity, cloud security, and worm-hole attack prevention methods.
Issue Cover
GJCST Volume 22 Issue B1
Pg. 41- 47
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
D.4.6
Version of record

v1.2

Issue date

November 21, 2022

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 2557
Total Downloads: 48
2026 Trends
Related Research

Published Article

An Efficient Black-Hole and Worm-Hole Attacks Resilient Scheme for Cloud and Fog-Assisted Internet of Vehicles Oladayo O. Olakanmi α

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

An Efficient Black-hole and Worm-hole Attacks Resilient Scheme for Cloud and Fog-Assisted Internet of Vehicles

Oladayo O. Olakanmi
Oladayo O. Olakanmi University of Ibadan
Mbadiwe S. Benyeogor
Mbadiwe S. Benyeogor
Kehinde O. Odeyemi
Kehinde O. Odeyemi

Research Journals