Performance Analysis of Reactive Routing Protocol on VANET with Wormhole Attack Schemeaper

Main Article Content

Ratnasih Ratnasih
Doan Perdana
Triani Wulandari
M. Irfan Pratama


Entering the information era, the current needs of the global community is increasing very rapidly. Vehicular Ad-hoc Networks (VANET) has drawn significant attention from both industry and academia as an important development of vehicular communication technology. VANET is one of open network and communication media without security mechanism. There are many kinds of security threat that can interrupt data communication in VANET. Wormhole attacks as one of security threat can be a good challenge in VANET security research. In this paper, we evaluate the performance of the reactive routing protocol on VANET with wormhole attack scheme. The project is simulated using NS-3 in Ubuntu platform with performance analysis of routing protocol by changing initial power and node density. We conclude that throughput values are increasing along with the changing of initial power while the delay values are decreasing rapidly. By the changing of node density, the highest delay value is 0.122 ns on 10 nodes condition and 0.215 Mbps for throughput value on 8 nodes condition.


Download data is not yet available.

Article Details

How to Cite
R. Ratnasih, D. Perdana, T. Wulandari, and M. I. Pratama, “Performance Analysis of Reactive Routing Protocol on VANET with Wormhole Attack Schemeaper”, INFOTEL, vol. 10, no. 3, pp. 138-143, Aug. 2018.


[1] N. K. Qureshi and A. H. Abdullah, "Topology Based Routing Protocols for VANET and Their Comparision with Manet," Journal of Theoretical and Applied Information Technology, vol. 58, no. 3, 2013.
[2] B. S. M., J. C. Bernandos and C. Guerrero, "Posisition Based Routing in Vehicular Netwroks : A Survery," Journal of Network and Computer Application, 2012.
[3] E. and A. , "Simulation of Vehicular Movement in VANET," National Institute of Technology Rourkela, 2013.
[4] K. "AODV Routing in VANET for Message Authentication Using ECDSA," in IEEE Conference on Communication and Signal Processing (ICCSP), 2014.
[5] S. Sulistyo and S. Alam, "Distributed Channel and Power Level Selection in VANET Based on SINR using Game Model," International Journal of Communication Networks and Information Security (IJCNIS), vol. 9, no. 3, pp. 432 - 438, 2017.
[6] R. A. and M. K. Mishra, "Mobility Adaptive Density Connected Clustering Approach," International Journal of Communication Networks and Information Security (IJCNIS), vol. 9, no. 2, pp. 222 - 229, 2017.
[7] E. Mustikawati, D. Perdana and R. M. Negara, "Network Security Analysis in VANET Against Black Hole and Jellyfish Attach with Intrusion Detection Algorithm," CommIT (Communication & Information Technology, vol. 11, no. 2, pp. 77 - 83, 2017.
[8] I. P. E and P. Sukanto, "Wireless Sensor Network Teori & Praktek Berbasiskan Open Source," 2015.
[9] M. Zhang and R. S. Wolff, "Routing Protocols for Vehicular Ad Hoc Network in Rural Areas," pp. 1-8.
[10] S. G. N., "Security Threats on Vehicular Ad Hoc Networks (VANET) : A Review Paper," vol. 4, no. 6, pp. 196 - 200, 2013.
[11] R. V. and S. Jain, "Denial of Service Attack in VANET : A Survey," vol. 28, no. 1, pp. 15 - 20, 2015.
[12] V. Bibhu, "Performance Analysis of Black Hole Attack in VANET," pp. 47 - 54, 2012.
[13] T. Wulandari, D. Perdana, and R. M. Negara, "Node Density Performance Analysis on IEEE 802.11ah Standard for VoIP Service," International Journal of Communication Network and Information Security (IJCNIS), vol. 10, no. 1, 2017.
[14] D. Perdana and R. F. Sari, "Performance Evaluation of Corrupted Signal Caused by Random Way Point and Gauss Markov Mobility Model on IEEE 1609.4 Standards," Next Generation Electronics (ISNE), 2015.
[15] G. Carneiro and M. Ricardo, "FlowMonitor - a network monitoring framework for the Network Simulator 3 (NS-3)," [Online]. Available: [Accessed 29 March 2017].