6  CONCLUSIONS 
This  work  analyses  some  routing  threats  over 
VANET.  The  black  hole  attack  has  been  evaluated 
proposing  two  possible  attacks:  one  simple  attack 
applied at the destination and another one that can be 
applied by intermediate nodes that can forge a RREP 
packet and then can perform an inside attack dropping 
data  packets.  To  face  these  security  issues,  it  is 
necessary to use cryptography to provide integrity to 
some field in the RREQ and RREP packets or to use 
a  more  complex  asymmetric  cryptography  to 
authenticate the RREQ and RREP packets providing 
both  authentication  and  integrity.  Both  security 
solutions  have  been  evaluated  considering  different 
scenarios  where  attackers  can  perform  the  simplest 
attack  or  the  smarter black  hole  attack.  The  second 
mitigation  technique  has  been  shown  to  be  more 
effective  increasing  a  little  bit  more  the  AODV 
protocol complexity. 
REFERENCES 
Arif,  M.,  et  al.,  J.,  2019.  A survey on security attacks in 
VANETs: Communication, applications and 
challenges, Vehicular Communications, Volume 19. 
K. Singh, G. Mishra, A. Raheem and M. Kumar Sharma, 
Survey Paper on Routing Protocols in VANET,  2020 
2nd International Conference on Advances in 
Computing, Communication Control and Networking 
(ICACCCN), Greater Noida, India. 
A. D. Devangavi and R. Gupta, 2017. Routing protocols in 
VANET — A survey, 2017 International Conference On 
Smart Technologies For Smart Nation 
(SmartTechCon), Bengaluru, India. 
S. Hayat, X.  Liu, Y. Li  and Y. Zhou,  2019. Comparative 
Analysis of VANET’s Routing Protocol Classes: An 
Overview of Existing Routing Protocol Classes and 
Futuristic Challenges,  2019 IEEE 2nd Int. Con. on 
Electronics Technology (ICET), Chengdu, China, 2019. 
A.F. Santamaria, P. Fazio, P. Raimondo, M. Tropea, F. De 
Rango, 2019. A New Distributed Predictive Congestion 
Aware Re-Routing Algorithm for CO
2
 Emissions 
Reduction,  in  IEEE  Trans.  on  Vehicular  Technology, 
Vol. 68 (5), 2019, pp.4419-4433. 
C. Perkins, E. Belding-Royer, and S. Das. 2003. RFC3561: 
Ad hoc On-Demand Distance Vector (AODV) Routing, 
2003. RFC Editor, USA. 
N. Phull and P. Singh, 2019. A Review on Security Issues in 
VANETs, in 6th International Conference on 
Computing for Sustainable Global Development 
(INDIACom), New Delhi, India, 2019, pp. 1084-1088. 
A.  K.  Goyal,  A.  Kumar  Tripathi  and  G.  Agarwal,  2019. 
Security Attacks, Requirements and Authentication 
Schemes in VANET,  2019 Int. Conf. on Issues and 
Challenges in Intelligent Computing Techniques 
(ICICT), Ghaziabad, India, 2019. 
A.  Fiade,  A.  et  al.  2020.  Performance Analysis of Black 
Hole Attack and Flooding Attack AODV Routing 
Protocol on VANET (Vehicular Ad-Hoc Network), 2020 
8th International Conference on Cyber and IT Service 
Management (CITSM), Pangkal, Indonesia, 2020. 
M. J. Haidari and Z. Yetgin, 2019. Veins based studies for 
vehicular ad hoc networks,  2019 Int.l Artificial 
Intelligence and Data Processing Symposium, Malatya, 
Turkey, 2019. 
OMNeT++  -Simulation  Manual.”  [Online].  Available: 
https://doc.omnetpp.org/omnetpp/manual. 
Inet  Framework.”  [Online].  Available: 
https://inet.omnetpp.org/. 
SUMO  User  Documentation  -Sumo.”  [Online]. 
Available:https://sumo.dlr.de/wiki/SUMO_User_Docu
mentation#Introduction.  
Documentation  -Veins.  [Online].  Available: 
https://veins.car2x.org/documentation/.  
Crypto++ Library: free C++ class library of cryptographic 
schemes[Online] 
https://github.com/weidai11/cryptopp. 
P. Fazio, M.Tropea, M.Voznak, & F. De Rango, (2020). On 
packet  marking  and  Markov  modeling  for  IP 
Traceback: A deep probabilistic and stochastic analysis. 
Computer Networks, 182, 107464. 
F.  De  Rango,  M.  Tropea,  &  P.  Fazio,  (2020,  July). 
Mitigating DoS attacks in IoT EDGE Layer to preserve 
QoS  topics  and  nodes'  energy.  In  IEEE  INFOCOM 
2020-IEEE Conference on Computer Communications 
Workshops. 
F.  De  Rango,  G.  Potrino,  M.  Tropea,  &  P.Fazio,  (2020). 
Energy-aware  dynamic  Internet  of  Things  security 
system  based  on  Elliptic  Curve  Cryptography  and 
Message  Queue  Telemetry  Transport  protocol  for 
mitigating  Replay  attacks.  Pervasive  and  Mobile 
Computing, 61, 101105. 
F. Rezac, et al., Security analysis system to detect threats 
on  a  SIP  VoIP  infrasctructure  elements.  (2011) 
Advances  in  Electrical  and  Electronic  Engineering,  9 
(5), pp. 225-232. 
M.  Mehic,  P.  Fazio,  M.  Voznak,  E.  Chromy,  Toward 
designing  a  quantum  key  distribution  network 
simulation  model,  (2016)  Advances  in  Electrical  and 
Electronic Engineering, 14 (4), pp. 413-420.  
F  De  Rango,  DC  Lentini,  S  Marano,  (2006).  Static  and 
dynamic 4-way handshake solutions to avoid denial of 
service  attack  in  Wi-Fi  protected  access  and  IEEE 
802.11i,  in  EURASIP  Journal  on  Wireless 
Communications and Networking 2006, pp.1-19.