{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T21:35:45Z","timestamp":1775079345424,"version":"3.50.1"},"reference-count":43,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T00:00:00Z","timestamp":1664236800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJPCC"],"published-print":{"date-parts":[[2023,11,16]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>In vehicular ad hoc networks (VANETs), the information transmitted is broadcast in a free access environment. Therefore, VANETs are vulnerable against attacks that can directly perturb the performance of the networks and then provoke big fall of capability. Black hole attack is an example such attack, where the attacker node pretends that having the shortest path to the destination node and then drops the packets. This paper aims to present a new method to detect the black hole attack in real-time in a VANET network.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>This method is based on capability indicators that are widely used in industrial production processes. If the different capability indicators are greater than 1.33 and the stability ratio (<jats:italic>S<jats:sub>r<\/jats:sub><\/jats:italic>) is greater than 75%, the network is stable and the vehicles are communicating in an environment without the black hole attack. When the malicious nodes representing the black hole attacks are activated one by one, the fall of capability becomes more visible and the network is unstable, out of control and unmanaged, due to the presence of the attacks. The simulations were conducted using NS-3 for the network simulation and simulation of urban mobility for generating the mobility model.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The proposed mechanism does not impose significant overheads or extensive modifications in the standard Institute of Electrical and Electronics Engineers 802.11p or in the routing protocols. In addition, it can be implemented at any receiving node which allows identifying malicious nodes in real-time. The simulation results demonstrated the effectiveness of proposed scheme to detect the impact of the attack very early, especially with the use of the short-term capability indicators (Cp, Cpk and Cpm) of each performance metrics (throughput and packet loss ratio), which are more efficient at detecting quickly and very early the small deviations over a very short time. This study also calculated another indicator of network stability which is <jats:italic>S<jats:sub>r<\/jats:sub><\/jats:italic>, which allows to make a final decision if the network is under control and that the vehicles are communicating in an environment without the black hole attack.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>According to the best of the authors\u2019 knowledge, the method, using capability indicators for detecting the black hole attack in VANETs, has not been presented previously in the literature.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ijpcc-02-2022-0062","type":"journal-article","created":{"date-parts":[[2022,9,24]],"date-time":"2022-09-24T01:45:35Z","timestamp":1663983935000},"page":"734-755","source":"Crossref","is-referenced-by-count":1,"title":["Novel approach of detecting the black hole attack for vehicular ad-hoc networks based on capability indicators"],"prefix":"10.1108","volume":"19","author":[{"given":"Souad","family":"El Houssaini","sequence":"first","affiliation":[]},{"given":"Mohammed-Alamine","family":"El Houssaini","sequence":"additional","affiliation":[]},{"given":"Jamal","family":"El Kafi","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2022,9,27]]},"reference":[{"issue":"1","key":"key2023111507001166900_ref001","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.aci.2015.11.001","article-title":"Real-time detection of MAC layer misbehavior in mobile ad hoc networks","volume":"13","year":"2017","journal-title":"Applied Computing and Informatics"},{"key":"key2023111507001166900_ref002","doi-asserted-by":"publisher","first-page":"100179","DOI":"10.1016\/j.vehcom.2019.100179","article-title":"A survey on security attacks in VANETs: communication, applications and challenges","volume":"19","year":"2019","journal-title":"Vehicular Communications"},{"key":"key2023111507001166900_ref003","article-title":"Pseudonym change-based privacy-preserving schemes in vehicular ad-hoc networks: a survey","volume":"55","year":"2020","journal-title":"Journal of Information Security and Applications"},{"key":"key2023111507001166900_ref004","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.vehcom.2016.09.001","article-title":"Novel cross layer detection schemes to detect blackhole attack against QoS-OLSR protocol in VANET","volume":"5","year":"2016","journal-title":"Vehicular Communications"},{"key":"key2023111507001166900_ref005","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1016\/j.protcy.2013.12.392","article-title":"QoS of MANet through trust based AODV routing protocol by exclusion of black hole attack","volume":"10","year":"2013","journal-title":"Procedia Technology"},{"issue":"1","key":"key2023111507001166900_ref006","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1109\/TITS.2018.2889746","article-title":"A topological approach to secure message dissemination in vehicular networks","volume":"21","year":"2019","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"2","key":"key2023111507001166900_ref007","doi-asserted-by":"publisher","first-page":"1546","DOI":"10.1109\/TVT.2017.2753772","article-title":"Capacity of cooperative vehicular networks with infrastructure support: multi-user case","volume":"67","year":"2018","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"key2023111507001166900_ref008","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.aeue.2022.154172","article-title":"An approach of flow compensation incentive based on Q-learning strategy for IoT user privacy protection","volume":"148","year":"2022","journal-title":"AEU \u2013 International Journal of Electronics and Communications"},{"key":"key2023111507001166900_ref009","doi-asserted-by":"publisher","first-page":"8277","DOI":"10.1016\/j.egyr.2021.07.136","article-title":"Energy-efficient blockchain implementation for cognitive wireless communication networks (CWCNs)","volume":"7","year":"2021","journal-title":"Energy Reports"},{"issue":"6","key":"key2023111507001166900_ref010","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11276-022-02966-2","article-title":"A novel offloading scheduling method for mobile application in mobile edge computing","volume":"28","year":"2022","journal-title":"Wireless Networks"},{"issue":"5","key":"key2023111507001166900_ref011","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.aeue.2020.153134","article-title":"Novel method of mobile edge computation offloading based on evolutionary game strategy for IoT devices","volume":"118","year":"2020","journal-title":"AEU \u2013 International Journal of Electronics and Communications"},{"key":"key2023111507001166900_ref012","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.procs.2015.06.010","article-title":"Gray and black hole attack identification using control packets in MANETs","volume":"54","year":"2015","journal-title":"Procedia Computer Science"},{"key":"key2023111507001166900_ref013","doi-asserted-by":"publisher","first-page":"103352","DOI":"10.1016\/j.micpro.2020.103352","article-title":"Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm","volume":"80","year":"2020","journal-title":"Microprocessors and Microsystems"},{"key":"key2023111507001166900_ref014","doi-asserted-by":"publisher","first-page":"100310","DOI":"10.1016\/j.vehcom.2020.100310","article-title":"VANET applications: past, present, and future","volume":"28","year":"2020","journal-title":"Vehicular Communications"},{"issue":"1","key":"key2023111507001166900_ref015","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.comcom.2020.01.024","article-title":"Adaptive repair algorithm for TORA routing protocol based on flood control strategy","volume":"151","year":"2020","journal-title":"Computer Communications"},{"issue":"12","key":"key2023111507001166900_ref016","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10489-021-02303-8","article-title":"Novel best path selection approach based on hybrid improved a* algorithm and reinforcement learning","volume":"51","year":"2021","journal-title":"Applied Intelligence"},{"key":"key2023111507001166900_ref017","doi-asserted-by":"publisher","first-page":"102213","DOI":"10.1016\/j.simpat.2020.102213","article-title":"A cooperative game based mechanism for autonomous organization and ubiquitous connectivity in VANETs","volume":"107","year":"2020","journal-title":"Simulation Modelling Practice and Theory"},{"key":"key2023111507001166900_ref018","doi-asserted-by":"publisher","first-page":"100247","DOI":"10.1016\/j.vehcom.2020.100247","article-title":"Secure authentication and privacy-preserving techniques in vehicular ad-hoc NETworks (VANETs)","volume":"25","year":"2020","journal-title":"Vehicular Communications"},{"key":"key2023111507001166900_ref019","volume-title":"Introduction to Statistical Quality Control","year":"2008","edition":"6th ed"},{"key":"key2023111507001166900_ref020","doi-asserted-by":"publisher","first-page":"1176","DOI":"10.1016\/j.procs.2019.04.168","article-title":"Black hole attack detection using fuzzy based intrusion detection systems in MANET","volume":"151","year":"2019","journal-title":"Procedia Computer Science"},{"issue":"3","key":"key2023111507001166900_ref021","doi-asserted-by":"publisher","first-page":"761","DOI":"10.32604\/iasc.2021.012806","article-title":"Secure and energy efficient data transmission model for WSN","volume":"27","year":"2021","journal-title":"Intelligent Automation and Soft Computing"},{"issue":"2","key":"key2023111507001166900_ref022","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/bib\/bbab534","article-title":"SRDFM: Siamese response deep factorization machine to improve anti-cancer drug recommendation","volume":"23","year":"2022","journal-title":"Briefings in Bioinformatics"},{"issue":"3\/4","key":"key2023111507001166900_ref023","doi-asserted-by":"crossref","first-page":"364","DOI":"10.2307\/2332087","article-title":"On the extreme individuals and the range of samples taken from a normal population","volume":"17","year":"1925","journal-title":"Biometrika"},{"issue":"2","key":"key2023111507001166900_ref024","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.eij.2016.11.003","article-title":"Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET)","volume":"18","year":"2017","journal-title":"Egyptian Informatics Journal"},{"key":"key2023111507001166900_ref025","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.procs.2020.01.091","article-title":"Certain investigation on MANET security with routing and blackhole attacks detection","volume":"165","year":"2019","journal-title":"Procedia Computer Science"},{"issue":"3","key":"key2023111507001166900_ref026","doi-asserted-by":"publisher","first-page":"1779","DOI":"10.1109\/TWC.2019.2897296","article-title":"Optimal base station antenna downtilt in downlink cellular networks","volume":"18","year":"2019","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"7","key":"key2023111507001166900_ref027","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.asoc.2019.03.053","article-title":"New quantum-genetic based OLSR protocol (QG-OLSR) for mobile ad hoc network","volume":"80","year":"2019","journal-title":"Applied Soft Computing"},{"issue":"5","key":"key2023111507001166900_ref028","doi-asserted-by":"publisher","first-page":"1866","DOI":"10.1007\/s10489-018-1368-y","article-title":"Novel self-adaptive routing service algorithm for application of VANET","volume":"49","year":"2019","journal-title":"Applied Intelligence"},{"issue":"15","key":"key2023111507001166900_ref029","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2017.03.025","article-title":"Novel unequal clustering routing protocol considering energy balancing based on network partition and distance for mobile education","volume":"88","year":"2017","journal-title":"Journal of Network and Computer Applications"},{"issue":"4","key":"key2023111507001166900_ref030","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1109\/TSC.2014.2370642","article-title":"A novel approach to mapped correlation of ID for RFID anti-collision","volume":"7","year":"2014","journal-title":"IEEE Transactions on Services Computing"},{"issue":"7","key":"key2023111507001166900_ref031","doi-asserted-by":"crossref","first-page":"1817","DOI":"10.1007\/s00500-014-1366-x","article-title":"A novel multicast routing method with minimum transmission for WSN of cloud computing service","volume":"19","year":"2015","journal-title":"Soft Computing"},{"issue":"2","key":"key2023111507001166900_ref032","doi-asserted-by":"publisher","first-page":"1175","DOI":"10.1007\/s10586-021-03532-9","article-title":"Task offloading method of edge computing in internet of vehicles based on deep reinforcement learning","volume":"25","year":"2022","journal-title":"Cluster Computing"},{"issue":"6","key":"key2023111507001166900_ref033","doi-asserted-by":"crossref","first-page":"3587","DOI":"10.1007\/s11276-019-01955-2","article-title":"Novel approach of distributed and adaptive trust metrics for MANET","volume":"25","year":"2019","journal-title":"Wireless Networks"},{"issue":"4","key":"key2023111507001166900_ref034","doi-asserted-by":"publisher","first-page":"2891","DOI":"10.1007\/s11276-021-02624-z","article-title":"A new algorithm of clustering AODV based on edge computing strategy in IOV","volume":"27","year":"2021","journal-title":"Wireless Networks"},{"issue":"1","key":"key2023111507001166900_ref035","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1109\/TII.2013.2250910","article-title":"An energy-balanced routing method based on forward-aware factor for wireless sensor network","volume":"10","year":"2014","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"key2023111507001166900_ref036","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.comcom.2021.11.012","article-title":"A novel edge computing architecture based on adaptive stratified sampling","volume":"183","year":"2022","journal-title":"Computer Communications"},{"issue":"11","key":"key2023111507001166900_ref037","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.aeue.2020.153372","article-title":"New algorithm of multi-strategy channel allocation for edge computing","volume":"126","year":"2020","journal-title":"AEU \u2013 International Journal of Electronics and Communications"},{"issue":"1","key":"key2023111507001166900_ref038","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.neucom.2020.09.042","article-title":"A new method of data missing estimation with FNN-based tensor heterogeneous ensemble learning for internet of vehicle","volume":"420","year":"2021","journal-title":"Neurocomputing"},{"issue":"4","key":"key2023111507001166900_ref039","doi-asserted-by":"publisher","first-page":"1517","DOI":"10.1109\/TITS.2018.2853165","article-title":"New multi-hop clustering algorithm for vehicular ad hoc networks","volume":"20","year":"2019","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"1","key":"key2023111507001166900_ref040","doi-asserted-by":"publisher","first-page":"158514","DOI":"10.1109\/ACCESS.2019.2950266","article-title":"A new method of mobile ad hoc network routing based on greed forwarding improvement strategy","volume":"7","year":"2019","journal-title":"IEEE Access"},{"issue":"1","key":"key2023111507001166900_ref041","first-page":"69058","article-title":"A multi-path routing protocol based on link lifetime and energy consumption prediction for mobile edge computing","volume":"8","year":"2020","journal-title":"IEEE Access"},{"key":"key2023111507001166900_ref042","unstructured":"Network Simulator NS-3 (2022), available at: www.nsnam.org\/ (accessed 03 May 2022)."},{"key":"key2023111507001166900_ref043","unstructured":"Simulation of Urban MObility (2022), available at: http:\/\/sumo.sourceforge.net\/ (accessed 03 May 2022)."}],"container-title":["International Journal of Pervasive Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJPCC-02-2022-0062\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJPCC-02-2022-0062\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:05:15Z","timestamp":1753394715000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ijpcc\/article\/19\/5\/734-755\/163343"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,27]]},"references-count":43,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2022,9,27]]},"published-print":{"date-parts":[[2023,11,16]]}},"alternative-id":["10.1108\/IJPCC-02-2022-0062"],"URL":"https:\/\/doi.org\/10.1108\/ijpcc-02-2022-0062","relation":{},"ISSN":["1742-7371","1742-7371"],"issn-type":[{"value":"1742-7371","type":"print"},{"value":"1742-7371","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,27]]}}}