International Journal of Computer Science Trends and Technology (IJCST) Volume 6 Issue 1, Jan - Feb 2018 ISSN: 2347-8578 www.ijcstjournal.org Page 6 Analysis Study of Routing Protocols Performance and RSU Attack for E-Call Service in VANET Nour Hasan Agha [1] , Majd Zhlat [2] , Mothanna Alkubeily [3] , Ahmad S. Ahmad [4] Fourth Year Student [1] , Assistant Professor [4] Department of Medical Engineering Al-Andalus University, Alkadmous - Tartous, Syria Fifth Year Student [2] , Assistant Professor [3] Department of Mechanical and Electrical Engineering Tishreen University, Lattakia, Syria ABSTRACT The aim of our paper is to study some protocols used in Vehicular ad-hoc networks (VANET) for medical applications, using the Network Simulator (NS2), by applying two scenarios. The first is applied in a crowded area such as city centers, and the second is applied to the less crowded areas such as the countryside. In addition, we study the types of attacks on these networks and their effects on the network, we will focus our study on the analysis of the RSU attack based on the VANETSIM simulator and discuss the results. Keywords :VANET, AODV, DSDV, e-call service, VANETsim. I. INTRODUCTION VANET (Vehicular Ad-hoc NETwork) is a self-regulated, decentralized network consisting of a range of mobile, transceiver and Global Position System vehicles, designed specifically to provide connectivity between vehicles or between them and Roadside Unit (RSU), which is located on the roadside [1]. The new vehicle technologies are evolving with new technologies such as electronic minds and communication devices to make road use more comfortable and secure. The vehicles communicate directly with each other without the need to go through the road infrastructure; the goal is to increase safety by sending the required information from one vehicle to another, for example, a vehicle that detects an ice road tells the vehicles traveling from the opposite side of the road. We use roadside units (RSUs), to gather, collect and analyse information transmitted in real time, and then generate traffic information, which include intermediate speed of vehicles, vehicle density and events such as traffic congestion. Then, this information is transmitted to vehicles at a relatively close distance, suitable for urban transport. Each car will be equipped with an 802.11 or 802.16 WiMAX wireless device to enable cars to communicate with each other, as well as RSU to connect remote cars to one another or to connect to the Internet, and even connect trains and aircraft to this network, making the volume of information exchange very large. However, these networks are not safe enough and are on the focus of the attackers who used their wireless communications to launch attacks on them to achieve their own goals [2]. The most important applications in VANET [3], which aim to reduce road traffic injuries and deaths, include: Avoid collisions and detect road obstacles, Driver Assisting Service, E-call service. E-call service is a project initiated by the European Commission [4], which aims to provide rapid assistance to drivers by sharing a collision anywhere in the EU. In case of failure, the e-call vehicle calls the nearest emergency center, even if the passengers are unable to connect; due to injuries sustained during the incident. Medical services are one of the most important applications of the VANET Networks. Due to the wireless connections in VANET, the security of these networks is one of the most important challenges. Due to the problems that can be caused by any security failure in these networks of human accidents in the first place, traffic congestion, and disruption of the interests of the population and passengers, and comfort in the second class. We will simulate two different scenarios using (VANETsim) to study, analyse one of the types of attacks on the network. The reminder of this paper is organized as follows: In section II, we study the routing protocols and the attacks in VANET networks.. In section III, we compare two routing protocols for e-call service using ns-2 and we evaluate the RSU attack over VANET using VANETsim. Finally, conclusion and future work are presented in section IV. II. RELATED WORKS A. Routing Protocols in VANET Networks Routing protocols in VANET are classified into two main categories [5-8] as shown in fig (1). RESEARCH ARTICLE OPEN ACCESS