Call for Paper - January 2015 Edition
IJCA solicits original research papers for the January 2015 Edition. Last date of manuscript submission is December 20, 2014. Read More

A Mechanism for Gray Hole Attack Detection in Mobile Ad–hoc Networks

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 53 - Number 16
Year of Publication: 2012
Authors:
Ashok M. Kanthe
Dina Simunic
Ramjee Prasad
10.5120/8507-2511

Ashok M Kanthe, Dina Simunic and Ramjee Prasad. Article: A Mechanism for Gray Hole Attack Detection in Mobile Adhoc Networks. International Journal of Computer Applications 53(16):23-30, September 2012. Full text available. BibTeX

@article{key:article,
	author = {Ashok M. Kanthe and Dina Simunic and Ramjee Prasad},
	title = {Article: A Mechanism for Gray Hole Attack Detection in Mobile Adhoc Networks},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {53},
	number = {16},
	pages = {23-30},
	month = {September},
	note = {Full text available}
}

Abstract

The mobile ad-hoc networks are vulnerable to Denial of Service (DoS) attacks. MANET has features like self organizing, working as router as well as host having dynamic topology. In MANET, nodes have limited resources like bandwidth, battery power and storage capacity. Gray hole attack is a kind of denial of service (DoS) attack in mobile ad hoc networks. It is specialized type of black hole attack which changes its state from honest to malicious and vice versa. Gray hole attack is an event that degrades the overall network's performance by intentional malicious activity. In this paper, it is proposed the mechanism against gray hole attack and improves the network performance interms of throughput, packet drop rate, packet delivery ratio and normalized routing overhead.

References

  • C. K. Toh, "Ad hoc Mobile Wireless Networks :Protocols and Systems",Prentice Hall ,December 03,2001
  • Jeroen Hoebeke,Ingrid Moerman,Bart Dhoedt,Piet Demeester, "An Overview of Mobile Ad Hoc Networks:Applications and Challenges"Journal of the communication networks,July 2004.
  • Sen J. ,Chandra M. ,Harisha S. G. ,Reddy H. ,Balmuralidhar P. , "A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks",Information, Communications and Signal Processing ,2007,6th International IEEE Conference.
  • Kurosawa S. ,Nakayama H. ,Kato N,Jamalipura A. , and Nemoto Y. ,"Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning method,"International Journal of Network Security ,Vol. 5,No. 3,P. P338-346,Nov. 2007.
  • Gao Xiaopang, Chen Wei,"A novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks"Network and Parallel Computing Workshops,2007,NPC Workshops,2007,IFIP International IEEE Coference.
  • Banerjee S,2008, "Detection/removal of cooperative black and gray hole attack in mobile ad hoc networks"In Proceedings of the World Congress on Engineering and Computer Science.
  • Raj P N,Swades P B, "DPRAODV:A Dynamic Learning System Against Blackhole Attack in AODV based MANET,"International Journal of Computer Science 2:54-59,doi:abs/0909. 2371.
  • Jiwan CAI,Ping YI,Jialin CHEN,Zhiyang WANG,Ning LIU, "An Adaptive Approch to Detecting Black and Gray Hole Attacks in Ad Hoc Networks",Advanced Information Networking and Applications (AINA),2010th IEEE International Conference.
  • Jhaveri R. H. ,Patel S. J. ,Jinwala D. C. , "A Novel Approch for Gray Hole and Black Hole Attacks in Mobile Ad Hoc Networks",Advanced Computing & Communication Technologies (ACCT),2012 Second International Conference on 7-8 Jan 2012,IEEE, ISBN:978-1-4673-0471-9.
  • C. Perkins, E. B. Royer,S. Das, "Ad hoc On Demand Distance Vector(AODV) Routing ,Internet Draft, " RFC 3561,IETF Network Working Group,July 2003.
  • C. Perkins,E. B. Royer, S. Das, "Ad hoc On-Demand Distance Vector Routing," Proceeding of the 2nd IEEE Workshops on Mobile Computing System and Applications (WMCSA),pp. 90-100,1999.
  • Ashok M. Kanthe,Dina Simunic,Marijan Djurek, "Denial of Service (DoS) Attacks in Green Mobile Ad-hoc Networks",MIPRO 2012,IEEE Conference,Proceedings of the 35th International Convention,978-1-4673-2511-6,Opatija,Croatia.
  • Elizabeth M. Royer,Santa Barbara,Chai-Keong Toh,"A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks",IEEE Personal Communication ,April 1999.
  • P. W. Yau,S. Hu and C. J. Mitchell, "Malicious attacks on ad hoc network routing protocol," International Journal of Computer research ,15 no. 1 (2007) 73-100.
  • R. Perlman. Network Layer protocols with Benzantine robustness. Technical Report MIT-LCS-TR-429,Laboratory for computer science, Massachusetts Institute of Technology,October 1988.
  • The network simulator-ns 2. 35 http://www. isi. edu/nsnam/ns.