CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Detection and Removal of Cooperative Black/Gray hole attack in Mobile AdHoc Networks

by Vishnu K, Amos J Paul
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 22
Year of Publication: 2010
Authors: Vishnu K, Amos J Paul
10.5120/445-679

Vishnu K, Amos J Paul . Detection and Removal of Cooperative Black/Gray hole attack in Mobile AdHoc Networks. International Journal of Computer Applications. 1, 22 ( February 2010), 38-42. DOI=10.5120/445-679

@article{ 10.5120/445-679,
author = { Vishnu K, Amos J Paul },
title = { Detection and Removal of Cooperative Black/Gray hole attack in Mobile AdHoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 22 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 38-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number22/445-679/ },
doi = { 10.5120/445-679 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:43:10.621233+05:30
%A Vishnu K
%A Amos J Paul
%T Detection and Removal of Cooperative Black/Gray hole attack in Mobile AdHoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 22
%P 38-42
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad hoc networks (MANET) are widely used in places where there is little or no infrastructure. A number of people with mobile devices may connect together to form a large group. Later on they may split into smaller groups. This dynamically changing network topology of MANETs makes it vulnerable for a wide range of attack. In this paper we propose a complete protocol for detection & removal of networking Black/Gray Holes.

References
  1. "Security Issues in Mobile Ad Hoc Networks- A Survey" Wenjia Li and Anupam Joshi, Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County.
  2. Hongmei Deng, Wei Li, and Dharma P. Agrawal, "Routing Security in Wireless Ad Hoc Network", IEEE Communications Magzine, vol. 40, pp. 70-75, 2002.
  3. Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon, and Kendall Nygard, "Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks". In Proceedings of 2003 International Conference on Wireless Networks (ICWN'03), Las Vegas, Nevada, USA, pp. 570-575.
  4. Sukla Banerjee "Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks" Proceedings of the World Congress on Engineering and Computer Science 2008 WCECS 2008, October 22 - 24, 2008, San Francisco, USA
  5. Piyush Agrawal, R. K. Ghosh, Sajal K. Das, Cooperative Black and Gray Hole Attacks in Mobile Ad Hoc Networks In Proceedings of the 2nd international conference on Ubiquitous information management and communication, Pages 310-314, Suwon, Korea, 2008.
  6. Sudath Indrasinghe, Rubem Pereira, John Haggerty,"Conflict Free Address Allocation Mechanism for Mobile Ad Hoc Networks", 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)
  7. Mansoor Mohsin and Ravi Prakash,"IP Address Assignment in a mobile ad hoc network", The University of Texas at Dallas Richardson, TX Kaixin Xu, Xiaoyan Hong, Mario Gerla Computer Science Department at UCLA, Los Angeles, CA 90095 project under contract N00014-01-C-0016
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad-hoc Networks Black Holes Gray Holes Routing AODV Routing Table