CFP last date
20 May 2024
Reseach Article

Detection and Elimination of Gray Hole Attack using Dynamic Credit based Technique in MANET

by Shani Makwana, Krunal Vaghela
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 125 - Number 4
Year of Publication: 2015
Authors: Shani Makwana, Krunal Vaghela
10.5120/ijca2015905875

Shani Makwana, Krunal Vaghela . Detection and Elimination of Gray Hole Attack using Dynamic Credit based Technique in MANET. International Journal of Computer Applications. 125, 4 ( September 2015), 1-6. DOI=10.5120/ijca2015905875

@article{ 10.5120/ijca2015905875,
author = { Shani Makwana, Krunal Vaghela },
title = { Detection and Elimination of Gray Hole Attack using Dynamic Credit based Technique in MANET },
journal = { International Journal of Computer Applications },
issue_date = { September 2015 },
volume = { 125 },
number = { 4 },
month = { September },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume125/number4/22417-2015905875/ },
doi = { 10.5120/ijca2015905875 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:15:06.257902+05:30
%A Shani Makwana
%A Krunal Vaghela
%T Detection and Elimination of Gray Hole Attack using Dynamic Credit based Technique in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 125
%N 4
%P 1-6
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad hoc network (MANET) is constructed from various number of nodes, that can be move anywhere and at any time, without any infrastructure. MANETs use wireless connections to connect various networks, without any fixed infrastructure or any centralized administration. Due to this nature of MANET, Ad hoc networks are open to different types of security attacks. The gray hole attack is the attack performed by the node called malicious node, which forwards and drops the selective packets only. Here, in this paper, we have proposed an algorithm which detects and eliminates the gray hole attack using Dynamic Credit Based Technique using AODV routing protocol. The gray hole node is detected based on credit value, which increases or decreases. The simulation results are compared with different situation and attempt to improve the performance of AODV protocol for the parameters like Packet Delivery Fraction, Throughput and End-to-End delay.

References
  1. Hizbullah Khattak, Nizamuddin, “A Hybrid Approach for Preventing Black and Gray Hole Attacks in MANET”, Digital Information Management (ICDIM) Eighth International Conference, pp. 55-57, IEEE September 2013.
  2. M. Kumar, R. Mishra, “An Overview Of MANET: History, Challenges and Applications”, IJCSE, Vol. 3 No. 1, pp. 121-125, Feb-Mar 2012.
  3. Marjan Kuchaki Rafsanjani, Zahra Zahed Anvari, Shahla Ghasemi,“Methods of Preventing and Detecting Black/Gray Hole Attacks on AODV-based MANET”, IJCA Special Issue on “Network Security and Cryptography”, pp.11-17, 2011.
  4. Madhuri Gupta, Krishna Kumar Joshi, “An Innovative Approach to Detect the Gray Hole Attack in AODV based MANET”, International Journal of Computer Applications(0975-8887), Volume 84- No.8, pp. 44-50, December 2013.
  5. Harsh Pratap Singh, Virendra Pal Singh, Rashmi Singh, “Cooperative Blackhole/ Grayhole Attack Detection and Prevention in Mobile Ad hoc Network: A Review”, International Journal of Computer Applications (0975 – 8887), Volume 64– No.3, pp. 16-22, February 2013.
  6. Onkar V. Chandure, V. T. Gaikwad, “Detection & Prevention of Gray Hole Attack in Mobile Ad-Hoc Network using AODV Routing Protocol”, International Journal of Computer Applications(0975-8887), Volume 41- No.5, pp. 27-32, March 2012.
  7. Deepali A. Lokare, A.M Kanthe, Dina Simunic, “Cooperative Gray Hole Attack Discovery and Elimination using Credit based Technique in MANET”, International Journal of Computer Applications (0975-8887), Volume 88-No.15, pp. 13-22, February 2014.
  8. R. H. Jhaveri, S. J. Patel, D. C. Jinwala, “A novel approach for Grayhole and Blackhole attacks in Mobile Ad-hoc Networks”, Second International Conference on Advanced Computing & Communication Technologies, IEEE, pp. 556-560, 2012.
  9. P. Agrawal, R. K. Ghosh, S. K. Das, “Cooperative black and gray hole attacks in mobile ad hoc networks”, In Proceedings of the 2nd International C onference on Ubiquitous Information Management and Communication,pp.-310-314,January-2008.
  10. Yang, H., Shu, J., Meng, X., Lu, S., “SCAN: Self-organized network-layer security in mobile ad hoc networks”, IEEE journal, Vol. 24-No. 2, pp. 261-273, Feb-2006.
  11. S. Jain, M. Jain, H. Kandwal, “Advanced algorithm for detection and prevention of cooperative Black and Gray hole attacks in mobile ad hoc networks”, IJCA (0975-8887), Vol. 1-No. 7, pp. 37-42, 2010.
  12. Sukla Banerjee, "Detection/Removal of Coperative Black and Gray Hole Attack in Mobile Ad-hoc Networks", Proceedings of the World Congress on Engineering and Computer Science 2008, October 22-24, 2008.
  13. C. Siva Ram Murthy, B. S. Manoj "Ad Hoc Wireless Networks: Architectures and Protocols".
  14. Garima Neekhra, Sharda Patel, Ashok Varma "A Literature Review on Detection of Gray Hole Attack in MANET AODV Routing Protocol" International Journal of Emerging Technologies and Engineering (IJETE), Volume 1 Issue 7, August 2014.
  15. Teerawat Issariyakul and Ekram Hossain, "Introduction to Network Simulator NS2 manual", 2009 Edition.
  16. Ashok M. Kanthe, Dina Simunic and Marijan Djurek, "Denial of Service (DoS) Attacks in Green Mobile Adhoc Networks", MIPRO, Opatija, Croatia, pp. 675-680, May 21-25, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

MANET security attacks Gray Hole Attack AODV Routing Protocol NS-2.