Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

To Evaluate and Improve ZRP Protocol to Detect and Isolate Gray Hole Attack in Mobile Ad-hoc Network

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Rajwinder Kaur, Vinay Bharadwaj
10.5120/ijca2016911569

Rajwinder Kaur and Vinay Bharadwaj. To Evaluate and Improve ZRP Protocol to Detect and Isolate Gray Hole Attack in Mobile Ad-hoc Network. International Journal of Computer Applications 150(12):25-29, September 2016. BibTeX

@article{10.5120/ijca2016911569,
	author = {Rajwinder Kaur and Vinay Bharadwaj},
	title = {To Evaluate and Improve ZRP Protocol to Detect and Isolate Gray Hole Attack in Mobile Ad-hoc Network},
	journal = {International Journal of Computer Applications},
	issue_date = {September 2016},
	volume = {150},
	number = {12},
	month = {Sep},
	year = {2016},
	issn = {0975-8887},
	pages = {25-29},
	numpages = {5},
	url = {http://www.ijcaonline.org/archives/volume150/number12/26147-2016911569},
	doi = {10.5120/ijca2016911569},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

The mobile ad-hoc network is a type of network which has decentralized and self configuring nature. Due to which malicious nodes may join the network which is responsible to trigger various type of active and passive attacks. In this work, technique will be proposed which will improve in zonal routing protocol. In the zonal routing protocol whole network is divided into zones, in each zone zonal heads are selected which is responsible to route the data from one zone to another zone. In this work, selective routing attack is possible which reduce network performance. The improvement in the zonal routing protocol will be proposed which will be based on the monitor mode technique. In the monitor mode technique, each technique will watch its adjacent technique and node which is responsible to drop packets will be detected as malicious node from the network.

References

  1. A. Samuel Chellathuri, E. D. (2013). ''EZRP: Evolutionary Zone Routing Protocol''. ICACCS , 1-5.
  2. Ashish K. Maurya, D. S. (Nov,2013). "Simulation based Performance Comparison of AODV, FSR and ZRP Routing Protocolin Manet". IJCA , 23-28.
  3. Awadesh Kumar, P. S. (July,2013). ''Performance Anaysis Of AODV ,CBRP,DSDV and DSR MANET Routing Protocols using NS2 sIMULATION''. I.J Computer Network and Information Security , 45-50.
  4. Deepak Kumar, S. C. (May,2012). ''Performance Comparison Of DSDV and AODV Routing Protocols in MANET''. IJECCT , 120-124.
  5. Divangna Gupta, R. K. (aug,2014). Simulationof Different Routing Protocols in MANET Using NS2. International journal of Scientific and Research Publication , 1-5.
  6. Ginni Tonk, I. K. (June,2012). ''Performance Comparison Of Ad-Hoc Network Routing Protocols Using NS2''. IJITEE , 53-57.
  7. Jaydip Sen, H. R. (2007). ''A Mechanism for Detection of GRAY Hole Attack in Moile Ad-Hoc Network''. ICICS , 1-5.
  8. M Ravi Kumar, D. G. (2013). ''Performance Evaluation of AODV and FSR Routing Protocol in MANET. GJCST , 1-7.
  9. Onkar V.Chandure, A. P. (NOV,2012). Simlation of secure AODVin Gray-hole Attack for Mobile ad-hoc Network. IJAET , 67-75.
  10. Onkar V.Chandure, P. (2011). ''A Mechanism for Recognition & Eradication of Gray Hole Attack using AODV Routing protocol in MANET''. IJCSIT , 2607-2611.
  11. Preeti Gharwar, M. S. (April,2013). "Performance Comparison Of Routing Protocols''. IJARCCE , 1920-1924.
  12. Rutvij H. Jhaveri, D. C. (2012). ''A Novel Gray Hole and Black Hole Attacks in Mobile Ad-Hoc Networks''. International Conference on Advanced Computing& Communicaion Technologies'' , 556-560.
  13. Zaiba Ishrat, P. s. (2013). ''Performance Evaluation Of DSDV, DSR and ZRP pROTOCOL in MANET''. IJCAT , 345-349.

Keywords

MANET, Attacks, Gray-hole, Throughput, ZRP, internal attacks