CFP last date
20 May 2024
Reseach Article

Exposure and Mitigation of the Gray Hole Attack from AODV in Mobile Ad hoc Network: An Approach

by Ruchi Tiwari, Jyoti Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 165 - Number 5
Year of Publication: 2017
Authors: Ruchi Tiwari, Jyoti Jain
10.5120/ijca2017913861

Ruchi Tiwari, Jyoti Jain . Exposure and Mitigation of the Gray Hole Attack from AODV in Mobile Ad hoc Network: An Approach. International Journal of Computer Applications. 165, 5 ( May 2017), 23-28. DOI=10.5120/ijca2017913861

@article{ 10.5120/ijca2017913861,
author = { Ruchi Tiwari, Jyoti Jain },
title = { Exposure and Mitigation of the Gray Hole Attack from AODV in Mobile Ad hoc Network: An Approach },
journal = { International Journal of Computer Applications },
issue_date = { May 2017 },
volume = { 165 },
number = { 5 },
month = { May },
year = { 2017 },
issn = { 0975-8887 },
pages = { 23-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume165/number5/27570-2017913861/ },
doi = { 10.5120/ijca2017913861 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:11:36.715560+05:30
%A Ruchi Tiwari
%A Jyoti Jain
%T Exposure and Mitigation of the Gray Hole Attack from AODV in Mobile Ad hoc Network: An Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 165
%N 5
%P 23-28
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless ad hoc network is a collection of mobile nodes and all nodes behave as router or host. Due to its dynamic nature and lack of central authority security is challenging task. The nodes of network may compromise from the various security threats and can leak the personal information. Numerous security threats such as Denial of Service, black hole attack, Gray-hole attack, Worm hole, Sybil attack and jamming may be used by attacker to damage the network security. Gray hole attack is one the security threat which selectively drop the packets. In this paper, proposes an probabilistic approach with IDS (Intrusion Detection System) which detect and mitigate the gray hole attack effectively. The simulation of the propose approach is done in NS2.34 network simulation and comparative analysis is perform among the performance metrics such as Throughput, Packet Delivery Ratio and Routing load etc.

References
  1. V. Dharman, G. Venkatachalam “ Detection of Gray Hole Attack in AODV for MANETs by using Secure Message Digest”, South Asian Journal of Engineering and Technology Vol.2, No.17 321–329 (2016).
  2. Aarti, S. S. Tyagi “Study of MANET: Characteristics, Challenges, Application and Security Attacks”, International Journal of Advanced Research in Computer Science and Software Engineering May - 2013.
  3. Jyoti Jain, Mehajabeen Fatima, Dr. Roopam Gupta, Dr..K.Bandhopadhyay “OVERVIEW AND CHALLENGES OF ROUTING PROTOCOL AND MAC LAYER IN MOBILE AD-HOC NETWORK” Journal of Theoretical and Applied Information Technology 2005 - 2009 JATIT.
  4. Sudheer Kumar, Nitika Vats Dushan “A Modified Approach for Recognition and Eradication of Extenuation of Gray-Hole Attack in MANET using AODV Routing Protocol”, Symposium on Colossal Data Analysis and Networking (CDAN), in proceeding of IEEE 2016.
  5. Ankita Rana, Er. Ankita Mittal “A Mechanism For Detection and Prevention of Multiple Gray Hole Attack In Wireless Sensor Networks”, IJARIIE Vol-2 Issue-1, ISSN (O)-2395-4396 2016.
  6. Neema Soliyal, H. S. Bhadauria “Preventing Packet Dropping Attack on AODV Based Routing in Mobile Ad-Hoc MANET”, Intl. Conference on Advances in Computing, Communications and Informatics (ICACCI), Sept. 21-24, Jaipur, India. Pradeep R. Dumne, Arati Manjaramkar “Cooperative Bait Detection Scheme to prevent proceeding of IEEE 2016.
  7. S. Corson and J. Macker, RFC 2501, “Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations,” Jan. 1999.
  8. C. Suhashini, S. Sivakumar “A Secure Approach with Physical Layer Encryption in MANET”, International Journal of Innovative Research in Science, Engineering and Technology, ISSN ONLINE(2319-8753) PRINT(2347-6710).
  9. R. Divya Paramesvaran, Dr. D. Maheswari “Study of Various Security Attacks in Network Layer and the Mitigation Techniques for MANET”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 2, February 2016. ISSN (Online) 2278-1021.
  10. A.Saini, R. Sharma, “A Study of various Security Attacks & their countermeasures in MANET” IJARCSSE, vol.1, Issue.1, Dec 2011.
  11. Dhamande C.S and Deshmukh H.R “A Competent to diminish the brunt of gay hole attack in MANET” Vol.2, Issue 2 Mar 2012.
  12. Yogita Avinash Chaudhari “A Probabilistic Black hole & gray hole attack Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks-Review”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 5, Issue 2, February 2017.
  13. Arvind Dhaka, Amita Nandal and Raghuveer S. Dhaka “Gray and Black Hole Attack Identification using Control Packets in MANETs”, Eleventh International Multi-Conference on Information Processing, Procedia Computer Science 2015.
  14. V. Solomon Abel, “Survey of Attacks on Mobile Ad- Hoc Network” IJCSE, Vol.3, No.2, Feb 2011.
  15. Vishnu K, and Amos J .Paul,” Detection & Removal of cooperative Black/Gray hole attack in Mobile ADHOC Networks.” International Journal of Computer Applications 2010, Volume 1-No.22, pp.38-42.
  16. Sukla and Banerjee “Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks” Proceedings of the World Congress on Engineering and Computer Science WCECS, October 22-24,San Francisco, USA 2008.
  17. Oscar F. Gonzalez, God win Ansa, Michael Howarth and George Pavlou. “Detection and Accusation of Packet Forwarding Misbehaviour in Mobile Ad-Hoc networks”, Journal of Internet Engineering, 2:1, 2008.
  18. Jiwen CAI, Jialin CHEN, Zhiyang WANG, Ning LIU, “An Adaptive Approach to Detecti Black and Gray Hole Attacks in Ad Hoc Network”, IEEE International Conference on Advanced Networking and Applications,2010.
  19. Chundong She 1, Ping Yi 2, Junfeng Wang3, Hongshen Yang4 “Intrusion Detection for Black Hole and Gray Hole in MANETs”KSII Transactions on Internet and Information Systems Vol. 7, no. 7, jul. 2013
  20. V.Dharman, G. Venkatachalam “Detection of Gray Hole Attack in AODV for MANETs by using Secure Message Digest”, South Asian Journal of Engineering and Technology Vol.2, No.17 321–329, ISSN No: 2454-9614 2016.
  21. Hizbullah Khattak, Nizamuddin “A Hybrid Approach for Preventing Black and Gray Hole Attacks in MANET”, In proceeding of IEEE-2013.
  22. Hiremani. Vani A, Jadhao. Manisha Madhukar, “Eliminating Co-operative Blackhole and Grayhole Attacks Using Modified EDRI Table in MANET”, IEEE, 2013.
  23. Merkle, R. C. (1988). “A Digital Signature Based on a Conventional Encryption Function”.“Advances in Cryptology CRYPTO '87 ”. Lecture Notes in Computer Science 293. p. 369. doi: 10.1007/3-540-48184-2_32. ISBN 978-3-540-18796-7, 1988.
  24. Doori. Ali, Mohammad Karimizadeh Takabi. Tahereh, “Black hole attack analysis and network discovery in MANET ”, Regional Conference on Electrical and Computer Engineering methods of calculation software, Islamic Azad University Safashahr, February (in persian) 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Gray hole Network Security Network Simulator PDR Routing Load.