CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Grayhole Attack and Prevention in Mobile Adhoc Network

by Megha Arya, Yogendra Kumar Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 27 - Number 10
Year of Publication: 2011
Authors: Megha Arya, Yogendra Kumar Jain
10.5120/3337-4592

Megha Arya, Yogendra Kumar Jain . Grayhole Attack and Prevention in Mobile Adhoc Network. International Journal of Computer Applications. 27, 10 ( August 2011), 21-26. DOI=10.5120/3337-4592

@article{ 10.5120/3337-4592,
author = { Megha Arya, Yogendra Kumar Jain },
title = { Grayhole Attack and Prevention in Mobile Adhoc Network },
journal = { International Journal of Computer Applications },
issue_date = { August 2011 },
volume = { 27 },
number = { 10 },
month = { August },
year = { 2011 },
issn = { 0975-8887 },
pages = { 21-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume27/number10/3337-4592/ },
doi = { 10.5120/3337-4592 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:13:24.827323+05:30
%A Megha Arya
%A Yogendra Kumar Jain
%T Grayhole Attack and Prevention in Mobile Adhoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 27
%N 10
%P 21-26
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad-hoc networks (MANETs) are composed of autonomous nodes that are self- managed, dynamically deployed without any pre-existing infrastructure. Gray hole attacks are an active type of attack, which leads to dropping of messages, attacking node first agrees to forward packets and then fails to do so. For this we are using an AODV routing protocol to discover route. Initially the Malicious node behaves correctly and a reply sends true Route Reply (RREP) messages to nodes that initiate Route request (RREQ) messages. We use an intrusion detection system (IDS) to monitors the network or system activities for malicious activities or policy violation and produces reports to a Management Station. It takes over the sending packets. Afterwards, the node just drops the packets to launch a (DoS) denial of service attack. If neighbors nodes that try to send packets over attacking nodes lose the connection to destination then they may want to discover a route again and broadcasting Route Request (RREQ) messages. In Network Simulation-2 (NS-2) scenario the simulation result has shown that the throughput packet delivery is improved rather than traditional Gray hole attack.

References
  1. Sukla Banerjee “Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks” Proceedings of the World Congress on Engineering and Computer Science 2008 WCECS 2008, October 22 - 24, 2008, San Francisco, USA
  2. S. Marti, T. J. Giuli, K. Lai and M. Baker, “Mitigating Routing Misbehavior in Ad Hoc Networks”, Proc. 6th Annual Int’l. Conf. Mobile Comp. and Net., Boston, MA. pp. 255-265. August 2000.
  3. P. Misra,. “Routing Protocols for Ad Hoc Mobile Wireless Networks”,http://www.cse.wustl.edu/~jain/cis78899/adhoc_routing/index.html, 14 May 2006.
  4. Piyush Agrawal and R. K. Ghosh,” Cooperative Black and Gray Hole Attacks in Mobile Ad Hoc Networks”.
  5. YONGGUANG ZHANG, WENKE LEE, AND YI-AN HUANG. Intrusion detection for wireless Ad Hoc networks. In Mobile Networks and Applications. ACM, 2002.
  6. H. Deng, W. Li and D. P. Agrawal, “Routing Security inWireless Ad Hoc Networks”. University of Cincinnati, IEEE Communication Magazine, October 2002.
  7. HU, Y.-C., PERRIG, A., AND JOHNSON, D. B. Ariadne: A Secure On Demand Routing Protocol for Ad Hoc Networks. In Eigth ACM International Conference on Mobile Computing and Networking (Mobicom 2002) (Sept. 2002).
  8. D. E. DENNING, “An Intrusion Detection Model”, IEEE Transactions in Software Engineering, vol. 13, no2, February 1987.
  9. S. BHARGAVA, D. P. AGRAWAL, “Security Enhancements in AODV protocol for Wireless Ad hoc Networks”, in IEEE Semi-annual Proceedings of Vehicular Technology Conference (VCT’01), 2001.
  10. SCOTT CORSON AND JOSEPH MACKER, “Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations”. Internet-Draft, draft-ietf-manet-issues-01.txt, March 1998. Work in progress.
  11. I. STAMOULI. Real-time intrusion detection for ad hoc networks. Master's thesis, University of Dublin, September, 2003.
  12. C. E. Perkins, E. M. Belding-Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing.
  13. K Fall and K. Varadhan, ”The NS Manual” , November 18, 2005, http://www.isi.edu/nsnam/ns/doc/ns_doc.pdf ,25 July 2005.
  14. I. S. Jacobs and C. P. Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271–350.
  15. K. Elissa, “Title of paper if known,” unpublished.
  16. R. Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in press.
  17. Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interface,” IEEE Transl. J. Magn. Japan, vol. 2, pp. 740–741, August 1987
  18. Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982.
  19. M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989.
  20. Electronic Publication: Digital Object Identifiers (DOIs): Article in a journal:
  21. D. Kornack and P. Rakic, “Cell Proliferation without Neurogenesis in Adult Primate Neocortex,” Science, vol. 294, Dec. 2001, pp. 2127-2130, doi:10.1126/science.1065467. Article in a conference proceedings:
  22. H. Goto, Y. Hasegawa, and M. Tanaka, “Efficient Scheduling Focusing on the Duality of MPL Representatives,” Proc. IEEE Symp. Computational Intelligence in Scheduling (SCIS 07), IEEE Press, Dec. 2007, pp. 57-64, doi:10.1109/SCIS.2007.357670.
Index Terms

Computer Science
Information Sciences

Keywords

Gray hole Packet dropping malicious node Routing MANET AODV