CFP last date
22 April 2024
Reseach Article

A Mechanism for Gray Hole Attack Detection in Mobile Ad–hoc Networks

by Ashok M. Kanthe, Dina Simunic, Ramjee Prasad
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 53 - Number 16
Year of Publication: 2012
Authors: Ashok M. Kanthe, Dina Simunic, Ramjee Prasad
10.5120/8507-2511

Ashok M. Kanthe, Dina Simunic, Ramjee Prasad . A Mechanism for Gray Hole Attack Detection in Mobile Ad–hoc Networks. International Journal of Computer Applications. 53, 16 ( September 2012), 23-30. DOI=10.5120/8507-2511

@article{ 10.5120/8507-2511,
author = { Ashok M. Kanthe, Dina Simunic, Ramjee Prasad },
title = { A Mechanism for Gray Hole Attack Detection in Mobile Ad–hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { September 2012 },
volume = { 53 },
number = { 16 },
month = { September },
year = { 2012 },
issn = { 0975-8887 },
pages = { 23-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume53/number16/8507-2511/ },
doi = { 10.5120/8507-2511 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:54:17.093762+05:30
%A Ashok M. Kanthe
%A Dina Simunic
%A Ramjee Prasad
%T A Mechanism for Gray Hole Attack Detection in Mobile Ad–hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 53
%N 16
%P 23-30
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The mobile ad-hoc networks are vulnerable to Denial of Service (DoS) attacks. MANET has features like self organizing, working as router as well as host having dynamic topology. In MANET, nodes have limited resources like bandwidth, battery power and storage capacity. Gray hole attack is a kind of denial of service (DoS) attack in mobile ad hoc networks. It is specialized type of black hole attack which changes its state from honest to malicious and vice versa. Gray hole attack is an event that degrades the overall network's performance by intentional malicious activity. In this paper, it is proposed the mechanism against gray hole attack and improves the network performance interms of throughput, packet drop rate, packet delivery ratio and normalized routing overhead.

References
  1. C. K. Toh, "Ad hoc Mobile Wireless Networks :Protocols and Systems",Prentice Hall ,December 03,2001
  2. Jeroen Hoebeke,Ingrid Moerman,Bart Dhoedt,Piet Demeester, "An Overview of Mobile Ad Hoc Networks:Applications and Challenges"Journal of the communication networks,July 2004.
  3. Sen J. ,Chandra M. ,Harisha S. G. ,Reddy H. ,Balmuralidhar P. , "A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks",Information, Communications and Signal Processing ,2007,6th International IEEE Conference.
  4. Kurosawa S. ,Nakayama H. ,Kato N,Jamalipura A. , and Nemoto Y. ,"Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning method,"International Journal of Network Security ,Vol. 5,No. 3,P. P338-346,Nov. 2007.
  5. Gao Xiaopang, Chen Wei,"A novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks"Network and Parallel Computing Workshops,2007,NPC Workshops,2007,IFIP International IEEE Coference.
  6. Banerjee S,2008, "Detection/removal of cooperative black and gray hole attack in mobile ad hoc networks"In Proceedings of the World Congress on Engineering and Computer Science.
  7. Raj P N,Swades P B, "DPRAODV:A Dynamic Learning System Against Blackhole Attack in AODV based MANET,"International Journal of Computer Science 2:54-59,doi:abs/0909. 2371.
  8. Jiwan CAI,Ping YI,Jialin CHEN,Zhiyang WANG,Ning LIU, "An Adaptive Approch to Detecting Black and Gray Hole Attacks in Ad Hoc Networks",Advanced Information Networking and Applications (AINA),2010th IEEE International Conference.
  9. Jhaveri R. H. ,Patel S. J. ,Jinwala D. C. , "A Novel Approch for Gray Hole and Black Hole Attacks in Mobile Ad Hoc Networks",Advanced Computing & Communication Technologies (ACCT),2012 Second International Conference on 7-8 Jan 2012,IEEE, ISBN:978-1-4673-0471-9.
  10. C. Perkins, E. B. Royer,S. Das, "Ad hoc On Demand Distance Vector(AODV) Routing ,Internet Draft, " RFC 3561,IETF Network Working Group,July 2003.
  11. C. Perkins,E. B. Royer, S. Das, "Ad hoc On-Demand Distance Vector Routing," Proceeding of the 2nd IEEE Workshops on Mobile Computing System and Applications (WMCSA),pp. 90-100,1999.
  12. Ashok M. Kanthe,Dina Simunic,Marijan Djurek, "Denial of Service (DoS) Attacks in Green Mobile Ad-hoc Networks",MIPRO 2012,IEEE Conference,Proceedings of the 35th International Convention,978-1-4673-2511-6,Opatija,Croatia.
  13. Elizabeth M. Royer,Santa Barbara,Chai-Keong Toh,"A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks",IEEE Personal Communication ,April 1999.
  14. P. W. Yau,S. Hu and C. J. Mitchell, "Malicious attacks on ad hoc network routing protocol," International Journal of Computer research ,15 no. 1 (2007) 73-100.
  15. R. Perlman. Network Layer protocols with Benzantine robustness. Technical Report MIT-LCS-TR-429,Laboratory for computer science, Massachusetts Institute of Technology,October 1988.
  16. The network simulator-ns 2. 35 http://www. isi. edu/nsnam/ns.
Index Terms

Computer Science
Information Sciences

Keywords

AODV protocol Gray hole attack