CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Cooperative Blackhole/ Grayhole Attack Detection and Prevention in Mobile Ad hoc Network: A Review

by Harsh Pratap Singh, Virendra Pal Singh, Rashmi Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 64 - Number 3
Year of Publication: 2013
Authors: Harsh Pratap Singh, Virendra Pal Singh, Rashmi Singh
10.5120/10613-5330

Harsh Pratap Singh, Virendra Pal Singh, Rashmi Singh . Cooperative Blackhole/ Grayhole Attack Detection and Prevention in Mobile Ad hoc Network: A Review. International Journal of Computer Applications. 64, 3 ( February 2013), 16-22. DOI=10.5120/10613-5330

@article{ 10.5120/10613-5330,
author = { Harsh Pratap Singh, Virendra Pal Singh, Rashmi Singh },
title = { Cooperative Blackhole/ Grayhole Attack Detection and Prevention in Mobile Ad hoc Network: A Review },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 64 },
number = { 3 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 16-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume64/number3/10613-5330/ },
doi = { 10.5120/10613-5330 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:15:26.159960+05:30
%A Harsh Pratap Singh
%A Virendra Pal Singh
%A Rashmi Singh
%T Cooperative Blackhole/ Grayhole Attack Detection and Prevention in Mobile Ad hoc Network: A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 64
%N 3
%P 16-22
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad hoc network is an assembly of mobile nodes that haphazardly forms the temporary network and it is an infrastureless network. Due to its self-motivatedor mobility in nature the nodes are more vulnerable to security threats which stimulate the performance of the network. In this paper, a review on a various types of coordinated attack is deliberated such as blackhole / grayhole attack which are most serious threats in mobile ad hoc network. In cooperative blackhole attack more than one node collude to each other hence this attack is more challenging to identify. This paper presents a review of different security mechanism to eliminate the blackhole / grayhole attack from the network.

References
  1. B. Revathi, D. Geetha, "A Survey of Cooperative Black and Gray hole Attack in MANET" International Journal of Computer Science and Management Research Vol 1 Issue 2 September 2012.
  2. Hongmei Deng, Wei Li, and Dharma P. Agrawal, "Routing Security in Wireless Ad Hoc Network," IEEE Communications Magazine, vol. 40, no. 10, October 2002.
  3. Vishnu K, and Amos J . Paul," Detection & Removal of cooperative Black/Gray hole attack in Mobile ADHOC Networks. " International Journal of Computer Applications 2010, Volume 1-No. 22, pp. 38-42.
  4. Sukla Banerjee "Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks" Proceedings of the World Congress on Engineering and Computer Science 2008 WCECS 2008, October 22 - 24, 2008, San Francisco, USA.
  5. Oscar F. Gonzalez, God win Ansa, Michael Howarth and George Pavlou. "Detection and Accusation of Packet Forwarding Misbehaviour in Mobile Ad-Hoc networks", Journal of Internet Engineering, 2:1, 2008.
  6. Oscar F. Gonzalez, Michael Howarth, and George Pavlou, Detection of Packet Forwarding Misbehaviour in Mobile Ad-Hoc Networks Centre for Communications Systems Research, University of Surrey, Guildford, UK. Integrated Network Management, 2007. IM '07. 10th IFIP/IEEE International Symposium on May 21, 2007.
  7. H. Weerasinghe and H. Fu. Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation. In Future generation communication and networking (fgcn 2007), volume 2, pages 362–367. IEEE, 2007.
  8. H. Nakayama, S. Kurosawa, A. Jamalipour, Y. Nemoto, and N. Kato. A dynamic anomaly detection scheme for aodv- based mobile ad hoc networks. Vehicular Technology, IEEE Transactions on, 58(5):2471 –2481, jun 2009.
  9. Sarita Choudhary, Kriti Sachdeva. Discovering a Secure Path in MANET by Avoiding Black/Gray Holes. International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-1, Issue-3, August 2012.
  10. Sun B, Guan Y, Chen J, Pooch UW, "Detecting Black-hole Attack in Mobile Ad Hoc Networks". 5th European Personal Mobile Communications Conference, Glasgow, United Kingdom, 22-25 April 2003.
  11. Al-Shurman M, Yoo S-M, Park S , " Black Hole Attack in Mobile Ad Hoc Networks". 42nd Annual ACM Southeast Regional Conference (ACM-SE'42), Huntsville, Alabama, 2-3 April 2004.
  12. Prof. Sanjeev Sharma, Rajshree, Ravi Prakash, Vivek , "Bluff-Probe Based Black Hole Node Detection and prevention", IEEE International Advance Computing Conference (IACC 2009), 7 March 2009.
  13. Djenouri D, Badache N (2008) Struggling Against Selfishness and Black Hole Attacks in MANETs. Wireless Communications & Mobile Computing 8(6):689–704. doi: 10. 1002/wcm. v8:6
  14. Wang W, Bhargava B, Linderman M (2009) Defending against Collaborative Packet Drop Attacks on MANETs. Paper presented at the 2nd International Workshop on Dependable Network Computing and Mobile Systems (DNCMS 2009) (in Conjunction with IEEE SRDS 2009), New York, USA, 27 September 2009
  15. Kozma W, Lazos L (2009) REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits. Paper presented at the Second ACM Conference on Wireless Network Security, Zurich, Switzerland, 16-18 March 2009
  16. Raj PN, Swadas PB (2009) DPRAODV: A Dynamic Learning System Against Blackhole Attack in AODV based MANET. International Journal of Computer Science 2:54–59. doi: abs/0909. 2371
  17. Vishnu KA, Paul J (2010) Detection and Removal of Cooperative Black/Gray hole attack in Mobile Ad Hoc Networks. International Journal of Computer Applications 1(22):38–42. doi: 10. 5120/445-679
  18. Agrawal P, Ghosh RK, Das SK (2008) Cooperative Black and Gray Hole Attacks in Mobile Ad hoc Networks. Paper presented at the 2nd International Conference on Ubiquitous Information Management and Communication, Suwon, Korea, January 31-February 01, 2008
Index Terms

Computer Science
Information Sciences

Keywords

Cooperative Blackhole Grayhole Mobile ad hoc network Routing protocol