CFP last date
20 May 2024
Reseach Article

An Innovative Approach to Detect the Gray-Hole Attack in AODV based MANET

by Madhuri Gupta, Krishna Kumar Joshi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 84 - Number 8
Year of Publication: 2013
Authors: Madhuri Gupta, Krishna Kumar Joshi
10.5120/14600-2845

Madhuri Gupta, Krishna Kumar Joshi . An Innovative Approach to Detect the Gray-Hole Attack in AODV based MANET. International Journal of Computer Applications. 84, 8 ( December 2013), 44-50. DOI=10.5120/14600-2845

@article{ 10.5120/14600-2845,
author = { Madhuri Gupta, Krishna Kumar Joshi },
title = { An Innovative Approach to Detect the Gray-Hole Attack in AODV based MANET },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 84 },
number = { 8 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 44-50 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume84/number8/14600-2845/ },
doi = { 10.5120/14600-2845 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:00:25.978293+05:30
%A Madhuri Gupta
%A Krishna Kumar Joshi
%T An Innovative Approach to Detect the Gray-Hole Attack in AODV based MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 84
%N 8
%P 44-50
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The wireless arena has been experiencing exponential growth in nowadays. Wireless devices are now playing an ever-increasingly important role in our lives. an ad hoc network might consist of several home-computing devices, including notebooks, handheld PCs, and so on. Each node will be able to communicate directly with other nodes that reside within range of transmission. For communicating with nodes that reside besides this range, the node needs to use intermediate nodes to relay messages hop by hop. Gray hole is a node that can switch from behaving correctly to behaving like a black hole that is it is actually an attacker and it will act as a normal node. So we can't identify easily the attacker since it behaves as a normal node. Every node maintains a routing table that stores the next hop node information which is a route packet to destination node In this paper we proposed an innovative approach for the detection of the dangerous grayhole attack. The proposed algorithm is implemented on a very popular on demand routing protocol known as AODV (Ad hoc On demand Distance Vector) routing protocol. The beauty of this proposed algorithm is that it not only identifies the grayhole attacker node but also confirm it as well. The algorithm is divided into two phases: Noting Phase and the Confirmation phase. To simulate the effect of the proposed work the popular NS 2(Network Simulator 2) is used.

References
  1. Banerjee S, "Detection/removal of cooperative black and grayhole attack in mobile ad hoc networks" In Proceedings of the World Congress on Engineering and Computer Science,2008.
  2. Sen J. , Chandra M. , HarishaS. G. Reddy H. , Balmuralidhar P. , "A Mechanism for Detection of Gray Hole Attack in Mobile AdHoc Networks", Information, Communications and Signal Processing, 2007, 6thInternational IEEE Conference.
  3. Gao Xiaopang, Chen Wei,"A novel Gray Hole Attack DetectionSchemeforMobileAd-HocNetworks"NetworkandParallelComputingWorkshops,2007,NPCWorkshops,2007,IFIPInternational IEEE Coference.
  4. Kurosawa S. ,Nakayama H. ,KatoN ,Jamalipura A. , and Nemoto Y. ,"Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning method," International Journal of Network Security,Vol. 5,No. 3,P. P338-346,Nov. 2007.
  5. Jiwan CAI ,Ping YI, Jialin CHEN, Zhiyang WANG ,Ning LIU, "An Adaptive Approch to Detecting Black and Gray Hole Attacks in Ad Hoc Networks", Advanced Information Networking and Applications (AINA),2010th IEEE International Conference.
  6. Shivani Sharma, Tanupreet Singh, "Sequenced queue based routing algorithm (SQRA) for detection and correction of gray hole attack by implementing IDS", Proc. of the Intl. Conf. on Recent Trends In Computing and Communication Engineering -- RTCCE 2013.
  7. Ashok M. Kanthe, Dina Simunic, Ramjee Prasad, "A mechanism for grayhole attack detection in Mobile adhoc networks", International journal of computer applications(0975-8887) volume 53- No. 16, September 2012.
  8. Mr. Chetan S. Dhamande, Prof. H. R. Deshmukh ," A efficient way to minimize the impact of gray hole attack in adhoc network", International journal of emerging technology and advanced engineering, (ISSN 2250-2459, volume 2, issue 2,feb 2012).
  9. Dhamande C. S. , Deshmukh H. R. , "A competent way to diminish the brunt of gray hole attack in MANET ", International Journal of Wireless Communication (ISSN: 2231-3559 & E-ISSN: 2231-3567, VOLUME 2, ISSUE 1, 2012).
  10. Shivani Sharma, Tanupreet Singh, "An effective intrusion detection system for detection and correction of gray hole attack in MANETs", International journal of computer applications (0975-8887, volume 68- No. 12, April 2013).
Index Terms

Computer Science
Information Sciences

Keywords

MANET AODV RREP RREQ Grayhole