CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Cooperative Gray Hole Attack Discovery and Elimination using Credit based Technique in MANET

by Deepali Lokare, A. M. Kanthe, Dina Simunic
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 88 - Number 15
Year of Publication: 2014
Authors: Deepali Lokare, A. M. Kanthe, Dina Simunic
10.5120/15427-3850

Deepali Lokare, A. M. Kanthe, Dina Simunic . Cooperative Gray Hole Attack Discovery and Elimination using Credit based Technique in MANET. International Journal of Computer Applications. 88, 15 ( February 2014), 13-22. DOI=10.5120/15427-3850

@article{ 10.5120/15427-3850,
author = { Deepali Lokare, A. M. Kanthe, Dina Simunic },
title = { Cooperative Gray Hole Attack Discovery and Elimination using Credit based Technique in MANET },
journal = { International Journal of Computer Applications },
issue_date = { February 2014 },
volume = { 88 },
number = { 15 },
month = { February },
year = { 2014 },
issn = { 0975-8887 },
pages = { 13-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume88/number15/15427-3850/ },
doi = { 10.5120/15427-3850 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:07:41.507119+05:30
%A Deepali Lokare
%A A. M. Kanthe
%A Dina Simunic
%T Cooperative Gray Hole Attack Discovery and Elimination using Credit based Technique in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 88
%N 15
%P 13-22
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A MANET (Mobile Ad-hoc Network) is a network of mobile devices in a self-configuring and infrastructure less environment. The devices in MANET are linked by wireless medium. There are big chances of attacks in MANET due to its natural features including dynamically changing network topology, open medium, no centralized monitoring and management point. There is no assurance of attack free communication. The malicious node(s) causes dropping and forwarding only selective packets are called as gray hole. So, the security solution must be developed to address the protection of data and route. In this paper we attempted to mitigate the gray hole attack and proposes a credit based approach based on Ad-hoc On Demand Distance Vector (AODV) routing protocol. In the proposed and implemented method, we used credit value measurement for the detection of cooperative gray hole attack. This paper shows the technique which is capable of finding chains of cooperating gray hole nodes which drop a major part of communication. The paper shows the result based on varying density, pause time and mobility.

References
  1. R. Prasad, S . Dixit, R. Van Nee, "Globalization of Mobile and Wireless Communication", March 2011, Springer. ISBN13:9789400701083. .
  2. L. Gavrilovska, R. Prasad," Ad Hoc Networking Towards Seamless Communications", Springer 2006, ISBN: 1402050658.
  3. A. Kanthe, D. Simunic, M. Djurek , "Denial of Service (DoS) Attacks in Green Mobile Ad-hoc Networks", MIPRO 2012, IEEE Conference, Proceedings of the 35th International Convention, ISBN:978-1-4673-2511-6,May21-25,2012, Opatija,Croatia.
  4. A. Kanthe, D. Simunic , R. Prasad, "Effects of Malicious Attacks in Mobile Ad-hoc Networks", 2012 IEEE International Conference on Computational Intelligence and Computing Research, ISBN:978-1-4673-2481-6,18-20, December 2012, Coimbatore, India.
  5. M. Kumar, R. Mishra, "An Overview of MANET: History, Challenges and Applications", Indian Journal of Computer Science and Engineering (IJCSE), ISSN: 0976-5166 Vol. 3. No 1. Feb-Mar 2012.
  6. C. E. Perkins and E. M. Royer, "Ad-Hoc on Demand Distance Vector Routing", Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp. 90-100, Feb, 1999.
  7. Zhu, C. Lee, M. J. Saadawi, T, "RTT-Based Optimal Waiting time for Best Route Selection in Ad-Hoc Routing Protocols," IEEE Military Communications Conference, Vol. 2, pp. 1054-1059, Oct, 2003.
  8. S. Banerjee "Detection/removal of cooperative black and gray hole attack in mobile ad hoc networks", In Proceedings of the World Congress on Engineering and Computer Science, October 22 - 24, 2008, San Francisco, USA
  9. P. Agrawal, R. Ghosh, S. Das, Cooperative Black and Gray Hole Attacks in Mobile Ad Hoc Networks In Proceedings of the2nd international conference on Ubiquitous information management and communication, Pages 310-314, Suwon, Korea, 2008
  10. G. Xiaopang, C. Wei, "A novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks" Network and Parallel Computing Workshops, 2007, NPC Workshops, 2007, IFIP International IEEE Conference.
  11. Raj P , Swades P , "DPRAODV: A Dynamic Learning System Against Black hole Attack in AODV based MANET" In International Journal of Computer Science Issues, Vol. 2, Issue 3, 2010, pp:
  12. R. Jhaveri, S. Patel and D. Jinwala, "A Novel Approach for Gray Hole and Black Hole Attacks in Mobile Ad-hoc Networks" Second International Conference on Advanced Computing& Communication Technologies,2012.
  13. A. Kanthe, D. Simunic, R. Prasad ," " A Mechanism for Gray Hole Attack Detection in Mobile Ad–hoc Networks "International Journal of Computer Application (0975-8887) Volume 53-No. 16, September 2012.
  14. The network simulator-ns 2. 35 http://www. isi. edu/nsnam/ns/, 1996-97
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad-hoc Network (MANET) Packet forwarding misbehavior Cooperative gray hole attack Security AODV