CFP last date
22 April 2024
Reseach Article

A Survey on Grey Hole Attack in Wireless mesh Networks

by Kanu Geete, Piyush Kumar Shukla, Anjana Jayant Deen
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 95 - Number 23
Year of Publication: 2014
Authors: Kanu Geete, Piyush Kumar Shukla, Anjana Jayant Deen
10.5120/16736-7019

Kanu Geete, Piyush Kumar Shukla, Anjana Jayant Deen . A Survey on Grey Hole Attack in Wireless mesh Networks. International Journal of Computer Applications. 95, 23 ( June 2014), 23-29. DOI=10.5120/16736-7019

@article{ 10.5120/16736-7019,
author = { Kanu Geete, Piyush Kumar Shukla, Anjana Jayant Deen },
title = { A Survey on Grey Hole Attack in Wireless mesh Networks },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 95 },
number = { 23 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 23-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume95/number23/16736-7019/ },
doi = { 10.5120/16736-7019 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:20:14.119527+05:30
%A Kanu Geete
%A Piyush Kumar Shukla
%A Anjana Jayant Deen
%T A Survey on Grey Hole Attack in Wireless mesh Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 95
%N 23
%P 23-29
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A wireless mesh network is a kind of multi-hop network and can be used as synonym for an ad-hoc network. It is a network having many to many connections with the capability of dynamically healing the network topology. Security is a challenging application of a wireless mesh network. The self configurable self organized nature makes a wireless mesh network more vulnerable to various types of attacks. Exploitation of a WMN can cause a large scale degradation of network performance. In this paper we have discussed some attacks that are performed on various layers of TCP/IP model. And we performed a comparative study for a specific network layer attack: grey hole attack. A grey hole attack is often difficult to detect and recover. There are different techniques for its detection which have their advantages and shortcomings. We have discussed some of them in this paper.

References
  1. F. Akylidz, X. Wang and W. Wang, "Wireless Mesh Networks: A Survey" Comput. Net, vol. 47 no. 4, 445-487, 2005.
  2. William Stallings, Network Security Essentials: Applications and standards, Fourth Edition, Prentice Hall, 1 Lake Street, Upper Saddle River, NJ 07458 , 2011.
  3. C. Karlof, D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures" Elsvier's Ad Hoc J. , vol 1 no. 2-3 pp 293-315 Sept 2003.
  4. H. N. Sim, C. M. CHEN and Y. C. H Asiao, " An efficient countermeasures to the selective forwarding attack in wireless sensor networks " in Proc. 2007 TENCON pp. 1-4.
  5. B Xiao, B. Yu, and C. Gao, " Chemas: identifying suspect nodes in selective forwarding attacks" J. Parallel Distributed Comput. Vol 67 pp 1218-1230.
  6. K. Ren, W. Lou, Y. Jhong : LEDs : providing location aware end-to-end data security in wireless networks" IEEE Trans. Comput. ,vol. 7,no. 5, pp 585-598, 2008.
  7. I. Khalil, S. Bagchi, C. N. Rotaru and n. B. Shroff, " Unmask: utilizing neighbour monitoring for attack mitigation in multihop wireless sensor networks" Ad Hoc Netw. Vol 8, no. 2, pp 148-164, 2010.
  8. M. Tiwari, K. V. Arya, R. Choudhary and K. S. Choudhary, "Designing intrusion to detect black hole and selective forwarding attacking in WSN based in local information" in Proc. 2009 ICCIT, pp. 824-828.
  9. J Brown and X. Du, "Detection of selective forwarding in heterogeneous sensor networks" in Proc. ICC, pp. 1583-1587.
  10. S. Marti, T. J. Giuli, K. Lai and M. Baker " Mitigating Routing behaviour in mobile ad-hoc networks" in Proc. International conference on mobile computing and networking, Boston,Ma,200.
  11. J. Sen and A. Ukil" A secure routing protocol for wireless sensor networks" in ICCSA 2010 ser. Lecture note in computer science Springer Berlin Heidelberg, 2010, 6018, pp. 277-190.
  12. O. Erdene-Orchir, M. Minier, F. Valois and a. Kountouris "Towards resilient routing in wireless sensor networks: gradient based routing in focus" in Proc 2010 SENSORCOMM, pp 478-483.
  13. D. M. Shila and T. Anjali, " A Game Theoretic Approach to gray hole attacks in wireless mesh networks", IEEE International Conference on Military communications 2008, pp. 1-7, Nov 2008
  14. R. Curtmola and C. Nita-Rotaru, "BSMR: Byzantine-resilient secure multicast routing in multi-hop wireless networks," in Proc. Sensor, Mesh and Ad Hoc Communications and Networks, June 2007.
  15. S Misra, P. V. Krishna,K. I. Abraham, N. Sasikumar and S. Freden," An adaptive learning routing protocol for prevention of distributed denial of service attacks in wireless mesh networks," Comput. Mathematics Applicat. ,vol 60, no. 2, pp. 294-306, 2010.
  16. J. dong, R. Curtmola and C. Neeta-Rotaru" Secure High Throughput multicast routing in wireless mesh networks" IEEE Trans. Mobile Comput. ,vol. 10, no. 5,pp. 663-668,2011.
  17. W. Wang, B. Bhargava and M. Linderman, "Defending against collaborative packet drop attacks on manets" in DNCMS2009.
  18. S. Banergee, "Detection/Removal of cooperative black and gray hole attack in mobile ad-hoc networks" in 2008 WCECS.
  19. S. Khan and J. Loo, "Cross Layer Secure and source aware on demand routing protocol for hybrid mesh networks," Wireless Pers. Commun. Vol. 62,no. 1,pp. 201-214, 2012.
  20. S. Khan, K. -K. Loo, N. Mast, T. Naeem, " SRPM: Secure Routing protocol for IEEE 802. 11 infrastructure based wireless mesh networks," J. Netw. Syst. Manage. , vol. 18,no. 2,pp. 190-209, 2010.
  21. D. M. Shila, Y. Cheng, and T. Anjali, "Mitigating selective forwarding attacks with a channel-aware approach in WMN's," IEEE Trans. Wireless Commun. ,vol. 9, no. 5, pp. 1661-1675.
  22. V. V. V and V. M. A. Rajan, "Detection of colluding selective forwarding nodes in wireless mesh networks based on channel aware detection algorithm" MES J. Technol. Manage. , pp. 62-66, 2011.
  23. Quiang Liu, Jianping Yin, Victor C. M. Leung, ZhipingCai, "FADE: Forwarding Assesment Based Detection of collaborative gray hole attacks in WMN's" IEEE Transactions on Wireless Communications, Vol. 12, no. 10, October 2013, pp. 5124-5137.
  24. J. Eriksson,M. Falaotsos, and S. V. Krishnamurthy, "Routing amid colluding Attackers," in Proc. 2007 ICNP, pp. 184-193
  25. Jaydip Sen " Security and Privacy issues in wireless mesh networks: A Survey" Wireless networks and security-Issues, Challenges and Research issues, Springer, pp. 189-272, Feb 2013.
  26. Sahil Seth, Anil Gankotiya, "Denial of service attacks and detection methods in wireless mesh networks" ITC 2010, pp. 238-240.
  27. Vikas Solomon Abel " Survey of attacks on mobile adhoc wireless networks" International journal on computer science and engineering (IJCSE) Vol. 3, No. 2, Feb 2011.
  28. Y. Sun, W. Yu, Z. Hun, and K. J. R. Liu, "Trust modelling and evaluation in ad hoc networks," in Proc. IEEE GLOBECOM '05, vol. 3, Dec. 2005.
  29. F. Oliviero and S. P. Romano, "A reputation-based metric for secure routing in wireless mesh networks," in Proc. 2008, GLOBECOM, pp. 1-5.
  30. Gao Xiaopeng and Chen wei, "A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks" ,IFIP International Conference on Network and Parallel Computing Workshops 2007, pp 209-214, Sept 2007.
  31. J. Sen, M. Chandra, S. G. Harihara, H. Reddy and P. Balamuralidhar, "A Mechanism for Detection of Gray Hole Attacks in Mobile Ad Hoc Networks", Proc. IEEE International Conference on Information Communication and Signal Processing ICICS, Singapore, Dec. 2007.
  32. J. B. Othman, J. P. Claude, Y. I. S. Benitez, "A Novel Mechanism to Secure Internal Attacks", IEEE ICC 2012-Ad-hoc Sensor Networking Symposium.
  33. Piyush Agrawal, R. K. ghosh, Sajal K. Das, "Cooperative Black and Gray Hole attacks in Mobile Ad Hoc Networks", In Proceedings of the 2nd international conference on Ubiquitous information management and communication, Pages 310-314, Suwon, Korea, 2008.
  34. R. Kandikattu, L. Jacob, : A Secure intra-domain routing protocol for wireless mesh networks, Springer LNCS 4812, pp. 37-50 (2007).
Index Terms

Computer Science
Information Sciences

Keywords

Grey hole attack Wireless mesh networks Ad-hoc networks Routing layer.