CFP last date
20 December 2024
Reseach Article

Performance Improvement by Identification and Elimination of Gray Hole Nodes in MANETs

by Anamika Jain, Paramjeet Singh, Shaveta Rani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 124 - Number 13
Year of Publication: 2015
Authors: Anamika Jain, Paramjeet Singh, Shaveta Rani
10.5120/ijca2015905733

Anamika Jain, Paramjeet Singh, Shaveta Rani . Performance Improvement by Identification and Elimination of Gray Hole Nodes in MANETs. International Journal of Computer Applications. 124, 13 ( August 2015), 19-24. DOI=10.5120/ijca2015905733

@article{ 10.5120/ijca2015905733,
author = { Anamika Jain, Paramjeet Singh, Shaveta Rani },
title = { Performance Improvement by Identification and Elimination of Gray Hole Nodes in MANETs },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 124 },
number = { 13 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 19-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume124/number13/22164-2015905733/ },
doi = { 10.5120/ijca2015905733 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:14:18.828859+05:30
%A Anamika Jain
%A Paramjeet Singh
%A Shaveta Rani
%T Performance Improvement by Identification and Elimination of Gray Hole Nodes in MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 124
%N 13
%P 19-24
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad-hoc Networks (MANETs) are widely used in various applications due to its ability to communicate without any fixed infrastructure like in military and civilian applications. MANETs are wireless infrastructure-less (Ad-hoc) network comprising of mobile nodes. Mobile nodes can enter and leave the network at any time. Due to its inherent characteristics like dynamic topology, autonomous nodes and self organizing ability these networks are vulnerable to various security attacks. MANETs are still an emerging technology in wireless communication. Security is very important in this modern era especially in MANETs. Without any security, nodes may selectively drop packets without forwarding them. This type of security issue is known as Gray Hole attack. In this paper a novel scheme is proposed for identification and elimination of Gray Hole attack. This technique uses a redefined modified extended data routing information (RM-EDRI) table that is maintained by every node on the network.

References
  1. Shrishti Jain, Raghuwanshi, Sandeep K,”Behavioural and node performance based Gray hole attack Detection and Amputation in AODV protocol”, IEEE International Conference on Advances in Engineering & Technology Research (ICAETR), August 2014.
  2. V. Shanmuganathan, Mr.T.Anand, “A Survey on Gray Hole Attack in MANET”, International Journal of Computer Networks and Wireless Communication (IJCNWC), Vol.2, No6, ISSN: 2250-3501 December 2012.
  3. V.A Hiremani. , M.M Jadhao, ”Eliminating co-operative black hole and gray hole attacks using modified EDRI table in MANET”, IEEE International Conference on Green Computing, Communication and Conservation of Energy (ICGCE), December 2013.
  4. Jasleen Arora , Paramjeet Singh and Shaveta Rani, “Detecting and Preventing Attacks in MANET” International Journal of Computer Applications Vol.81 No5, ISSN: 0975 – 8887, November 2013
  5. Harsh Pratap Singh, Virendra Pal Singh, Rashmi Singh, “Cooperative Black hole/ Gray hole Attack Detection and Prevention in Mobile Ad hoc Network: A Review”, International Journal of Computer Applications, Vol. 64, No.3, ISSN: (0975 – 8887), February 2013.
  6. Gundeep Singh Bindra, Ashish Kapoor, Ashish Narang, Arjun Agrawal "Detection and Removal of Co-operative Blackhole and Grayhole Attacks in MANETs" IEEE International Conference on System Engineering and Technology, September 11-12, 2012, Bandung, Indonesia.
  7. Robinpreet Kaur and Mritunjay Kumar Rai, “A Novel Review on Routing Protocols in MANETs”, Undergraduate Academic Research Journal, Vol. 1, ISSN: 2278-1129, 2012.
  8. Gagandeep, Aashima, Pawan Kumar, “Analysis of Different Security Attacks in MANETs on Protocol Stack A-Review”, International Journal of Engineering and Advanced Technology (IJEAT), ISSN: 2249 – 8958, Volume-1, Issue-5, June 2012.
  9. Onkar V. Chandure and V.T. Gaikwad, “Detection and Prevention of Gray Hole Attack in Mobile Ad- Hoc Network using AODV Routing Protocol”, International Journal of Computer Applications, Vol. 41, No.5, ISSN: 0975- 8887, March 2012.
  10. Priyanka Goyal, Vinti Parmar, Rahul Rishi, “MANET: Vulnerabilities, Challenges, Attacks, Application”, IJCEM International Journal of Computational Engineering & Management, Vol. 11, ISSN: 2230-7893, January 2011.
  11. Vishnu K and Amos J Paul, “Detection and removal of Cooperative Black/Gray hole attack in Mobile Adhoc Networks” IJCA Vol.1, No.22 Jan 2010.
  12. Jaydip Sen, M. Girish Chandra, Harihara S.G., Harish Reddy and P. Balamuralidhar, “A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks”, Information, Communication and Signal Processing 2007, 6th International Conference, December 2007.
  13. Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon, and Kendall Nygard, ”Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks”. In Proceedings of 2003 International Conference on Wireless Networks (ICWN’03), Las Vegas, Nevada, USA, pp. 570-575.
Index Terms

Computer Science
Information Sciences

Keywords

MANETs AODV Protocol Gray Hole attack RM-EDRI table