CFP last date
20 December 2024
Reseach Article

Energy Efficient Robust Approach to Detect and Prevent Gray-Hole Attack in MANET

by Bhaskar Nandi, Prasun Chakrabarti, Binoy Sasmal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 143 - Number 5
Year of Publication: 2016
Authors: Bhaskar Nandi, Prasun Chakrabarti, Binoy Sasmal
10.5120/ijca2016910223

Bhaskar Nandi, Prasun Chakrabarti, Binoy Sasmal . Energy Efficient Robust Approach to Detect and Prevent Gray-Hole Attack in MANET. International Journal of Computer Applications. 143, 5 ( Jun 2016), 46-52. DOI=10.5120/ijca2016910223

@article{ 10.5120/ijca2016910223,
author = { Bhaskar Nandi, Prasun Chakrabarti, Binoy Sasmal },
title = { Energy Efficient Robust Approach to Detect and Prevent Gray-Hole Attack in MANET },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2016 },
volume = { 143 },
number = { 5 },
month = { Jun },
year = { 2016 },
issn = { 0975-8887 },
pages = { 46-52 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume143/number5/25077-2016910223/ },
doi = { 10.5120/ijca2016910223 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:46:00.161983+05:30
%A Bhaskar Nandi
%A Prasun Chakrabarti
%A Binoy Sasmal
%T Energy Efficient Robust Approach to Detect and Prevent Gray-Hole Attack in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 143
%N 5
%P 46-52
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad-hoc Network (MANET) is typical wireless ad hoc networks which don’t have any fixed topology due to the mobility of the nodes. The nature of these networks is dynamic and don't have any pre-existing security infrastructure to prevent various routing attacks and to protect from malicious nodes. There are mainly two approaches to isolate security threats in MANET, Proactive and Reactive. Proactive methods are based on various cryptography techniques which takes more bandwidth and resource such as battery power. Our approach is basically a simple and robust Reactive method than different security solution to prevent Black-Hole and Gray-Hole attack by detecting malicious nodes dynamically. In our schema the range of verification is wider than the previous available approaches, so the possibility of correct decision is maximized yet the resource utilization and unnecessary packet transfer is minimized.

References
  1. L. Zhou and Z. J. Haas, “Securing ad hoc networks”, In IEEE Network Magazine, volume 13, page 24-30, Nov. 1999.
  2. Hassan A. Karimi, Prashant Krishnamurthy “Real-time routing in mobile networks using GPS and GIS techniques”, Proceedings of the 34th IEEE Hawaii International Conference on System Sciences – 2001.
  3. Luiz A. DaSilva, Jeff H. Reed, William Newhall, Tutorial on “Ad hoc networks and automotive applications”, Mobile and Portable Radio Group, Virginia Polytechnic Institute and State University, 2002.
  4. Murali Kodialam, T. V. Lakshman. “Detecting Network Intrusions via Sampling: A Game Theoretic Approach”, In Proceedings of IEEE INFOCOM, 2003
  5. HongMei Deng, Wei Li, Dharma P. Agrawal, “Routing security in wireless ad hoc networks”, IEEE Communications Magazine, October 2002, page 70-75.
  6. Jiejun-K, Petros-Z, Haiyun-Luo, Songwu-Lu, Lixia-Zhang, “ Providing robust and ubiquitous security support for mobile ad-hoc networks”, Proceedings Ninth International Conference on Network Protocols. ICNP 2001, Riverside, CA, USA, page 11-14 Nov. 2001.
  7. Y. Xiao, X. Shen, and D.-Z. Du (Eds.), “A survey on attacks and countermeasures in mobile ad hoc networks”, Wireless/Mobile Network Security, chapter 12, page 1-38, Springer, 2006
  8. Abhijit Das, Atiqur Rahman, Soumya Sankar Basu and Atal Chaudhuri “Energy Aware Topology Security Scheme for Mobile Ad Hoc Network” . Proceedings of the 2011 International Conference on Communication, Computing & Security, Pages 114-118, ACM New York, NY, USA ©2011.
  9. Rashid Hafeez Khokhar, Md Asri Ngadi and Satria Mandala. “A Review of Current Routing Attacks in Mobile Ad hoc Networks”. International Journal of Computer Science and Security, 2(3):18-29, 2008
  10. Oscar F. Gonzalez, God win Ansa, Michael Howarth and George Pavlou. “Detection and Accusation of Packet Forwarding Misbehavior in Mobile Ad-Hoc networks”. Journal of Internet Engineering, 2:1, 2008
  11. G. S. Mamatha Dr. S. C. Sharma “A Robust Approach to Detect and Prevent Network Layer Attacks in MANETS” International Journal of Computer Science and Security, Volume (4): Issue (3)
  12. Soumya Sankar Basu and Atul Chaudhuri “Self Adaptive MANET: A Centralized Approach”, Foundation of Computing and Decision Sciences, 2004, vol. 29, no. 4, page 271-286
Index Terms

Computer Science
Information Sciences

Keywords

MANET Security Malicious nodes Reactive Routing attacks Simple Robust Attack Strategy