We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

An Analysis of Gray-hole Attacks on Mobile Ad-hoc Networks

by Kusumlata Sachan, Manisha Lokhande
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 146 - Number 14
Year of Publication: 2016
Authors: Kusumlata Sachan, Manisha Lokhande
10.5120/ijca2016910954

Kusumlata Sachan, Manisha Lokhande . An Analysis of Gray-hole Attacks on Mobile Ad-hoc Networks. International Journal of Computer Applications. 146, 14 ( Jul 2016), 42-45. DOI=10.5120/ijca2016910954

@article{ 10.5120/ijca2016910954,
author = { Kusumlata Sachan, Manisha Lokhande },
title = { An Analysis of Gray-hole Attacks on Mobile Ad-hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2016 },
volume = { 146 },
number = { 14 },
month = { Jul },
year = { 2016 },
issn = { 0975-8887 },
pages = { 42-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume146/number14/25469-2016910954/ },
doi = { 10.5120/ijca2016910954 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:50:29.666144+05:30
%A Kusumlata Sachan
%A Manisha Lokhande
%T An Analysis of Gray-hole Attacks on Mobile Ad-hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 146
%N 14
%P 42-45
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless communication is used to establish dialog among nodes and correspondence information. Mobile ad-hoc network is a collection of mobile nodes deployed with special purpose. Open nature of communication makes it vulnerable for various security threats. Subsequently, routing protocols are used to establish communication between nodes using route discovery mechanism. This paper gives brief details about security threats and AODV routing protocols along with gray-hole attack to investigate the need of preventive mechanism for better performance.

References
  1. M. S. marti, T.Guili, K. Lai, & M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks”, In proceedings of MOBICOM 2000.
  2. 2. Yinghua Guo,Sylvieb Perreau,Trace flooding attack in mobile Ad hoc networks IEEE 2007.
  3. Piyush Agrawal, R. K. Ghosh, Sajal K. Das, Cooperative Black and Gray Hole Attacks in Mobile Ad Hoc Networks In Proceedings of the 2nd international conference on Ubiquitous information management and communication, 2008.
  4. A. Nadeem, M.Howarth “ Protection of MANETs from a range of attacks using an intrusion detection & prevention system” published in Springer science + Business Media in 2011.
  5. Jaydip Sen, “An Analysis of Routing Disruption Attack on Dynamic Source Routing Protocol.” IEEE, 987-1-4577-0787-2/11, 2011.
  6. Sukla Banerjee “Detection/Removal of Cooperative Black & Gray Hole Attack in MANETs” in proceedings of the World Congress on Engineering & Computer Science 2008.
  7. Jaydip Sen, M.Girish Chandra, Harihara S.G. “A Mechanism For Detection Of Gray Hole Attack in Mobile Ad Hoc Networks” published in IEEE Journal in 2007.
  8. A. Rajaram,Malicious Node Detection System for Mobile Ad hoc Networks,in proceeding of the International jounaral of computer science &information Technologies 2010.
  9. Minda Xiang,Yu chen,Wei Shinn Ku,Zhou su,mitigating DDOS attacks using protection nodes in mobile Ad hoc networks,pub in IEEE 2011 proc.
  10. V.Shanmuganthan ,Grayhole attack in MANET publish IRACST vol 2,Dec2012.
  11. Arjun Chaudhry,Improving Performance of MANET via Cooperative Communication with Selective Cooperation method considering Dynamic Traffic Pattern using NS2, published in IEEE , 978-1-4799-5958-7/14,2014.
  12. S.Sreenvasa chakrarthi, Intrustion detection tech.&Instrusion detection system in manet 6th international confrance on computation Intelligance and communication networks 2014.
  13. Qutaiba Razouqi,Extensive Simulation Performance Analysis for DSDV, DSR and AODV MANET Routing Protocols, Published IEEE, 2013.
  14. Yoguandhara Patil,Comparison of Mechanisms against Denial of Service Attack in Mobile Ad-Hoc Networks, publish IEEE 2015.
  15. Shani Makwana, Cooperative Gray Hole Attack Detection and Prevention Techniques in MANET,Published International Journal of Science and Research (IJSR),Jan 2015.
  16. Parineet D Shukla,An Analytical Approach for Detection of Gray Hole Attack in Mobile Ad-hoc Network (MANET).IEEE,978-1-4799-3975,2014.
  17. Vishali Mittal International “Prevention and Elimination of Gray Hole Attack in Mobile Ad-Hoc Networks by Enhanced Multipath Approach, Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Issue 5, May 2015.
  18. Arshdeep singh, Detection and Prevention of Black Hole Attacks in Manets Using NTP Method, International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 2, February 2016.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Security AODV Grayhole DSR NS2.