CFP last date
20 March 2024
Reseach Article

To Evaluate and Improve ZRP Protocol to Detect and Isolate Gray Hole Attack in Mobile Ad-hoc Network

by Rajwinder Kaur, Vinay Bharadwaj
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 150 - Number 12
Year of Publication: 2016
Authors: Rajwinder Kaur, Vinay Bharadwaj
10.5120/ijca2016911569

Rajwinder Kaur, Vinay Bharadwaj . To Evaluate and Improve ZRP Protocol to Detect and Isolate Gray Hole Attack in Mobile Ad-hoc Network. International Journal of Computer Applications. 150, 12 ( Sep 2016), 25-29. DOI=10.5120/ijca2016911569

@article{ 10.5120/ijca2016911569,
author = { Rajwinder Kaur, Vinay Bharadwaj },
title = { To Evaluate and Improve ZRP Protocol to Detect and Isolate Gray Hole Attack in Mobile Ad-hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2016 },
volume = { 150 },
number = { 12 },
month = { Sep },
year = { 2016 },
issn = { 0975-8887 },
pages = { 25-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume150/number12/26147-2016911569/ },
doi = { 10.5120/ijca2016911569 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:55:48.757662+05:30
%A Rajwinder Kaur
%A Vinay Bharadwaj
%T To Evaluate and Improve ZRP Protocol to Detect and Isolate Gray Hole Attack in Mobile Ad-hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 150
%N 12
%P 25-29
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The mobile ad-hoc network is a type of network which has decentralized and self configuring nature. Due to which malicious nodes may join the network which is responsible to trigger various type of active and passive attacks. In this work, technique will be proposed which will improve in zonal routing protocol. In the zonal routing protocol whole network is divided into zones, in each zone zonal heads are selected which is responsible to route the data from one zone to another zone. In this work, selective routing attack is possible which reduce network performance. The improvement in the zonal routing protocol will be proposed which will be based on the monitor mode technique. In the monitor mode technique, each technique will watch its adjacent technique and node which is responsible to drop packets will be detected as malicious node from the network.

References
  1. A. Samuel Chellathuri, E. D. (2013). ''EZRP: Evolutionary Zone Routing Protocol''. ICACCS , 1-5.
  2. Ashish K. Maurya, D. S. (Nov,2013). "Simulation based Performance Comparison of AODV, FSR and ZRP Routing Protocolin Manet". IJCA , 23-28.
  3. Awadesh Kumar, P. S. (July,2013). ''Performance Anaysis Of AODV ,CBRP,DSDV and DSR MANET Routing Protocols using NS2 sIMULATION''. I.J Computer Network and Information Security , 45-50.
  4. Deepak Kumar, S. C. (May,2012). ''Performance Comparison Of DSDV and AODV Routing Protocols in MANET''. IJECCT , 120-124.
  5. Divangna Gupta, R. K. (aug,2014). Simulationof Different Routing Protocols in MANET Using NS2. International journal of Scientific and Research Publication , 1-5.
  6. Ginni Tonk, I. K. (June,2012). ''Performance Comparison Of Ad-Hoc Network Routing Protocols Using NS2''. IJITEE , 53-57.
  7. Jaydip Sen, H. R. (2007). ''A Mechanism for Detection of GRAY Hole Attack in Moile Ad-Hoc Network''. ICICS , 1-5.
  8. M Ravi Kumar, D. G. (2013). ''Performance Evaluation of AODV and FSR Routing Protocol in MANET. GJCST , 1-7.
  9. Onkar V.Chandure, A. P. (NOV,2012). Simlation of secure AODVin Gray-hole Attack for Mobile ad-hoc Network. IJAET , 67-75.
  10. Onkar V.Chandure, P. (2011). ''A Mechanism for Recognition & Eradication of Gray Hole Attack using AODV Routing protocol in MANET''. IJCSIT , 2607-2611.
  11. Preeti Gharwar, M. S. (April,2013). "Performance Comparison Of Routing Protocols''. IJARCCE , 1920-1924.
  12. Rutvij H. Jhaveri, D. C. (2012). ''A Novel Gray Hole and Black Hole Attacks in Mobile Ad-Hoc Networks''. International Conference on Advanced Computing& Communicaion Technologies'' , 556-560.
  13. Zaiba Ishrat, P. s. (2013). ''Performance Evaluation Of DSDV, DSR and ZRP pROTOCOL in MANET''. IJCAT , 345-349.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Attacks Gray-hole Throughput ZRP internal attacks