We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Detection & Prevention of Gray Hole Attack in Mobile Ad-Hoc Network using AODV Routing Protocol

by Onkar V.chandure, V. T. Gaikwad
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 41 - Number 5
Year of Publication: 2012
Authors: Onkar V.chandure, V. T. Gaikwad
10.5120/5538-7591

Onkar V.chandure, V. T. Gaikwad . Detection & Prevention of Gray Hole Attack in Mobile Ad-Hoc Network using AODV Routing Protocol. International Journal of Computer Applications. 41, 5 ( March 2012), 27-32. DOI=10.5120/5538-7591

@article{ 10.5120/5538-7591,
author = { Onkar V.chandure, V. T. Gaikwad },
title = { Detection & Prevention of Gray Hole Attack in Mobile Ad-Hoc Network using AODV Routing Protocol },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 41 },
number = { 5 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 27-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume41/number5/5538-7591/ },
doi = { 10.5120/5538-7591 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:28:50.794744+05:30
%A Onkar V.chandure
%A V. T. Gaikwad
%T Detection & Prevention of Gray Hole Attack in Mobile Ad-Hoc Network using AODV Routing Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 41
%N 5
%P 27-32
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we describe the basic idea related with the implementation of AODV protocol & impact of gray hole attack on adhoc network. Information exchange in a network of mobile and wireless nodes without any infrastructure support such networks are called as adhoc networks. A Mobile adhoc network is mobile, multihop wireless network which is capable of autonomous operation. A Gray hole is a node that selectively drops and forwards data packets after advertises itself as having the shortest path to the destination node in response to a route request message. Our mechanism helps to protect the network by detecting and reacting to malicious activities of any node. The results enable us to minimize the attacks on integrated MANET-Internet communication efficiently. Simulation will be carried out by using network simulator tool so as to address the problem of detection & prevention of gray hole attack in mobile ad-hoc network.

References
  1. K. Snazgiri, B. Dahill, B. Levine, C. Shields, and E. A. Belding-Royer, "Secure routing protocol for ad hoc networks,"In Proceedings of International Conference on Network Protocols (ICNP), Paris, France, November 2002.
  2. L. Zhou, and Z. Haas, "Securing ad hoc network," IEEE Network Magazine, Special issue on network security, Vol. 13,No. 6, November/December 1999, pp. 24-30.
  3. C. Mbarushimana, and A. Shahrabi, "Comparative Study of Reactive and Proactive Routing Protocols Performance in Mobile Ad Hoc Networks," in Proc. of the 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW '07),May 2007, pp. 679–684.
  4. S. Yi and R. Kravets, Composite Key Management for AdHoc Networks. Proc. of the 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services(MobiQuitous'04), pp. 52-61, 2004.
  5. R. Oppliger, Internet and Intranet Security, Artech House, 1998.
  6. Vishnu K, and Amos J . Paul," Detection & Removal of cooperative Black/Gray hole attack in Mobile ADHOC Networks. " International Journal of Computer Applications 2010, Volume 1-No. 22, pp. 38-42.
  7. Sukla Banerjee "Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks"Proceedings of the World Congress on Engineering and Computer Science 2008 WCECS 2008, October 22 - 24, 2008, San Francisco, USA.
  8. Oscar F. Gonzalez, God win Ansa, Michael Howarth and George Pavlou. "Detection and Accusation of Packet Forwarding Misbehavior in Mobile Ad-Hoc networks", Journal of Internet Engineering, 2:1, 2008.
  9. K. Weniger, M. Zitterbart, "Mobile adhoc networks – current approaches and future directions," Network, IEEE, vol 18, Issue 4, pp 6–11, July-Aug 2004.
  10. Rappaport, T. S. ; Annamalai, A. ; Buehrer, R. M. ; Tranter, W. H. ,"Wireless communications: past events and a future perspective",IEEE Communications Magazine, Vol. 40, Issue 5, PP 148 – 161, May 2002.
  11. Conti M, Giordano S, "Multihop Adhoc Networking: The Theory",IEEE Communications Magazine, Volume 45, Issue 4, pp 78 - 86,April 2007
  12. Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya,John Dixon, and Kendall Nygard,"Prevention of Cooperative Black Hole Attack in Wireless AdHoc Networks". In Proceedings of 2003 International Conference on Wireless Networks (ICWN'03), Las Vegas, Nevada, USA, pp. 570-575.
  13. Y. Hu, A. Perrig, and D. Johnson, "Ariadne: A secure on demand routing protocol for ad-hoc networks," In Proceedings of the 8th Annual International Conference on Mobile Computing and Networking (MobiCom 2002), pp. 12-23,ACM Atlanta, GA, September 2002
  14. P. Papadimitratos, and Z. Haas, "Secure routing for mobile ad hoc networks," In Proceedings of SCS Communications Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 2002.
  15. K. Snazgiri, B. Dahill, B. Levine, C. Shields, and E. A. Belding-Royer, "Secure routing protocol for ad hoc networks," In Proceedings of International Conference on Network Protocols (ICNP), Paris, France, November 2002. .
  16. Jaydip Sen, M. Girish Chandra Harihara S. G ,H. Reddy P. Balamuralidhar,"A Mechanism for Detection of Gray Hole Attack in Mobile AdHoc Networks," Information, Communications & Signal Processing, 2007 6th International Conference on. ICICS 2007,pp. 1-5.
Index Terms

Computer Science
Information Sciences

Keywords

Ns-2 Adhoc Network Aodv Gray Hole Attack. Security Threats Packet Forwarding Misbehavior