CFP last date
20 January 2025
Reseach Article

Various Attacks in MANET and its Counter Measures

by Manjeet Singh, Kamaljit Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 91 - Number 2
Year of Publication: 2014
Authors: Manjeet Singh, Kamaljit Kaur
10.5120/15855-4759

Manjeet Singh, Kamaljit Kaur . Various Attacks in MANET and its Counter Measures. International Journal of Computer Applications. 91, 2 ( April 2014), 34-38. DOI=10.5120/15855-4759

@article{ 10.5120/15855-4759,
author = { Manjeet Singh, Kamaljit Kaur },
title = { Various Attacks in MANET and its Counter Measures },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 91 },
number = { 2 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 34-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume91/number2/15855-4759/ },
doi = { 10.5120/15855-4759 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:11:44.624980+05:30
%A Manjeet Singh
%A Kamaljit Kaur
%T Various Attacks in MANET and its Counter Measures
%J International Journal of Computer Applications
%@ 0975-8887
%V 91
%N 2
%P 34-38
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In present years, Security is important concern in Mobile ad hoc Network. MANET is self organized network which contains mobile nodes communicate with each other using wireless links. Nodes in the network are free to move in and out of the network. Due to its unique characteristics like Dynamic topology, Lack of central management, Limited resources, they are vulnerable to various types of attacks . In this paper we will present survey of various attacks like Black hole, Gray hole and worm hole attack in MANET. We will also discuss various proposed solutions to prevent and elimination of these attacks.

References
  1. Ramanathan, Ram, and Jason Redi. "A brief overview of ad hoc networks: challenges and directions. " IEEE communications Magazine 40, no. 5 (2002): 20-22.
  2. Tamilselvan, Latha, and V. Sankaranarayanan. "Prevention of blackhole attack in MANET. " In Wireless Broadband and Ultra Wideband Communications, 2007. AusWireless 2007. The 2nd International Conference on, pp. 21-21. IEEE, 2007.
  3. Singh, Pramod Kumar, and Govind Sharma. "An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET. " In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, pp. 902-906. IEEE, 2012.
  4. Lu, Songbai, Longxuan Li, Kwok-Yan Lam, and Lingyan Jia. "SAODV: a MANET routing protocol- that can withstand black hole attack. " InComputational Intelligence and Security, 2009. CIS'09. International Conference on, vol. 2, pp. 421-425. IEEE, 2009.
  5. Medadian, Mehdi, Ahmad Mebadi, and Elham Shahri. "Combat with Black Hole attack in AODV routing protocol. " In Communications (MICC), 2009 IEEE 9th Malaysia International Conference on, pp. 530-535. IEEE, 2009.
  6. Jaiswal, Ranjeet, and Sanjay Sharma. "A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in Ad hoc Network. " In Advance Computing Conference (IACC), 2013 IEEE 3rd International, pp. 499-504. IEEE, 2013.
  7. Jhaveri, Rutvij. "MR-AODV: A Solution to Mitigate Blackhole and Grayhole Attacks in AODV Based MANETs. " In Accepted and To be published In: Proceeding of International Conference on Advanced Computing & Communication Technologies (ACCT 2013), CPS (IEEE Computer Society). 2013.
  8. Khattak, Hizbullah, N. Nizamuddin, and F. Khurshid. "Preventing black and gray hole attacks in AODV using optimal path routing and hash. " In Networking, Sensing and Control (ICNSC), 2013 10th IEEE International Conference on, pp. 645-648. IEEE, 2013.
  9. Patel, Meenakshi, and Sanjay Kumar Sharma. "Detection and prevention of Routing Attacks in MANET using AODV. " International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE) 1, no. 1 (2012): pp-39.
  10. Yudhvir,Avni,Prabha,Deepika and Dheer " Wormhole Attack Avoidance Technique in Mobile Adhoc Networks. " In 3rd International Conference on Advanced Computing & Communication Technologies, pp 283-287. IEEE, 2013.
  11. Dabas, Poonam, and Prateek Thakral. "A Novel Technique for the Prevention of Wormhole Attack. " International Journal 3, no. 6 (2013).
  12. Hinds, Alex, Michael Ngulube, Shaoying Zhu, and Hussain Al-Aqrabi. "A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET). " International Journal of Information and Education Technology, Vol. 3, No. 1, February 2013.
  13. Sheikh, Rashid, M. Singh Chande, and D. Kumar Mishra. "Security issues in MANET: A review. " In Wireless And Optical Communications Networks (WOCN), 2010 Seventh International Conference On, pp. 1-4. IEEE, 2010.
  14. Zaiba Ishrat. "Security issues, challenges & solution in MANET. " IJCST Vol. 2, Issue 4, Oct - Dec. 2011.
  15. Jhaveri, Rutvij H. , Sankita J. Patel, and Devesh C. Jinwala. "Dos attacks in mobile ad hoc networks: A survey. " In Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on, pp. 535-541. IEEE, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Blackhole Grayhole Wormhole