Downloads: 107 | Views: 353
Research Paper | Computer Science & Engineering | India | Volume 7 Issue 4, April 2018 | Popularity: 7 / 10
Detection & Prevention of Gray Hole Attack in Mobile Ad-Hoc Network using AODV Routing Protocol
Siddharth Gupta, Skand Singh, Suramya Tripathi, Manish Kumar
Abstract: In MANET, the Gray Hole attack, is a node in the network start behaving like a Gray hole node that selectively drops and forwards data packets after advertises itself as having the shortest path to the destination node in response to a route request message. Mobile ad hoc networks (MANET) are widely used in places where there is little or no infrastructure. A number of people with mobile devices may connect together to form a large group. Later on they may split into smaller groups. This dynamically changing network topology of MANETs makes it vulnerable for a wide range of attack. Many researchers have given different solutions for preventing and detecting this attack. We have discussed a methodology in this survey. We are using AODV protocol for sending packet to the destination. and then introducing a gray hole node which drops the packet. To improve the performance, we are using IDS aodv technique, which enable us to minimize the attacks on integrated MANET-Internet communication efficiently. In this paper we have used AODV routing Protocol for route discovery. When malicious node starts dropping packets we use Intrusion Detection scheme to report violation of policy and the nodes whose packets are dropped again try to establish new paths using Route Requests (RREQ) messages. In our paper the NS2 scenario shows that the throughput is improved than traditional gray hole attacks.
Keywords: MANET, AODV, Routing Protocols, gray hole node, malicious node
Edition: Volume 7 Issue 4, April 2018
Pages: 1285 - 1287
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 2
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Downloads: 3
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Downloads: 9 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 2, February 2024
Pages: 736 - 741Energy Efficient Routing Algorithm for Future Ad-hoc Wireless Networks
Dr. J. Seetaram, Dr. M. Nagaraju Naik
Downloads: 80
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2450 - 2452A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols
Sunita, Sunil Makkar
Downloads: 86
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 297 - 300Balancing the Trade-Offs between Data Availability and Query Delay in MANETs
Umar I. Masumdar, N. S. Killarikar