International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 116

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015


Cooperative Gray Hole Attack Detection and Prevention Techniques in MANET: Review

Shani Makwana | Krunal Vaghela [2]


Abstract: MANET (Mobile Ad Hoc Network) is a type of ad hoc network that can change locations and configure itself, because of moving of nodes. As MANETs are mobile in nature, they use wireless connections to connect various networks without infrastructure or any centralized administration. Open medium, dynamic topology, distributed cooperation are the characteristics of MANET and hence ad hoc networks are open to different types of security attacks. This paper represents a review of different techniques of gray hole attack detection and prevention on AODV routing protocol. All the techniques are having some advantages and disadvantages. Among all of these techniques, the credit based technique gives better performance in terms of end to end delay, throughput and packet delivery ratio. The results can be improved in different cases under various scenarios like pause time, number of nodes and varying speed of nodes.


Keywords: MANET, AODV Routing Protocol, Gray Hole Attack


Edition: Volume 4 Issue 1, January 2015,


Pages: 448 - 451

Cooperative Gray Hole Attack Detection and Prevention Techniques in MANET: Review


How to Cite this Article?

Shani Makwana, Krunal Vaghela, "Cooperative Gray Hole Attack Detection and Prevention Techniques in MANET: Review", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB15152, Volume 4 Issue 1, January 2015, 448 - 451, #ijsrnet

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'MANET'

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar | Purnima Selokar [2]

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon | Dinesh Kumar [24]

Share this Article


Top