Research Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015
Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack
Jagdish J. Rathod, Amit. M. Lathigara
Ad hock Network is a temporary network set up to share information among nodes. The network is constrained about resources and always has threat from malicious nodes. Gray hole attack is one of the attack in which, attacker node drops some packets and forward some packets and because of its behaviour its difficult to detect and prevent. In this Paper proposed a technique to identify and prevent Gray hole attacks in AODV based MANETs, in proposed approached, using AODV protocol which is widely used in MANETs and it easy to use. In Proposed work by verifying source address in the RREQ control packet named Source Node ID. This field will be used to store the value of the IP of the intermediate node that processes the RREQ. Because it checks destination sequence number and time stamp when any RREP comes from source node or and any attacker nodes. Source node will keep this field empty when it initiates the route request and forward the RREQ packet. It will keep a copy of its own RREQ. Proposed method uses the available control packets i.e. RREQ and RREP to ascertain trustworthiness of a node. Therefore, new packets like acknowledgment packets need not be introduced for proving reliability. Results are present taken with the help of the NS2 simulator, which is widely used in networking field.
Keywords: Ad hock network, Security, different Attacks, Gary Hole Attack, NS2, AODV
Edition: Volume 4 Issue 7, July 2015
Pages: 2674 - 2680
How to Cite this Article?
Jagdish J. Rathod, Amit. M. Lathigara, "Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB157155, Volume 4 Issue 7, July 2015, 2674 - 2680
111 PDF Views | 90 PDF Downloads
Similar Articles with Keyword 'Security'
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 700 - 705Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects
Kale Jyoti S
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020
Pages: 1544 - 1554Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Similar Articles with Keyword 'different Attacks'
Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 2169 - 2172Spotting and Segregation of Sinkhole Node in MANET
Jeeja Borkar, Vaishali Malekar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2674 - 2680Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack
Jagdish J. Rathod, Amit. M. Lathigara
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2704 - 2706Review: Securing Broker-Less Public/Subscribe Systems Using Identity-Based Encryption
Minakshi B. Shingan, Sanchika A. Bajpai
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 460 - 465Robust Scheme of Digital Video Watermarking
Priyanka Patil, Chandrakanth Biradar
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 2144 - 2147Analysis of Authentication Method
Shilpa S. Nagargoje, Sarika B. Solanke
Similar Articles with Keyword 'NS2'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1838 - 1842Predicting and Extending of Sensor Lifetime in Wireless Sensor Networks using Fuzzy Logic
Pawan Kumar, Manoj Challa
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1823 - 1826Impact and Performance Analysis of WORMHOLE Attack on AODV in MANET using NS2
Manju Ojha, Dr. Rajendra Singh Kushwah
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2725 - 2726A Survey of Location Based Services Caching for Efficient Data Access in DTN
Trupti Gedam, Archana D. Shinde
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1742 - 1748A MANET Security Using Routing Methodology
Shirsty Chandel, Prof. Ashish Tiwari
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1292 - 1295To Enhance Lifetime of WSN Using Multi-Hop Routing and Trust-Based Intrusion Detection
Sanghavi Parkhi, Hemlata Dakhore
Similar Articles with Keyword 'AODV'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2450 - 2452A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols
Sunita, Sunil Makkar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1295 - 1299A Review on Security Attacks in Mobile Ad-hoc Networks
Amandeep Kaur, Dr. Amardeep Singh
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1572 - 1577Analysis of Various Malicious Node Detection Techniques: A Review
Priyanka, Mukesh Dalal
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1823 - 1826Impact and Performance Analysis of WORMHOLE Attack on AODV in MANET using NS2
Manju Ojha, Dr. Rajendra Singh Kushwah
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1887 - 1991Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network
Rawendra Pratap Singh, Savita Shiwani