Abstract: Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 108

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015

Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack

Jagdish J. Rathod, Amit. M. Lathigara

Ad hock Network is a temporary network set up to share information among nodes. The network is constrained about resources and always has threat from malicious nodes. Gray hole attack is one of the attack in which, attacker node drops some packets and forward some packets and because of its behaviour its difficult to detect and prevent. In this Paper proposed a technique to identify and prevent Gray hole attacks in AODV based MANETs, in proposed approached, using AODV protocol which is widely used in MANETs and it easy to use. In Proposed work by verifying source address in the RREQ control packet named Source Node ID. This field will be used to store the value of the IP of the intermediate node that processes the RREQ. Because it checks destination sequence number and time stamp when any RREP comes from source node or and any attacker nodes. Source node will keep this field empty when it initiates the route request and forward the RREQ packet. It will keep a copy of its own RREQ. Proposed method uses the available control packets i. e. RREQ and RREP to ascertain trustworthiness of a node. Therefore, new packets like acknowledgment packets need not be introduced for proving reliability. Results are present taken with the help of the NS2 simulator, which is widely used in networking field.

Keywords: Ad hock network, Security, different Attacks, Gary Hole Attack, NS2, AODV

Edition: Volume 4 Issue 7, July 2015

Pages: 2674 - 2680

Share this Article

How to Cite this Article?

Jagdish J. Rathod, Amit. M. Lathigara, "Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB157155, Volume 4 Issue 7, July 2015, 2674 - 2680

Enter Your Email Address


Similar Articles with Keyword 'Security'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Similar Articles with Keyword 'different Attacks'

Downloads: 101

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2169 - 2172

Spotting and Segregation of Sinkhole Node in MANET

Jeeja Borkar, Vaishali Malekar

Share this Article

Downloads: 107

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2704 - 2706

Review: Securing Broker-Less Public/Subscribe Systems Using Identity-Based Encryption

Minakshi B. Shingan, Sanchika A. Bajpai

Share this Article

Similar Articles with Keyword 'NS2'

Downloads: 100

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1838 - 1842

Predicting and Extending of Sensor Lifetime in Wireless Sensor Networks using Fuzzy Logic

Pawan Kumar, Manoj Challa

Share this Article

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2725 - 2726

A Survey of Location Based Services Caching for Efficient Data Access in DTN

Trupti Gedam, Archana D. Shinde

Share this Article

Similar Articles with Keyword 'AODV'

Downloads: 80

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Downloads: 102

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 895 - 900

Secured Greedy Geographical Reliable Reactive Routing for WSN

Bhramitha B Shetty, Manimozhi Iyer

Share this Article

Similar Articles with Keyword 'Ad'

Downloads: 174 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 132 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Similar Articles with Keyword 'hock'

Downloads: 107

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1689 - 1692

ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems

Vinod Kumar, Syeda Asra, Yallappa Meti

Share this Article

Downloads: 122

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2207 - 2213

Performance Prediction of Players in Sports League Matches

Praveen Kumar Singh, Muntaha Ahmad

Share this Article

Similar Articles with Keyword 'network'

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 85

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article
Top