Research Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015
Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack
Jagdish J. Rathod, Amit. M. Lathigara
Abstract: Ad hock Network is a temporary network set up to share information among nodes. The network is constrained about resources and always has threat from malicious nodes. Gray hole attack is one of the attack in which, attacker node drops some packets and forward some packets and because of its behaviour its difficult to detect and prevent. In this Paper proposed a technique to identify and prevent Gray hole attacks in AODV based MANETs, in proposed approached, using AODV protocol which is widely used in MANETs and it easy to use. In Proposed work by verifying source address in the RREQ control packet named Source Node ID. This field will be used to store the value of the IP of the intermediate node that processes the RREQ. Because it checks destination sequence number and time stamp when any RREP comes from source node or and any attacker nodes. Source node will keep this field empty when it initiates the route request and forward the RREQ packet. It will keep a copy of its own RREQ. Proposed method uses the available control packets i. e. RREQ and RREP to ascertain trustworthiness of a node. Therefore, new packets like acknowledgment packets need not be introduced for proving reliability. Results are present taken with the help of the NS2 simulator, which is widely used in networking field.
Keywords: Ad hock network, Security, different Attacks, Gary Hole Attack, NS2, AODV
Edition: Volume 4 Issue 7, July 2015,
Pages: 2674 - 2680
How to Cite this Article?
Jagdish J. Rathod, Amit. M. Lathigara, "Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB157155, Volume 4 Issue 7, July 2015, 2674 - 2680
How to Share this Article?
Similar Articles with Keyword 'Security'
A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Similar Articles with Keyword 'different Attacks'
Spotting and Segregation of Sinkhole Node in MANET
Jeeja Borkar, Vaishali Malekar
Review: Securing Broker-Less Public/Subscribe Systems Using Identity-Based Encryption
Minakshi B. Shingan, Sanchika A. Bajpai
Similar Articles with Keyword 'NS2'
Predicting and Extending of Sensor Lifetime in Wireless Sensor Networks using Fuzzy Logic
Pawan Kumar, Manoj Challa
A Survey of Location Based Services Caching for Efficient Data Access in DTN
Trupti Gedam, Archana D. Shinde
Similar Articles with Keyword 'AODV'
A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols
Sunita, Sunil Makkar
Secured Greedy Geographical Reliable Reactive Routing for WSN
Bhramitha B Shetty, Manimozhi Iyer
Similar Articles with Keyword 'Ad'
Multifunctional Remote Controlled Robot Using Android Application
T. A. Mithu, T. S. Reddy
Artificial Intelligence for Hiring
Ishan Borker, Ashok Veda
Similar Articles with Keyword 'hock'
ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems
Vinod Kumar, Syeda Asra, Yallappa Meti
Performance Prediction of Players in Sports League Matches
Praveen Kumar Singh, Muntaha Ahmad
Similar Articles with Keyword 'network'
Joining Delay; Packet Delivery and Limitations of EGMP
G. Anandhi, Dr. S. K. Srivatsa
Image Noise Reduction with Autoencoder using Tensor Flow
Jai Sehgal, Dr Yojna Arora