Downloads: 107 | Views: 324
Research Paper | Computer Science & Engineering | India | Volume 7 Issue 4, April 2018 | Popularity: 7 / 10
Detection & Prevention of Gray Hole Attack in Mobile Ad-Hoc Network using AODV Routing Protocol
Siddharth Gupta, Skand Singh, Suramya Tripathi, Manish Kumar
Abstract: In MANET, the Gray Hole attack, is a node in the network start behaving like a Gray hole node that selectively drops and forwards data packets after advertises itself as having the shortest path to the destination node in response to a route request message. Mobile ad hoc networks (MANET) are widely used in places where there is little or no infrastructure. A number of people with mobile devices may connect together to form a large group. Later on they may split into smaller groups. This dynamically changing network topology of MANETs makes it vulnerable for a wide range of attack. Many researchers have given different solutions for preventing and detecting this attack. We have discussed a methodology in this survey. We are using AODV protocol for sending packet to the destination. and then introducing a gray hole node which drops the packet. To improve the performance, we are using IDS aodv technique, which enable us to minimize the attacks on integrated MANET-Internet communication efficiently. In this paper we have used AODV routing Protocol for route discovery. When malicious node starts dropping packets we use Intrusion Detection scheme to report violation of policy and the nodes whose packets are dropped again try to establish new paths using Route Requests (RREQ) messages. In our paper the NS2 scenario shows that the throughput is improved than traditional gray hole attacks.
Keywords: MANET, AODV, Routing Protocols, gray hole node, malicious node
Edition: Volume 7 Issue 4, April 2018
Pages: 1285 - 1287
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024
Pages: 1490 - 1494An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication
Mamta, Dr. Shiva Prakash
Downloads: 3
Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 991 - 996Review on Various Data Gathering Techniques Using Artificial Intelligence
Varsha Kumari, Preeti Sondhi
Downloads: 80
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2450 - 2452A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols
Sunita, Sunil Makkar
Downloads: 100
Research Paper, Computer Science & Engineering, Ghana, Volume 4 Issue 2, February 2015
Pages: 2448 - 2452Reliable and Rapid Routing Configurations for Network Recovery
William Asiedu K. O. Boateng
Downloads: 101
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1450 - 1456An Aerial View of Hierarchical Energy Efficient Protocols in Wireless Body Sensor Networks
M. Devapriya, R. Sudha