An Approach to Prevent Gray-hole Attacks on Mobile ad-hoc Networks

被引:0
|
作者
Sachan, Kusumlata [1 ]
Lokhande, Manisha [1 ]
机构
[1] SAIT Collage, Dept CSE, Indore, MP, India
关键词
MANET; Gray-hole attack; Security threats; DSR; NS2; AODV;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless communication is used to establish connection between nodes that communicate with each other. MANET (Mobile ad hoc Network) is having Open nature that makes it vulnerable for various security threats. These vulnerabilities allow the attacker to compromise the network and degrade the performance of the network. Gray-hole attack is one of the dangerous attacks. A gray-hole attack is extremely standard and applies on network layer by targeting vulnerabilities of routing protocols. This work considers gray-hole attack as study target and derives mechanism to spot and stop MANETs from security threat. The entire works take into account Ad-hoc on Demand Routing protocol and prevention of Gray-hole attack in MANET on AODV protocol.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Behavior Analysis of Flooding Attacks in Sparse Mobile Ad-Hoc Networks
    Idezuka, Takuya
    Kimura, Tomotaka
    Muraguchi, Masahiro
    2018 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-TAIWAN (ICCE-TW), 2018,
  • [22] Attacks against AODV Routing Protocol in Mobile Ad-Hoc Networks
    Moudni, Houda
    Er-Rouidi, Mohamed
    Mouncif, Hicham
    El Hadadi, Benachir
    2016 13TH INTERNATIONAL CONFERENCE ON COMPUTER GRAPHICS, IMAGING AND VISUALIZATION (CGIV), 2016, : 385 - 389
  • [23] A New Approach to Detecting and Preventing the Worm Hole Attacks for Secure Routing in Mobile Ad-hoc Networks based on the SPR Protocol
    Sharifi, Seyed Ali
    Babamir, Seyed Morteza
    2016 IEEE 10TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2016, : 258 - 262
  • [24] Analysis of security methods in Vehicular Ad-Hoc Network against Worm Hole and Gray Hole attacks
    Stepien, Krzysztof
    Poniszewska-Maranda, Aneta
    2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020), 2020, : 371 - 378
  • [25] A mechanism for detection of gray hole attack in mobile ad hoc networks
    Sen, Jaydip
    Chandra, M. Girish
    Hariliara, S. G.
    Reddy, Harish
    Balamuralidhar, P.
    2007 6TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS & SIGNAL PROCESSING, VOLS 1-4, 2007, : 627 - 631
  • [26] Game Theoretic Modeling of Gray Hole Attacks in Wireless Ad Hoc Networks
    Doshi, Chintan Ketankumar
    Sankaranarayanan, Sreecharan
    Lakshman, Vidyashankar B.
    Chandrasekaran, K.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL, NETWORKS, COMPUTING, AND SYSTEMS (ICSNCS 2016), VOL 1, 2017, 395 : 217 - 226
  • [27] A survey of black hole attacks in wireless mobile ad hoc networks
    Tseng, Fan-Hsun
    Chou, Li-Der
    Chao, Han-Chieh
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2011, 1 : 1 - 16
  • [28] Intrusion detection in mobile ad-hoc networks: A mobile agent approach
    Kaur, Upinder
    Patel, R. B.
    ICIT 2006: 9TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2006, : 77 - +
  • [29] Virtual Mobile Ad-hoc Networks
    Lahav, Jonathan
    Stulman, Ariel
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2013), 2013, : 433 - 434
  • [30] Ad-hoc, mobile, and wireless networks
    Palattella, Maria Rita
    Scanzio, Stefano
    INTERNET TECHNOLOGY LETTERS, 2021, 4 (04)