An Approach to Prevent Gray-hole Attacks on Mobile ad-hoc Networks

被引:0
作者
Sachan, Kusumlata [1 ]
Lokhande, Manisha [1 ]
机构
[1] SAIT Collage, Dept CSE, Indore, MP, India
来源
PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG) | 2016年
关键词
MANET; Gray-hole attack; Security threats; DSR; NS2; AODV;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless communication is used to establish connection between nodes that communicate with each other. MANET (Mobile ad hoc Network) is having Open nature that makes it vulnerable for various security threats. These vulnerabilities allow the attacker to compromise the network and degrade the performance of the network. Gray-hole attack is one of the dangerous attacks. A gray-hole attack is extremely standard and applies on network layer by targeting vulnerabilities of routing protocols. This work considers gray-hole attack as study target and derives mechanism to spot and stop MANETs from security threat. The entire works take into account Ad-hoc on Demand Routing protocol and prevention of Gray-hole attack in MANET on AODV protocol.
引用
收藏
页数:6
相关论文
共 50 条
[31]   Connectivity Model for Mobile Ad-Hoc Networks [J].
Bruun, Rasmus Liborius ;
Voulgaris, Konstantinos ;
Pedersen, Troels .
2022 16TH EUROPEAN CONFERENCE ON ANTENNAS AND PROPAGATION (EUCAP), 2022,
[32]   A review on propagation of secure data, prevention of attacks and routing in mobile ad-hoc networks [J].
Borkar, Gautam M. ;
Mahajan, A. R. .
INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2020, 24 (01) :23-57
[33]   Anomaly based Intrusion detection of Packet Dropping Attacks in Mobile Ad-hoc Networks [J].
Uyyala, Shivani ;
Naik, Dinesh .
2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, :1137-1140
[34]   A Multidimensional Trust Inference Model for the Mobile Ad-Hoc Networks [J].
Riaz, Muhammad Khalid ;
Fan Yangyu ;
Akhtar, Imran .
2019 28TH WIRELESS AND OPTICAL COMMUNICATIONS CONFERENCE (WOCC), 2019, :496-500
[35]   Performance Analysis of an Enhanced DOA for Mobile Ad-hoc Networks [J].
Vanitha, M. ;
Parvathavarthini, B. .
2013 IEEE INTERNATIONAL CONFERENCE ON SMART STRUCTURES AND SYSTEMS (ICSSS), 2013, :131-137
[36]   PRP: A High-Performance Routing Protocol for Mobile Ad-Hoc Networks [J].
Vu Khanh Quy ;
Nguyen Dinh Han ;
Nguyen Tien Ban .
2018 INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR COMMUNICATIONS (ATC), 2018, :226-231
[37]   Clustering of Mobile Ad Hoc Networks: An Approach for Black Hole Prevention [J].
Sayner, Jitendra ;
Gupta, Vinit .
PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, :361-365
[38]   A Bullet-Proof Verification Approach to Defend against Black Hole Attacks in Mobile Ad Hoc Networks [J].
Ahmed, Firoz ;
Yoon, Seokhoon ;
Oh, Hoon .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (03) :422-436
[39]   Detection and Prevention of single and Cooperative Black Hole attacks in Mobile ad Hoc Networks [J].
Subathra, P. ;
Sivagurunathan, S. ;
Ramaraj, N. .
INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2010, 6 (01) :38-57
[40]   Dynamics of Data Delivery in Mobile Ad-hoc Networks: A Bargaining Game Approach [J].
Njilla, Laurent Yamen ;
Pissinou, Niki .
2015 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE FOR SECURITY AND DEFENSE APPLICATIONS (CISDA), 2015, :98-103