An Approach to Prevent Gray-hole Attacks on Mobile ad-hoc Networks

被引:0
作者
Sachan, Kusumlata [1 ]
Lokhande, Manisha [1 ]
机构
[1] SAIT Collage, Dept CSE, Indore, MP, India
来源
PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG) | 2016年
关键词
MANET; Gray-hole attack; Security threats; DSR; NS2; AODV;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless communication is used to establish connection between nodes that communicate with each other. MANET (Mobile ad hoc Network) is having Open nature that makes it vulnerable for various security threats. These vulnerabilities allow the attacker to compromise the network and degrade the performance of the network. Gray-hole attack is one of the dangerous attacks. A gray-hole attack is extremely standard and applies on network layer by targeting vulnerabilities of routing protocols. This work considers gray-hole attack as study target and derives mechanism to spot and stop MANETs from security threat. The entire works take into account Ad-hoc on Demand Routing protocol and prevention of Gray-hole attack in MANET on AODV protocol.
引用
收藏
页数:6
相关论文
共 50 条
[41]   Traffic Modelling for Mobile Ad-hoc Networks Simulation [J].
Gajewski, Piotr ;
Lopatka, Jerzy ;
Lubkowski, Piotr .
2021 SIGNAL PROCESSING SYMPOSIUM (SPSYMPO), 2021, :70-75
[42]   Advanced GPSR in Mobile Ad-hoc Networks (MANETs) [J].
Alnabhan M.M. .
International Journal of Interactive Mobile Technologies, 2020, 14 (18) :107-130
[43]   Simulation Study of the SIR in Mobile Ad-Hoc Networks [J].
Xue Jun Li ;
Peter Han Joo Chong .
Wireless Personal Communications, 2009, 48 :239-245
[44]   Route duration modeling for mobile ad-hoc networks [J].
Michael Pascoe-Chalke ;
Javier Gomez ;
Victor Rangel ;
Miguel Lopez-Guerrero .
Wireless Networks, 2010, 16 :743-757
[45]   A Hybrid Certificate Management for Mobile ad-hoc Networks [J].
Kumari, Hemalatha Jai ;
Kannammal, A. .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (06) :62-68
[46]   Simulation Study of the SIR in Mobile Ad-Hoc Networks [J].
Li, Xue Jun ;
Chong, Peter Han Joo .
WIRELESS PERSONAL COMMUNICATIONS, 2009, 48 (02) :239-245
[47]   A RELIABLE FLOODING MECHANISM FOR MOBILE AD-HOC NETWORKS [J].
Narasimhan, B. ;
Vadivel, R. .
2014 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING APPLICATIONS (ICICA 2014), 2014, :301-+
[48]   Data Replication in Cooperative Mobile Ad-Hoc Networks [J].
Hirsch, Dan ;
Madria, Sanjay .
MOBILE NETWORKS & APPLICATIONS, 2013, 18 (02) :237-252
[49]   Route duration modeling for mobile ad-hoc networks [J].
Pascoe-Chalke, Michael ;
Gomez, Javier ;
Rangel, Victor ;
Lopez-Guerrero, Miguel .
WIRELESS NETWORKS, 2010, 16 (03) :743-757
[50]   A New Clustering Protocol For Mobile Ad-hoc Networks [J].
Rezaee, Mohammad ;
Yaghmaee, Mohammad Hossien .
2008 INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS, VOLS 1 AND 2, 2008, :376-381