Please enter verification code
Confirm
Methods for Detection and Removal of Grayhole Attack in Mobile Adhoc Network (MANET)
American Journal of Software Engineering and Applications
Volume 5, Issue 3-1, May 2016, Pages: 15-19
Received: Mar. 6, 2016; Accepted: Mar. 7, 2016; Published: Jun. 24, 2016
Views 4842      Downloads 154
Authors
Mahdi Zolfaghari, Department Computer, Science and Research Branch, Islamic Azad University, Tehran, Iran
Mohammad Sadeghzadeh, Department of Computer, Mashhad Branch, Islamic Azad University, Mashhad, Iran
Reza Frouzande, Department Computer, Science and Research Branch, Islamic Azad University, Tehran, Iran
Ahmad Emami, Department Computer, Science and Research Branch, Islamic Azad University, Tehran, Iran
Article Tools
Follow on us
Abstract
Mobile Adhoc Networks, because collections of moving node and wireless is formed and also due to the dynamic changes in the communication topology, which is quite vulnerable target a wide range of attacks were shown; one of the attacks, Gray hole attack that is easy on reactive routing protocols such as Dynamic Source Routing protocol runs out. Gray hole attack, not the malware behavioral honest during the process of discovery route, but later, the malicious node is leveling; and can route discovery process to transmit information on the network, stirred and network performance to reduce the loss of data. Therefore using this method of detection and removal of malicious attacks, is useful to increase network efficiency and ensure correct data in ad hoc networks is transmitting. In this paper we introduce the attack and investigate the last gray hole existing methods for detecting and removing it is addressed. The paper is concluded with discussion on the results.
Keywords
Mobile Adhoc Network (MANET), Gray Hole Attack, Dynamic Source Routing (DSR), Black Hole Attack
To cite this article
Mahdi Zolfaghari, Mohammad Sadeghzadeh, Reza Frouzande, Ahmad Emami, Methods for Detection and Removal of Grayhole Attack in Mobile Adhoc Network (MANET), American Journal of Software Engineering and Applications. Special Issue: Advances in Computer Science and Information Technology in Developing Countries. Vol. 5, No. 3-1, 2016, pp. 15-19. doi: 10.11648/j.ajsea.s.2016050301.14
Copyright
Copyright © 2016 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
References
[1]
Khattak. Hizbullah, Nizamuddin, “A Hybrid Approach for Preventing Black and Gray Hole Attacks in MANET,” 978-1-4799-0615-4/13/$31.00, IEEE, 2013
[2]
Vishnu. K, and Amos. J. Paul, “ Detection & Removal of cooperative Black/Gray hole attack in Mobile ADHOC Networks”, International Journal of Computer Applications 2010, Volume 1-No.22, pp. 38-42.2010
[3]
Hiremani. Vani A, Jadhao. Manisha Madhukar,“Eliminating Co-operative Blackhole and Grayhole Attacks Using Modified EDRI Table in MANET”, IEEE, 2013
[4]
Gambhir. Sapna, Sharma. Saurabh, “PPN: Prime Product Number based Malicious Node Detection Scheme for MANETs”, IEEE, 2012
[5]
Mohanapriya. M, Krishnamurthi. Ilango, “Modified DSR Protocol for detection and removal of selective black hole attack in MANET”, ComputElectrEng(2013), http://dx.doi.org/10.1016/j.compeleceng.2013.06.001, Elsevier, 2013
[6]
D. B. Johnson and D. A. Maltz. “Dynamic Source Routing in Ad Hoc Wireless Networks,” Mobile Computing, edited by Tomasz Imielinski and Hank Korth, Kluwer Academic Publishers, chapter 5, pp. 153–181, 1996
[7]
Mazidi. Arash, Rajabzade. Mostafa, “Analysis, assessment and implementation of routing algorithms in ad hoc networks”, the Eighth Symposium on Advances in science and technology, computer engineering and sustainable development with a focus on computer networks, modeling and security systems, higher education institution grave, Mashhad, December 2013. (in persian)
[8]
M. Al-Shurman, S.-M. Yoo, and S. Park, “Black hole attack in mobile adhoc networks,” in Proceedings of the 42nd annual South east regional conference. New York, NY, USA: ACM Press, pp. 96-97, 2004
[9]
Doori. Ali, Mohammad Karimizadeh Takabi. Tahereh, “Black hole attack analysis and network discovery in MANET ”, Regional Conference on Electrical and Computer Engineering methods of calculation software, Islamic Azad University Safashahr, February 2014.(in persian)
[10]
Rezaei. Mehrdad, Jafari. Mahdi, and Amini Lari. Mansour, “Study of routing protocols attacks and security issues in ad hoc network ”, First National Conference on Electrical and Computer southern Iran, Islamic Azad University Khormoj, April 2013.(in persian)
[11]
CAI. Jiwen, YI. Ping, and CHEN. Jialin, WANG. Zhiyang, and LIU. Ning, “ An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network”, 1550-445X/10 $26.00, DOI 10.1109/AINA.2010.143, IEEE, 2010
[12]
Yang Su. Ming, “ Prevention of selective black hole attacks on mobile ad hoc networks throughintrusion detection systems”, Elsevier, 2011
[13]
Sergio Marti et al, “Mitigating routing misbehavior in mobile ad-hoc networks,” Proceedings of the International Conference on Mobile Computing And Networking ACM (MobiCOM 2000), 2000
[14]
Ms. Sonali P. Botkar, Mrs. Shubhangi R. Chaudhary, “ An Enhanced Intrusion detection System using Adaptive Acknowledgmentbased, Algorithm”, 978-1-4673-0126-8/11/$26.00c 2011 IEEE, IEEE, 2011
[15]
Merkle, R. C. (1988). “A Digital Signature Based on a Conventional Encryption Function”.“Advances in Cryptology CRYPTO '87 ”. Lecture Notes in Computer Science 293. p. 369. doi: 10.1007/3-540-48184-2_32. ISBN 978-3-540-18796-7., 1988
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186