Full Paper View Go Back

An Implementation of the Gray Hole Prevention Technique for MANETs Based on Sequence Number

Vaibhav Jain1

Section:Research Paper, Product Type: Journal
Vol.1 , Issue.2 , pp.47-51, Jun-2013

Online published on Jun 30, 2013


Copyright © Vaibhav Jain . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Vaibhav Jain, “An Implementation of the Gray Hole Prevention Technique for MANETs Based on Sequence Number,” International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.47-51, 2013.

MLA Style Citation: Vaibhav Jain "An Implementation of the Gray Hole Prevention Technique for MANETs Based on Sequence Number." International Journal of Scientific Research in Network Security and Communication 1.2 (2013): 47-51.

APA Style Citation: Vaibhav Jain, (2013). An Implementation of the Gray Hole Prevention Technique for MANETs Based on Sequence Number. International Journal of Scientific Research in Network Security and Communication, 1(2), 47-51.

BibTex Style Citation:
@article{Jain_2013,
author = {Vaibhav Jain},
title = {An Implementation of the Gray Hole Prevention Technique for MANETs Based on Sequence Number},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {6 2013},
volume = {1},
Issue = {2},
month = {6},
year = {2013},
issn = {2347-2693},
pages = {47-51},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=431},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=431
TI - An Implementation of the Gray Hole Prevention Technique for MANETs Based on Sequence Number
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Vaibhav Jain
PY - 2013
DA - 2013/06/30
PB - IJCSE, Indore, INDIA
SP - 47-51
IS - 2
VL - 1
SN - 2347-2693
ER -

4657 Views    4143 Downloads    4119 Downloads
  
  

Abstract :
Protecting the network layer from malicious attacks is an important and challenging security issue in mobile ad hoc networks (MANETs). MANETs are used most commonly all around the world because it has the ability to communicate with each other without any fixed network. It has the tendency to take decisions on its own which is the autonomous state. A security solution is very much needed for networks to protect both route and data forwarding operations in the network layer. A Gray Hole is a node that selectively drops and forwards data packets after it advertises itself as having the shortest path to the destination node in response to a route request message from a source code. Gray holes are difficult to detect. In this work, we have proposed a method that can be used to find the secured routes and prevent the black holes nodes (malicious nodes) in the MANET by checking whether there is a large difference between the sequence number of the source node or intermediate node. For this, we have created 3 scenarios for implementation i.e. Normal AODV, AODV with attack, and AODV with gray hole prevention. Our results confirm that our proposed prevention technique based on sequence number was effective and successful in identifying Gray Hole nodes in a network and could remove these malicious nodes from the network.

Key-Words / Index Term :
Gray Hole Prevention, MANET security, Ad hoc Network Security

References :
[1]. Marti, Sergio, et al. “Mitigating routing misbehavior in mobile ad hoc networks.” Proceedings of the 6th annual international conference on Mobile computing and networking. 2000.
[2]. Yang, Hao, Xiaoqiao Meng, and Songwu Lu. “Self-organized network-layer security in mobile ad hoc networks.” Proceedings of the 1st ACM workshop on Wireless security. 2002.
[3]. Ramaswamy, Sanjay, et al. “Prevention of cooperative black hole attack in wireless ad hoc networks.” International conference on wireless networks. Vol. 2003. 2003.
[4]. Agrawal, Piyush, Ratan K. Ghosh, and Sajal K. Das. “Cooperative black and gray hole attacks in mobile ad hoc networks.” Proceedings of the 2nd international conference on Ubiquitous information management and communication. 2008.
[5]. Nadeem, Adnan, and Michael Howarth. “Protection of MANETs from a range of attacks using an intrusion detection and prevention system.” Telecommunication Systems Vol. 52, 2047-2058, 2013.
[6]. Deng, Hongmei, Wei Li, and Dharma P. Agrawal. “Routing security in wireless ad hoc networks.” IEEE Communications magazine Vol. 40.10, 70-75, 2002.
[7]. Jakobsson, Markus, Jean-Pierre Hubaux, and Levente Buttyán. “A micro-payment scheme encouraging collaboration in multi-hop cellular networks.” Financial Cryptography: 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003. Revised Papers 7. Springer Berlin Heidelberg, 2003.
[8]. Padilla, E., et al. “Detecting black hole attack in tactical MANETs using topology graph.” Proceeding of 32nd IEEE conference on local computer networks. 2007.
[9]. Banerjee, Sukla. “Detection/removal of cooperative black and gray hole attack in mobile ad-hoc networks.” proceedings of the world congress on engineering and computer science. Vol. 2008. 2008.
[10]. Sen, Jaydip, et al. “A mechanism for detection of gray hole attack in mobile Ad Hoc networks.” 2007 6th International Conference on Information, Communications & Signal Processing. IEEE, 2007.
[11]. Himral, Lalit, Vishal Vig, and Nagesh Chand. “Preventing aodv routing protocol from black hole attack.” International Journal of Engineering Science and Technology (IJEST), Vol 3.5, 3927-3932, 2011.
[12]. Paquereau, Laurent, and Bjarne E. Helvik. “Simulation of wireless multi-* networks in ns-2.” 3rd International ICST Conference on Performance Evaluation Methodologies and Tools. 2010.
[13]. Neha Singh, Rajeshwar Lal Dua, Vinita Mathur. “Network simulator ns2-2.35”. International Journal of Advanced Research in Computer Science and Software Engineering. 2012.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation