Full Paper View Go Back

Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network

Pradeep Kumar Sharma1 , Shivlal Mewada2 , Pratiksha Nigam3

Section:Research Paper, Product Type: Journal
Vol.1 , Issue.4 , pp.8-11, Sep-2013

Online published on Oct 30, 2013


Copyright © Pradeep Kumar Sharma, Shivlal Mewada , Pratiksha Nigam . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Pradeep Kumar Sharma, Shivlal Mewada , Pratiksha Nigam, “Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network,” International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.4, pp.8-11, 2013.

MLA Style Citation: Pradeep Kumar Sharma, Shivlal Mewada , Pratiksha Nigam "Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network." International Journal of Scientific Research in Network Security and Communication 1.4 (2013): 8-11.

APA Style Citation: Pradeep Kumar Sharma, Shivlal Mewada , Pratiksha Nigam, (2013). Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network. International Journal of Scientific Research in Network Security and Communication, 1(4), 8-11.

BibTex Style Citation:
@article{Sharma_2013,
author = {Pradeep Kumar Sharma, Shivlal Mewada , Pratiksha Nigam},
title = {Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {9 2013},
volume = {1},
Issue = {4},
month = {9},
year = {2013},
issn = {2347-2693},
pages = {8-11},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=86},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=86
TI - Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Pradeep Kumar Sharma, Shivlal Mewada , Pratiksha Nigam
PY - 2013
DA - 2013/10/30
PB - IJCSE, Indore, INDIA
SP - 8-11
IS - 4
VL - 1
SN - 2347-2693
ER -

4957 Views    4299 Downloads    4327 Downloads
  
  

Abstract :
Mobile ad hoc networks (MANETs) are a set of mobile nodes which are self-configuring and connected by wireless links automatically as per the defined routing protocol. Security is an essential requirement in MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad-hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. These mobile nodes communicate with each other without any infrastructure, furthermore, all of the transmission links are established through wireless medium. There is no guarantee that a communication path is free from malicious or compromised nodes which deliberately wish to disrupt the network communication. So protecting the mobile ad-hoc network from malicious attacks is very important and challenging issue. In this paper we address the study of different types of attack, problem of packet forwarding misbehavior and propose a mechanism to detect the black and gray hole attacks.

Key-Words / Index Term :
Mobile Ad Hoc Network, Black Hole , Gray Hole

References :
[1] Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani & Kamal Bunkar,“an Overview & Study of Security Issues in Mobile Adhoc Networks”,Int. Journal of Computer Science and Information Security (IJCSIS) USA, Volume-9, No.4, pp (106-111), April 2011.
[2] Shivlal Mewada and Umesh Kumar Singh, “Measurement Based Performance of Reactive and Proactive Routing Protocols in WMN”, Int. Journal of advanced research in Computer Science and Software Engineering Vol. 1, No. 1, pp(1-4), Dec.-2011.
[3] C.E.Perkins and E.M.Royer, “Ad-Hoc On Demand Distance Vector Routing,” Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applictions, pp.90-100, Feb, 2010.
[4] Shivlal Mewada, Umesh Kumar Singh and Pradeep Kumar Sharma, " Simulation Based Performance Evaluation of Routing Protocols for Mobile Ad-hoc Networks (MANET)", IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), Vol. 2, No. 4,August 2012
[5] M.Abolhasan, T.Wysocki, E.Dutkiewicz, “ A Review of Routing Protocols for Mobile Ad-Hoc Networks,” Telecommunication and Infromation Research Institute University of Wollongong, Australia, June, 2003.
[6] T.Clausen, P.Jacquet , “Optimized Link State Routing Protocol (OLSR)”, RFC 3626 October, 2003.
[7] Z.J.Hass, M.R.Pearlman, P.Samar, “The Zone Routing Protocol (ZRP) for Ad Hoc Networks”, 55th Proceeding of International task force, July, 2002.
[8] P.V.Jani, “Security within Ad-Hoc Networks,” Position Paper, PAMPAS Workshop, Sept. 16/17 2002.
[9] M.Parsons, P.Ebinger, “Performance Evaluation of the Impact of Attacks on mobile Ad-Hoc networks”,[Online].Available:www.cse.buffalo.edu/srds2009/dncms2009_submission_person.pdf, [Accessed: April. 10, 2010].

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation