Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network

Authors

  • Pradeep Kumar Sharma Department of Computer Science, Govt. Holkar Science College, Indore, India
  • Shivlal Mewada Department of Computer Science, Govt. Holkar Science College, Indore, India
  • Pratiksha Nigam Department of Computer Science, Govt. Holkar Science College, Indore, India

Keywords:

Mobile Ad Hoc Network, Black Hole, Gray Hole

Abstract

Mobile ad hoc networks (MANETs) are a set of mobile nodes which are self-configuring and connected by wireless links automatically as per the defined routing protocol. Security is an essential requirement in MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad-hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. These mobile nodes communicate with each other without any infrastructure, furthermore, all of the transmission links are established through wireless medium. There is no guarantee that a communication path is free from malicious or compromised nodes which deliberately wish to disrupt the network communication. So protecting the mobile ad-hoc network from malicious attacks is very important and challenging issue. In this paper we address the study of different types of attack, problem of packet forwarding misbehavior and propose a mechanism to detect the black and gray hole attacks.

 

References

Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani & Kamal Bunkar,“an Overview & Study of Security Issues in Mobile Adhoc Networks”,Int. Journal of Computer Science and Information Security (IJCSIS) USA, Volume-9, No.4, pp (106-111), April 2011.

Shivlal Mewada and Umesh Kumar Singh, “Measurement Based Performance of Reactive and Proactive Routing Protocols in WMN”, Int. Journal of advanced research in Computer Science and Software Engineering Vol. 1, No. 1, pp(1-4), Dec.-2011.

C.E.Perkins and E.M.Royer, “Ad-Hoc On Demand Distance Vector Routing,” Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applictions, pp.90-100, Feb, 2010.

Shivlal Mewada, Umesh Kumar Singh and Pradeep Kumar Sharma, " Simulation Based Performance Evaluation of Routing Protocols for Mobile Ad-hoc Networks (MANET)", IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), Vol. 2, No. 4,August 2012

M.Abolhasan, T.Wysocki, E.Dutkiewicz, “ A Review of Routing Protocols for Mobile Ad-Hoc Networks,” Telecommunication and Infromation Research Institute University of Wollongong, Australia, June, 2003.

T.Clausen, P.Jacquet , “Optimized Link State Routing Protocol (OLSR)”, RFC 3626 October, 2003.

Z.J.Hass, M.R.Pearlman, P.Samar, “The Zone Routing Protocol (ZRP) for Ad Hoc Networks”, 55th Proceeding of International task force, July, 2002.

P.V.Jani, “Security within Ad-Hoc Networks,” Position Paper, PAMPAS Workshop, Sept. 16/17 2002.

M.Parsons, P.Ebinger, “Performance Evaluation of the Impact of Attacks on mobile Ad-Hoc networks”,[Online].Available:www.cse.buffalo.edu/srds2009/dncms2009_submission_person.pdf, [Accessed: April. 10, 2010].

Downloads

Published

2013-10-30

How to Cite

[1]
P. K. Sharma, S. Mewada, and P. Nigam, “Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network”, Int. J. Sci. Res. Net. Sec. Comm., vol. 1, no. 4, pp. 8–11, Oct. 2013.

Issue

Section

Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.