Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network
Keywords:
Mobile Ad Hoc Network, Black Hole, Gray HoleAbstract
Mobile ad hoc networks (MANETs) are a set of mobile nodes which are self-configuring and connected by wireless links automatically as per the defined routing protocol. Security is an essential requirement in MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad-hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. These mobile nodes communicate with each other without any infrastructure, furthermore, all of the transmission links are established through wireless medium. There is no guarantee that a communication path is free from malicious or compromised nodes which deliberately wish to disrupt the network communication. So protecting the mobile ad-hoc network from malicious attacks is very important and challenging issue. In this paper we address the study of different types of attack, problem of packet forwarding misbehavior and propose a mechanism to detect the black and gray hole attacks.
References
Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani & Kamal Bunkar,“an Overview & Study of Security Issues in Mobile Adhoc Networks”,Int. Journal of Computer Science and Information Security (IJCSIS) USA, Volume-9, No.4, pp (106-111), April 2011.
Shivlal Mewada and Umesh Kumar Singh, “Measurement Based Performance of Reactive and Proactive Routing Protocols in WMN”, Int. Journal of advanced research in Computer Science and Software Engineering Vol. 1, No. 1, pp(1-4), Dec.-2011.
C.E.Perkins and E.M.Royer, “Ad-Hoc On Demand Distance Vector Routing,” Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applictions, pp.90-100, Feb, 2010.
Shivlal Mewada, Umesh Kumar Singh and Pradeep Kumar Sharma, " Simulation Based Performance Evaluation of Routing Protocols for Mobile Ad-hoc Networks (MANET)", IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), Vol. 2, No. 4,August 2012
M.Abolhasan, T.Wysocki, E.Dutkiewicz, “ A Review of Routing Protocols for Mobile Ad-Hoc Networks,” Telecommunication and Infromation Research Institute University of Wollongong, Australia, June, 2003.
T.Clausen, P.Jacquet , “Optimized Link State Routing Protocol (OLSR)”, RFC 3626 October, 2003.
Z.J.Hass, M.R.Pearlman, P.Samar, “The Zone Routing Protocol (ZRP) for Ad Hoc Networks”, 55th Proceeding of International task force, July, 2002.
P.V.Jani, “Security within Ad-Hoc Networks,” Position Paper, PAMPAS Workshop, Sept. 16/17 2002.
M.Parsons, P.Ebinger, “Performance Evaluation of the Impact of Attacks on mobile Ad-Hoc networks”,[Online].Available:www.cse.buffalo.edu/srds2009/dncms2009_submission_person.pdf, [Accessed: April. 10, 2010].
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.