Dual Security Based Protocol Against Gray-Hole Attack in MANET

被引:1
|
作者
Mankotia, Vivek [1 ]
Sunkaria, Ramesh Kumar [1 ]
Gurung, Shashi [2 ]
机构
[1] Natl Inst Technol Jalandhar, Dept Elect & Commun, Jalandhar, Punjab, India
[2] Govt Hydro Engn Coll, Dept Comp Sci Engn, Bilaspur, India
关键词
Mobile Ad-hoc Network; security; DS-AODV; intrusion detection system; BLACK-HOLE; PREVENTION; MITIGATION; NETWORKS;
D O I
10.32908/ahswn.v56.9849
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Ad-hoc network is characterized as a network of the self-configuring type that comprises several mobile nodes and can be set up easily without needing any kind of infrastructure. The basic assumption taken in the design of MANET's routing protocols is the consideration of all mobile nodes as trusted nodes. However, some malicious nodes drop few data packets in the network which are very hard to detect. These nodes are referred to as gray-hole nodes that launch the gray-hole attack. In MANET, the two types of gray-hole attacks are sequence number-based gray-hole and smart gray-hole attacks. Many existing schemes deal with gray-hole attacks either during the path discovery stage or the data transmission stage. In this paper, a protocol called as Dual Security Ad-hoc On-Demand Distance Vector (DS-AODV) is proposed which consists of two security mechanisms. The first mechanism is used against the sequence number-based gray-hole attack during the path discovery stage whereas the second mechanism is used against the smart gray-hole attack during the transmission of data phase in which the monitoring nodes monitor the activities of their neighboring nodes. The effectiveness of the proposed scheme is validated in the NS-2.35 simulator and the results obtained through the NS-2 simulator tool demonstrate that DS-AODV with 4 numbers of IDS has better performance as compared with state of an art approach with 98.20% packet delivery rate and 19.73 kbps throughput.
引用
收藏
页码:81 / 104
页数:24
相关论文
共 50 条
  • [1] A Modified Approach for Recognition and Eradication of Extenuation of Gray-Hole Attack in MANET using AODV Routing Protocol
    Kumar, Sudheer
    Doohan, Nitika Vats
    [J]. 2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [2] Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET
    Gurung, Shashi
    Chauhan, Siddhartha
    [J]. WIRELESS NETWORKS, 2019, 25 (03) : 975 - 988
  • [3] Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET
    Shashi Gurung
    Siddhartha Chauhan
    [J]. Wireless Networks, 2019, 25 : 975 - 988
  • [4] ABGF-AODV protocol to prevent black-hole, gray-hole and flooding attacks in MANET
    Gurung, Shashi
    Mankotia, Vivek
    [J]. TELECOMMUNICATION SYSTEMS, 2024, 86 (04) : 811 - 827
  • [5] Simulation Based Study of Gray Hole Attack in MANET
    Dipakkumar, Joshi Shraddha
    Srivastava, Ashish Kumar
    Vithlani, Sunil K.
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 3529 - 3534
  • [6] Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks
    Schweitzer, Nadav
    Stulman, Ariel
    Margalit, Roy David
    Shabtai, Asaf
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (08) : 2174 - 2183
  • [7] A Review: Black Hole & Gray Hole Attack in MANET
    Dixit, Sweta
    Joshi, Krishna Kumar
    Joshi, Neelam
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2015, 8 (04): : 287 - 294
  • [8] A novel approach for mitigating gray hole attack in MANET
    Gurung, Shashi
    Chauhan, Siddhartha
    [J]. WIRELESS NETWORKS, 2018, 24 (02) : 565 - 579
  • [9] A novel approach for mitigating gray hole attack in MANET
    Shashi Gurung
    Siddhartha Chauhan
    [J]. Wireless Networks, 2018, 24 : 565 - 579
  • [10] Detection As Well As Removal Of Black hole And Gray hole Attack In MANET
    Sharma, Neha
    Bisen, Anand Singh
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 3736 - 3739