An Anti-Gray Hole Attack Scheme in Mobile Ad Hoc Network

被引:0
|
作者
Omid Moradipour
Mohammad Fathi
机构
[1] Kermanshah Branch,Department of Information Technology Engineering, College of Engineering
[2] Islamic Azad University,Department of Electrical and Computer Engineering
[3] University of Kurdistan,undefined
关键词
Mobile ad hoc network; AODV routing protocol; Gray hole attack; IDS node; Anti-gray hole attack mechanism;
D O I
暂无
中图分类号
学科分类号
摘要
Dynamic variation of network topology in mobile ad hoc networks (MANET) forces network nodes to work together and rely on each other for routing. Considering the lack of a central control node, some nodes appear maliciously and selectively drop the data packets instead of transmitting to the next hop node, which is known as the gray hole attack. In order to prevent and identify the gray hole attack, an intrusion detection system (IDS) is proposed on nodes to maintain network efficiency. In addition to establishing security, the proposed anti gray hole attack mechanism extracts abnormal differences between routing packets in the route discovery phase of the ad hoc on-demand distance vector (AODV) routing protocol. It then assigns a suspicious value to each participating node and monitors the exchange of data packets between neighboring nodes in the data transfer phase using a data transmission information table. If the suspicious value reaches a predetermined threshold, IDS nodes send an alert message to other nodes about the identity of the malicious node, in order to prevent its activity on the network. Simulation results indicate that the performance of the proposed scheme in terms of packet delivery rate, packet loss rate, and routing overhead outperforms those in the literature.
引用
收藏
页码:558 / 567
页数:9
相关论文
共 50 条
  • [1] An Anti-Gray Hole Attack Scheme in Mobile Ad Hoc Network
    Moradipour, Omid
    Fathi, Mohammad
    [J]. INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2020, 27 (04) : 558 - 567
  • [2] Novel gray hole attack detection scheme for mobile ad-hoc networks
    Chen, Wei
    Long, Xiang
    Gao, Xiaopeng
    Bai, Yuebin
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2007, 44 (08): : 1371 - 1377
  • [3] A Novel Gray Hole attack detection scheme for Mobile Ad-Hoc Networks
    Gao Xiaopeng
    Chen Wei
    [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 209 - 214
  • [4] A mechanism for detection of gray hole attack in mobile ad hoc networks
    Sen, Jaydip
    Chandra, M. Girish
    Hariliara, S. G.
    Reddy, Harish
    Balamuralidhar, P.
    [J]. 2007 6TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS & SIGNAL PROCESSING, VOLS 1-4, 2007, : 627 - 631
  • [5] An Analytical Approach for Detection of Gray Hole Attack in Mobile Ad-hoc Network (MANET)
    Shukla, Parineet D.
    Kanthe, Ashok M.
    Simunic, Dina
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 78 - 82
  • [6] THE EFFECTIVENESS OF MOBILE AD HOC ROUTING PROTOCOLS UNDER A GRAY HOLE ATTACK
    Mahlous, Ahmed Redha
    [J]. INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2019, 11 (01): : 59 - 72
  • [7] A Model to Prevent Gray Hole Attack in Mobile Ad-Hoc Networks
    Khosa, Thabiso N.
    Mathonsi, Topside E.
    Du Plessis, Deon P.
    [J]. JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2023, 14 (03) : 532 - 542
  • [8] BLACK HOLE ATTACK MODEL AND SIMULATION FOR MOBILE AD HOC NETWORK
    Ding, Yuanming
    Qu, Hao
    Li, Guang
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2015, 11 (01): : 203 - 211
  • [9] A new solution for resisting gray hole attack in mobile ad-hoc networks
    Chen Wei
    Long Xiang
    Bai Yuebin
    Gao Xiaopeng
    [J]. 2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 782 - 786
  • [10] A Survey over Black hole Attack Detection in Mobile Ad hoc Network
    Behzad, Shahram
    Jamali, Shahram
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (03): : 44 - 51