Skip to main content

2021 | OriginalPaper | Buchkapitel

Performance Analysis of MANET Under Grayhole Attack Using AODV Protocol

verfasst von : Samiran Gupta, Harsh Nath Jha

Erschienen in: Architectural Wireless Networks Solutions and Security Issues

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile ad hoc network (MANET) has been a challenging field with its foremost criteria like heterogeneity of nodes, dynamic topology, energy constraint and security over the years. MANETs are globally popular for their cost-effectiveness ease of access and configuration. However, MANETs are vulnerable to many types of attacks like Blackhole, Wormhole, Grayhole, etc., which makes MANETs pretty much risky to rely upon when scaling up on a large scale. Under mobile ad hoc networks, all the transmission between the mobile nodes occurs wirelessly. Due to the infrastructure-less, self-organizing and dynamic nature of the nodes, it is an arduous task to enforce any security solutions against these kinds of vulnerabilities. Ad hoc on-demand vector (AODV), a supremely significant route-on-demand routing protocol for MANET, relies on the routing table at each intermediate node location. In this paper, we are mainly analyzing the performance of a MANET under Grayhole attack as per AODV routing protocol using NS-2 simulation environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Aarti SST (2013) Study of MANET: characteristics, challenges, application and security attacks. Int J Adv Res Comput Sci Softw Eng 3(5) Aarti SST (2013) Study of MANET: characteristics, challenges, application and security attacks. Int J Adv Res Comput Sci Softw Eng 3(5)
2.
Zurück zum Zitat Ali H, Shahzad W, Khan FA (2012) Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization. Appl Soft Comput 12(7):1913–1928CrossRef Ali H, Shahzad W, Khan FA (2012) Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization. Appl Soft Comput 12(7):1913–1928CrossRef
3.
Zurück zum Zitat Cho J-H, Chen R, Chan KS (2016) Trust threshold based public key management in mobile ad hoc networks. Ad Hoc Netw 44:58–75CrossRef Cho J-H, Chen R, Chan KS (2016) Trust threshold based public key management in mobile ad hoc networks. Ad Hoc Netw 44:58–75CrossRef
5.
Zurück zum Zitat Gupta S, Das B (2013) Load based reliable routing in multi-sink sensor networks. Res Inventy Int J Eng Sci 2(12):59–64 Gupta S, Das B (2013) Load based reliable routing in multi-sink sensor networks. Res Inventy Int J Eng Sci 2(12):59–64
7.
Zurück zum Zitat Sharma R (2016) Int J Comput Sci Inf Technol 7(3):1457–1460 (IJCSIT) Sharma R (2016) Int J Comput Sci Inf Technol 7(3):1457–1460 (IJCSIT)
8.
Zurück zum Zitat Dhaka A, Nandal A, Dhaka RS (2015) Gray and black hole attack identification using control packets in MANETs. Procedia Comput Sci 54:83–91. ISSN 1877–0509 Dhaka A, Nandal A, Dhaka RS (2015) Gray and black hole attack identification using control packets in MANETs. Procedia Comput Sci 54:83–91. ISSN 1877–0509
9.
Zurück zum Zitat Aarti PR (2015) Prevention and elimination of gray hole attack in mobile ad-hoc networks by enhanced multipath approach. Int J Eng Trends Technol (IJETT) 23(5):224–229. ISSN:2231–5381 Aarti PR (2015) Prevention and elimination of gray hole attack in mobile ad-hoc networks by enhanced multipath approach. Int J Eng Trends Technol (IJETT) 23(5):224–229. ISSN:2231–5381
10.
Zurück zum Zitat Mittal V (2015) Prevention and elimination of gray hole attack in mobile ad-hoc networks by enhanced multipath approach. Int J Adv Res Comput Eng Technol (IJARCET) 4(5) Mittal V (2015) Prevention and elimination of gray hole attack in mobile ad-hoc networks by enhanced multipath approach. Int J Adv Res Comput Eng Technol (IJARCET) 4(5)
11.
Zurück zum Zitat Yang H, Luo H, Ye F, Lu S, Zhang L (2004) Security in mobile ad hoc networks: challenges and solutions. UCLA Previously Published Works Yang H, Luo H, Ye F, Lu S, Zhang L (2004) Security in mobile ad hoc networks: challenges and solutions. UCLA Previously Published Works
12.
Zurück zum Zitat Castellanos WE, Guerri JC, Arce P (2015) A QoS-aware routing protocol with adaptive feedback scheme for video streaming for mobile networks. Comput Commun 77:10–25CrossRef Castellanos WE, Guerri JC, Arce P (2015) A QoS-aware routing protocol with adaptive feedback scheme for video streaming for mobile networks. Comput Commun 77:10–25CrossRef
13.
Zurück zum Zitat Perkins CE, Royer EM (1999) Ad-hoc on-demand distance vector routing. In: Proceedings of the 2nd IEEE workshop on mobile computing systems and applications, pp 90–100 Perkins CE, Royer EM (1999) Ad-hoc on-demand distance vector routing. In: Proceedings of the 2nd IEEE workshop on mobile computing systems and applications, pp 90–100
14.
Zurück zum Zitat Sheikh R, Chande MS, Mishra DK (2010) Security issues in MANET: a review. IEEE Sheikh R, Chande MS, Mishra DK (2010) Security issues in MANET: a review. IEEE
15.
Zurück zum Zitat Goyal P, Parmar V, Rishi R (2011) MANET: vulnerabilities, challenges, attacks, application. IJCEM Int J Comput Eng Manage 11:32–37 Goyal P, Parmar V, Rishi R (2011) MANET: vulnerabilities, challenges, attacks, application. IJCEM Int J Comput Eng Manage 11:32–37
16.
Zurück zum Zitat Lupu TG, Rudas I, Demiralp M, Mastorakis N (2009) Main types of attacks in wireless sensor networks. In: WSEAS international conference. Proceedings. Recent advances in computer engineering Lupu TG, Rudas I, Demiralp M, Mastorakis N (2009) Main types of attacks in wireless sensor networks. In: WSEAS international conference. Proceedings. Recent advances in computer engineering
17.
Zurück zum Zitat Maheshwari R, Gao J, Das SR (2007) Detecting wormhole attacks in wireless networks using connectivity information. In: IEEE INFOCOM 2007–26th IEEE international conference on computer communications, pp 107–115 Maheshwari R, Gao J, Das SR (2007) Detecting wormhole attacks in wireless networks using connectivity information. In: IEEE INFOCOM 2007–26th IEEE international conference on computer communications, pp 107–115
18.
Zurück zum Zitat John NP, Thomas A (2012) Prevention and detection of black hole attack in AODV based mobile ad-hoc networks—a review. Int J Sci Res Publ 2(9) John NP, Thomas A (2012) Prevention and detection of black hole attack in AODV based mobile ad-hoc networks—a review. Int J Sci Res Publ 2(9)
19.
Zurück zum Zitat Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing, pp 46–57 Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing, pp 46–57
20.
Zurück zum Zitat Dai HN, Wang Q, Li D, Wong RC (2013) On Eavesdropping attacks in wireless networks with directional antennas. Int J Distrib Sens Netw 9(8):760834CrossRef Dai HN, Wang Q, Li D, Wong RC (2013) On Eavesdropping attacks in wireless networks with directional antennas. Int J Distrib Sens Netw 9(8):760834CrossRef
21.
Zurück zum Zitat Jhaveri RH, Patel SJ, Jinwala DC (2012) DoS attacks in mobile ad hoc networks: a survey. In: 2nd international conference on advance computing and communication technologies, pp 535–541 Jhaveri RH, Patel SJ, Jinwala DC (2012) DoS attacks in mobile ad hoc networks: a survey. In: 2nd international conference on advance computing and communication technologies, pp 535–541
22.
Zurück zum Zitat Sen B, Sharma K, Ghose MK, Sharma A (2015) Gray hole attack in manets. Int J Adv Electron Comput Sci 2(10). ISSN: 2393–2835 Sen B, Sharma K, Ghose MK, Sharma A (2015) Gray hole attack in manets. Int J Adv Electron Comput Sci 2(10). ISSN: 2393–2835
23.
Zurück zum Zitat Basarkod PI, Manvi SS (2015) Mobility and QoS aware routing in mobile ad hoc networks. Comput Electr Eng 48:86–99 Basarkod PI, Manvi SS (2015) Mobility and QoS aware routing in mobile ad hoc networks. Comput Electr Eng 48:86–99
24.
Zurück zum Zitat Ning P, Sun K (2005) How to misuse AODV: a case study of Insider attacks against mobile ad-hoc routing protocols. Ad Hoc Netw 3(6):795–819CrossRef Ning P, Sun K (2005) How to misuse AODV: a case study of Insider attacks against mobile ad-hoc routing protocols. Ad Hoc Netw 3(6):795–819CrossRef
25.
Zurück zum Zitat Nguyen HL, Nguyen UT (2008) A study of different types of attacks on multicast in mobile ad hoc networks. J Ad Hoc Netw 6:32–46CrossRef Nguyen HL, Nguyen UT (2008) A study of different types of attacks on multicast in mobile ad hoc networks. J Ad Hoc Netw 6:32–46CrossRef
26.
Zurück zum Zitat Deng H, Li W, Agrawal DP (2002) Routing security in wireless Ad Hoc networks. IEEE Commun Mag 40(10):70–75 CrossRef Deng H, Li W, Agrawal DP (2002) Routing security in wireless Ad Hoc networks. IEEE Commun Mag 40(10):70–75 CrossRef
Metadaten
Titel
Performance Analysis of MANET Under Grayhole Attack Using AODV Protocol
verfasst von
Samiran Gupta
Harsh Nath Jha
Copyright-Jahr
2021
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-16-0386-0_15

Neuer Inhalt