A Review on Implementation of AODV Technique for Isolation of Gray Hole Attack in MANET

Authors

  • Er. Shalika  Computer Science Engineering Sant Baba Bhag Singh University Jalandhar, Punjab, India
  • Dr. Jatinder Singh Bal  Prof .Computer Science Engineering Sant Baba Bhag Singh University Jalandhar, Punjab, India
  • Dr. Vijay Dhir  Computer Science Engineering Sant Baba Bhag Singh University Jalandhar, Punjab, India

Keywords:

MANETS, Gray Hole, Active, Passive

Abstract

The mobile ad hoc network is the decentralized and self-configuring type of network in which mobile nodes can join or leave the network when they want. Due to decentralized nature malicious nodes enter the network which is responsible to trigger various type attacks. The security attacks reduce network performance in terms of various parameters. In this paper, various techniques are reviewed to increase security of the mobile adhoc networks .

References

  1. Taneja Sunil, Kush Ashwani,"End to End Delay Analysis of Prominent On-demand Routing Protocols", IJCST Vol. 2, Issue1, March 2011
  2. MOHAMED ABDUL HAIMID BASHIR, thesis, "ANALYSIS AND SIMULATION OF WIRELESS AD-HOC NETWORK ROUTING PROTOCOLS"2004 
  3. Vigna Giovanni, Elizabeth M. Belding-Royer Richard A. Kemmerer, "An Intrusion Detection Tool forOLSR-based Ad hocWireless Networks", 2004
  4. Sen Sevil, Tapiador Juan , "Security Threats in Mobile Ad Hoc Networks", 2010
  5. Nandy Rusha, "Study of Various Attacks in MANET and Elaborative Discussion Of Rushing Attack on DSR with clustering scheme" Int. J. Advanced Networking and Applications Volume: 03, Issue: 01, Pages:1035-1043 (2011)
  6. Wenjia Li and joshi Anupam , "Security Issues in Mobile Ad Hoc Networks- A Survey",2005
  7. Tsudik Gene, "Anonymous Location-Aided Routing Protocols for Suspicious MANETs", 2010
  8. Karim El Defrawy, and Tsudik Gene, "ALARM: Anonymous Location-Aided Routing in Suspicious MANETs" , IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 9, SEPTEMBER 2011
  9. N. Purohit, R. Sinha and K. Maurya, "Simulation Study of Black Hole and JEllyfish Attack on MAnet using NS-3," IEEE, pp. 1-5, 2011.
  10. H. L. Nguyen and U. T. Nguyen, "A Study of Different Types of Attacks in Mobile Adhoc Network," 25th IEEE Canadian Conference on Electrical and Computer Engineering, no. 2, pp. 1-6, 2012.
  11. Tyagi s.s, R.K. Chauhan, "Performance analysis of Proactive and Reactive routing protocols for the ad hoc networks", International journal of computer applications, Vol. 1No.-14, 2010, pp. 27-30
  12. Padilla, E., Aschenbruck, N., Martini, P., Jahnke, M., & Tolle, J. (2007). Detecting black hole attack in tactical MANETs using topology graph. In Proceeding of 32nd IEEE conference on local computer networks.
  13. L. Zhou, and Z. Haas, "Securing ad hoc network," IEEE Network Magazine, Special issue on network security, Vol. 13,No. 6, November/December 1999, pp. 24-30.
  14. X. Hong, K. Xu, M. Gerla, " Scalable routing protocols for mobile ad hic networks",Network IEEE, Vol. 16, Issue 4, july 2002, pp. 11-21.
  15. S.A. Ade1& P.A. Tijare, "Performance Comparisons of the AODV, DSDV, OLSR and DSR Routing Protocols in MANET", International Journal of Information Technology and Knowledge Management, Vol. 2, No. 2,Dec. 2010, pp. 545-548
  16. Banerjee Sukla "Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks"Proceedings of the World Congress on Engineering and Computer Science 2008 WCECS 2008, October 22 - 24,2008, San Francisco, USA.
  17. Gonzalez,Oscar God win Ansa, Michael Howarth andGeorge Pavlou. "Detection and Accusation of Packet Forwarding Misbehavior in Mobile Ad-Hoc networks", Journal of Internet Engineering, 2:1, 2008.
  18. K. Weniger, M. Zitterbart, "Mobile adhoc networks – current approaches and future directions," Network, IEEE, vol 18, Issue 4, pp 6–11, July-Aug 2004.
  19. opinder singh, Jatinder singh, Ravinder singh" An intelligent Intrusion Detection and Prevention System for Safeguard Mobile Adhoc Networks against Malicious Nodes", Volumne 10, Issue 14 April 2017.
  20. Conti M, Giordano S, "Multihop Adhoc Networking: The Theory",IEEE Communications Magazine, Volume 45, Issue 4, pp 78 - 86,April 2007
  21. Seung Yi, Robin Kravets, "Key Management for Heterogeneous Ad Hoc Wireless Networks", 2002, 10 th IEEE International Conference on Network Protocols (ICNP’02) 1092-1648
  22. kyasanur Pradeep "Selfish MAC layer Misbehavior in wireless networks", IEEE on Mobile Computing,2005
  23. Yixin Jiang Chuang Lin, Minghui Shi, Xuemin Shen "Multiple Key Sharing and Distribution Scheme With (n; t) Threshold for NEMO Group Communications", IEEE 2006
  24. Rupinder singh, Jatinder simgh, Ravinder singh,"WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks" Mobile Information Systems Volume 2016 (2016).
  25. Chen Tien- Chen and Shih Wei-KuanShih , "A Robust Mutual Authentication Protocol for Wireless Sensor Networks ETRI Journal, Volume 32, Number 5, October 2010
  26. Jacek Cicho, RafaƂ Kapelko, Jakub Lemiesz, and Marcin Zawada "On Alarm Protocol in Wireless Sensor Networks", 2010
  27. J. Sen, S. Koilakinda and A. Ukil, "A mechanism for Detection of Cooperative Black Hole Attack in Mobile Adhoc Network," International conference on Inteligent Systems, Modellingand Simulation, pp. 338-343, 2011.
  28. Singh P. K and G. Sharma, "An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET," IEEE International conference on Trust, Security andPrivacy in Computing and Communcation, pp. 902-906, 2012.
  29. F. Thachil and K. Shet, "A Trust Based Approach for AODV Protocol to mitigate Black Hole Attack in MANET," International conference on Computing Sciences ,pp. 281-285, 2012.
  30. K. Munjal, S. Verma and A. Bakshi, "Cooperative Black Hole Node Detection by Modifying AODV," International Journal of Management, IT and Engineering, vol. 2, no. 8, pp. 484-501, 2012.

Downloads

Published

2018-09-30

Issue

Section

Research Articles

How to Cite

[1]
Er. Shalika, Dr. Jatinder Singh Bal, Dr. Vijay Dhir, " A Review on Implementation of AODV Technique for Isolation of Gray Hole Attack in MANET, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 7, pp.138-145, September-October-2018.