Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Methods of Preventing and Detecting Black/Gray Hole Attacks on AODV-based MANET

Print
PDF
Network Security and Cryptography
© 2011 by IJCA Journal
NSC - Number 5
Year of Publication: 2011
Authors:
Marjan Kuchaki Rafsanjani
Zahra Zahed Anvari
Shahla Ghasemi
10.5120/4352-052

Marjan Kuchaki Rafsanjani, Zahra Zahed Anvari and Shahla Ghasemi. Article: Methods of Preventing and Detecting Black/Gray Hole Attacks on AODV-based MANET. IJCA Special Issue on Network Security and Cryptography NSC(5):11-17, December 2011. Full text available. BibTeX

@article{key:article,
	author = {Marjan Kuchaki Rafsanjani and Zahra Zahed Anvari and Shahla Ghasemi},
	title = {Article: Methods of Preventing and Detecting Black/Gray Hole Attacks on AODV-based MANET},
	journal = {IJCA Special Issue on Network Security and Cryptography},
	year = {2011},
	volume = {NSC},
	number = {5},
	pages = {11-17},
	month = {December},
	note = {Full text available}
}

Abstract

Mobile Ad hoc Network (MANET) is constructed from a collection of nodes that can move anywhere and anytime in different areas without any infrastructure. Each node works at the same time as router and host. Lack of a fixed infrastructure, wireless medium and dynamic topology makes MANET vulnerable to different kinds of attacks. In this paper, we investigate different mechanisms that have designed to detect or prevent black or gray hole attacks in AODV protocol. We discuss about advantages and disadvantages of the methods and also compare them.

Reference

  • Biswas, K., and Liakat Ali, M. D. 2007 Security Threats in Mobile Ad Hoc Network. Master Thesis. Thesis no: MCS-2007:07., Blekinge Institute of Technology.
  • Ullah, I., and Rehman, S. U. 2010 Analysis of Black Hole attack On MANETs Using different MANET Routing Protocols. Master Thesis. Thesis no: MEE-2010-2698., Blekinge Institute of Technology.
  • Banerjee, S. 2008. Detection/removal of cooperative black and gray hole attack in mobile ad-hoc networks, In Proceedings of the World Congress on Engineering and Computer Science.
  • Jain, S., Jain, M., and Kandwal H. 2010. Advanced algorithm for detection and prevention of cooperative black and gray hole attacks in mobile ad hoc networks. J. Computer Applications, Vol. 1, No. 7, 37-42.
  • Marti, S., Giuli, T. J., Lai, K., and Baker, M. 2000. Mitigating routing misbehavior in mobile ad hoc networks, In Proceedings of the 6th Annual International Conference on MOBICOM, Boston, Massachusetts, United States, 255-265.
  • Yang, H., Shu, J., Meng, X., and Lu, S. 2006. SCAN: Self-organized network-layer security in mobile ad hoc networks, J. IEEE Selected Areas in Comm. Vol. 24, No. 2 (Feb. 2006), 261-273.
  • Agrawal, P., Ghosh, R. K., and Das, S. K. 2008. Cooperative black and gray hole attacks in mobile ad hoc networks. In Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, Suwon, Korea, 310-314.
  • Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., and Nemoto, Y. 2007. Detecting blackhole attack on aodv-based mobile ad hoc networks by dynamic learning method. J. Network Security. Vol. 5, No. 3 (Nov. 2007), 338–346.
  • Baadache, and Belmehdi, A. 2010. Avoiding black hole and cooperative black hole attacks in wireless ad hoc networks, J. Comp. Sci. and Info. Security, Vol. 7, No. 1, 10-16.
  • Su, M. Y. 2011. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. J. Comp. Comm., Vol. 34, 107–117.
  • Weerasinghe, H., Fu, H. 2008. Preventing cooperative black hole attacks in mobile ad hoc networks, Int. J. of Soft. Eng. and Its App., Vol. 2, No. 3 (Jul. 2008), 39-54.
  • Patcha, A., and Mishra, A., 2003. Collaborative security architecture for black hole attack prevention in mobile ad hoc networks. In Proceedings of the Radio and Wireless Conference (RWCON), VA, USA, 75-78.
  • Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, j., and Nygard, K. 2003. Prevention of cooperative black hole attack in wireless ad hoc networks. In Proceedings of the International Conference on Wireless Networks.
  • Raj, P. N., and Swadas, P. B. 2009. DPRAODV: A dynamic learning system against blaackhole attack in aodv based MANET, J. Comp. Sci. Issues, Vol. 2, 54-59.
  • Sen, J., Chandra, M.G., Harihara, S.G., Reddy, H., and Balamuralidhar, P. 2007. A mechanism for detection of gray hole attack in mobile ad hoc networks, In Proceedings of the 6th International Conference on Information, Communications & Signal Processing, Singapore, 1-5.