| Peer-Reviewed

Methods for Detection and Removal of Grayhole Attack in Mobile Adhoc Network (MANET)

Received: 6 March 2016    Accepted: 7 March 2016    Published: 24 June 2016
Views:       Downloads:
Abstract

Mobile Adhoc Networks, because collections of moving node and wireless is formed and also due to the dynamic changes in the communication topology, which is quite vulnerable target a wide range of attacks were shown; one of the attacks, Gray hole attack that is easy on reactive routing protocols such as Dynamic Source Routing protocol runs out. Gray hole attack, not the malware behavioral honest during the process of discovery route, but later, the malicious node is leveling; and can route discovery process to transmit information on the network, stirred and network performance to reduce the loss of data. Therefore using this method of detection and removal of malicious attacks, is useful to increase network efficiency and ensure correct data in ad hoc networks is transmitting. In this paper we introduce the attack and investigate the last gray hole existing methods for detecting and removing it is addressed. The paper is concluded with discussion on the results.

Published in American Journal of Software Engineering and Applications (Volume 5, Issue 3-1)

This article belongs to the Special Issue Advances in Computer Science and Information Technology in Developing Countries

DOI 10.11648/j.ajsea.s.2016050301.14
Page(s) 15-19
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Mobile Adhoc Network (MANET), Gray Hole Attack, Dynamic Source Routing (DSR), Black Hole Attack

References
[1] Khattak. Hizbullah, Nizamuddin, “A Hybrid Approach for Preventing Black and Gray Hole Attacks in MANET,” 978-1-4799-0615-4/13/$31.00, IEEE, 2013
[2] Vishnu. K, and Amos. J. Paul, “ Detection & Removal of cooperative Black/Gray hole attack in Mobile ADHOC Networks”, International Journal of Computer Applications 2010, Volume 1-No.22, pp. 38-42.2010
[3] Hiremani. Vani A, Jadhao. Manisha Madhukar,“Eliminating Co-operative Blackhole and Grayhole Attacks Using Modified EDRI Table in MANET”, IEEE, 2013
[4] Gambhir. Sapna, Sharma. Saurabh, “PPN: Prime Product Number based Malicious Node Detection Scheme for MANETs”, IEEE, 2012
[5] Mohanapriya. M, Krishnamurthi. Ilango, “Modified DSR Protocol for detection and removal of selective black hole attack in MANET”, ComputElectrEng(2013), http://dx.doi.org/10.1016/j.compeleceng.2013.06.001, Elsevier, 2013
[6] D. B. Johnson and D. A. Maltz. “Dynamic Source Routing in Ad Hoc Wireless Networks,” Mobile Computing, edited by Tomasz Imielinski and Hank Korth, Kluwer Academic Publishers, chapter 5, pp. 153–181, 1996
[7] Mazidi. Arash, Rajabzade. Mostafa, “Analysis, assessment and implementation of routing algorithms in ad hoc networks”, the Eighth Symposium on Advances in science and technology, computer engineering and sustainable development with a focus on computer networks, modeling and security systems, higher education institution grave, Mashhad, December 2013. (in persian)
[8] M. Al-Shurman, S.-M. Yoo, and S. Park, “Black hole attack in mobile adhoc networks,” in Proceedings of the 42nd annual South east regional conference. New York, NY, USA: ACM Press, pp. 96-97, 2004
[9] Doori. Ali, Mohammad Karimizadeh Takabi. Tahereh, “Black hole attack analysis and network discovery in MANET ”, Regional Conference on Electrical and Computer Engineering methods of calculation software, Islamic Azad University Safashahr, February 2014.(in persian)
[10] Rezaei. Mehrdad, Jafari. Mahdi, and Amini Lari. Mansour, “Study of routing protocols attacks and security issues in ad hoc network ”, First National Conference on Electrical and Computer southern Iran, Islamic Azad University Khormoj, April 2013.(in persian)
[11] CAI. Jiwen, YI. Ping, and CHEN. Jialin, WANG. Zhiyang, and LIU. Ning, “ An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network”, 1550-445X/10 $26.00, DOI 10.1109/AINA.2010.143, IEEE, 2010
[12] Yang Su. Ming, “ Prevention of selective black hole attacks on mobile ad hoc networks throughintrusion detection systems”, Elsevier, 2011
[13] Sergio Marti et al, “Mitigating routing misbehavior in mobile ad-hoc networks,” Proceedings of the International Conference on Mobile Computing And Networking ACM (MobiCOM 2000), 2000
[14] Ms. Sonali P. Botkar, Mrs. Shubhangi R. Chaudhary, “ An Enhanced Intrusion detection System using Adaptive Acknowledgmentbased, Algorithm”, 978-1-4673-0126-8/11/$26.00c 2011 IEEE, IEEE, 2011
[15] Merkle, R. C. (1988). “A Digital Signature Based on a Conventional Encryption Function”.“Advances in Cryptology CRYPTO '87 ”. Lecture Notes in Computer Science 293. p. 369. doi: 10.1007/3-540-48184-2_32. ISBN 978-3-540-18796-7., 1988
Cite This Article
  • APA Style

    Mahdi Zolfaghari, Mohammad Sadeghzadeh, Reza Frouzande, Ahmad Emami. (2016). Methods for Detection and Removal of Grayhole Attack in Mobile Adhoc Network (MANET). American Journal of Software Engineering and Applications, 5(3-1), 15-19. https://doi.org/10.11648/j.ajsea.s.2016050301.14

    Copy | Download

    ACS Style

    Mahdi Zolfaghari; Mohammad Sadeghzadeh; Reza Frouzande; Ahmad Emami. Methods for Detection and Removal of Grayhole Attack in Mobile Adhoc Network (MANET). Am. J. Softw. Eng. Appl. 2016, 5(3-1), 15-19. doi: 10.11648/j.ajsea.s.2016050301.14

    Copy | Download

    AMA Style

    Mahdi Zolfaghari, Mohammad Sadeghzadeh, Reza Frouzande, Ahmad Emami. Methods for Detection and Removal of Grayhole Attack in Mobile Adhoc Network (MANET). Am J Softw Eng Appl. 2016;5(3-1):15-19. doi: 10.11648/j.ajsea.s.2016050301.14

    Copy | Download

  • @article{10.11648/j.ajsea.s.2016050301.14,
      author = {Mahdi Zolfaghari and Mohammad Sadeghzadeh and Reza Frouzande and Ahmad Emami},
      title = {Methods for Detection and Removal of Grayhole Attack in Mobile Adhoc Network (MANET)},
      journal = {American Journal of Software Engineering and Applications},
      volume = {5},
      number = {3-1},
      pages = {15-19},
      doi = {10.11648/j.ajsea.s.2016050301.14},
      url = {https://doi.org/10.11648/j.ajsea.s.2016050301.14},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajsea.s.2016050301.14},
      abstract = {Mobile Adhoc Networks, because collections of moving node and wireless is formed and also due to the dynamic changes in the communication topology, which is quite vulnerable target a wide range of attacks were shown; one of the attacks, Gray hole attack that is easy on reactive routing protocols such as Dynamic Source Routing protocol runs out. Gray hole attack, not the malware behavioral honest during the process of discovery route, but later, the malicious node is leveling; and can route discovery process to transmit information on the network, stirred and network performance to reduce the loss of data. Therefore using this method of detection and removal of malicious attacks, is useful to increase network efficiency and ensure correct data in ad hoc networks is transmitting. In this paper we introduce the attack and investigate the last gray hole existing methods for detecting and removing it is addressed. The paper is concluded with discussion on the results.},
     year = {2016}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Methods for Detection and Removal of Grayhole Attack in Mobile Adhoc Network (MANET)
    AU  - Mahdi Zolfaghari
    AU  - Mohammad Sadeghzadeh
    AU  - Reza Frouzande
    AU  - Ahmad Emami
    Y1  - 2016/06/24
    PY  - 2016
    N1  - https://doi.org/10.11648/j.ajsea.s.2016050301.14
    DO  - 10.11648/j.ajsea.s.2016050301.14
    T2  - American Journal of Software Engineering and Applications
    JF  - American Journal of Software Engineering and Applications
    JO  - American Journal of Software Engineering and Applications
    SP  - 15
    EP  - 19
    PB  - Science Publishing Group
    SN  - 2327-249X
    UR  - https://doi.org/10.11648/j.ajsea.s.2016050301.14
    AB  - Mobile Adhoc Networks, because collections of moving node and wireless is formed and also due to the dynamic changes in the communication topology, which is quite vulnerable target a wide range of attacks were shown; one of the attacks, Gray hole attack that is easy on reactive routing protocols such as Dynamic Source Routing protocol runs out. Gray hole attack, not the malware behavioral honest during the process of discovery route, but later, the malicious node is leveling; and can route discovery process to transmit information on the network, stirred and network performance to reduce the loss of data. Therefore using this method of detection and removal of malicious attacks, is useful to increase network efficiency and ensure correct data in ad hoc networks is transmitting. In this paper we introduce the attack and investigate the last gray hole existing methods for detecting and removing it is addressed. The paper is concluded with discussion on the results.
    VL  - 5
    IS  - 3-1
    ER  - 

    Copy | Download

Author Information
  • Department Computer, Science and Research Branch, Islamic Azad University, Tehran, Iran

  • Department of Computer, Mashhad Branch, Islamic Azad University, Mashhad, Iran

  • Department Computer, Science and Research Branch, Islamic Azad University, Tehran, Iran

  • Department Computer, Science and Research Branch, Islamic Azad University, Tehran, Iran

  • Sections