Skip to main content
Log in

An Anti-Gray Hole Attack Scheme in Mobile Ad Hoc Network

  • Published:
International Journal of Wireless Information Networks Aims and scope Submit manuscript

Abstract

Dynamic variation of network topology in mobile ad hoc networks (MANET) forces network nodes to work together and rely on each other for routing. Considering the lack of a central control node, some nodes appear maliciously and selectively drop the data packets instead of transmitting to the next hop node, which is known as the gray hole attack. In order to prevent and identify the gray hole attack, an intrusion detection system (IDS) is proposed on nodes to maintain network efficiency. In addition to establishing security, the proposed anti gray hole attack mechanism extracts abnormal differences between routing packets in the route discovery phase of the ad hoc on-demand distance vector (AODV) routing protocol. It then assigns a suspicious value to each participating node and monitors the exchange of data packets between neighboring nodes in the data transfer phase using a data transmission information table. If the suspicious value reaches a predetermined threshold, IDS nodes send an alert message to other nodes about the identity of the malicious node, in order to prevent its activity on the network. Simulation results indicate that the performance of the proposed scheme in terms of packet delivery rate, packet loss rate, and routing overhead outperforms those in the literature.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. L. Han, Wireless Ad-hoc Networks, 2004

  2. P. Goyal, V. Parmar and R. Rishi, MANET: vulnerabilities, challenges, attacks, application, IJCEM International Journal of Computational Engineering & Management, Vol. 11, No. 2011, pp. 32–37, 2011.

    Google Scholar 

  3. J. Hoebeke, I. Moerman, B. Dhoedt and P. Demeester, An overview of mobile ad hoc networks: applications and challenges, Journal-Communications Network, Vol. 3, No. 3, pp. 60–66, 2004.

    Google Scholar 

  4. V. M. Agrawal and H. Chauhan, An Overview of security issues in Mobile Ad hoc Networks, International Journal of Computer Engineering and Sciences, Vol. 1, No. 1, pp. 9–17, 2015.

    Article  Google Scholar 

  5. R. H. Jhaveri, S. J. Patel, and D. C. Jinwala, DoS attacks in mobile ad hoc networks: a survey. In Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on, 2012 (pp. 535–541): IEEE.

  6. B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato and A. Jamalipour, A survey of routing attacks in mobile ad hoc networks, IEEE Wireless Communications, Vol. 14, No. 5, pp. 85–91, 2007.

    Article  Google Scholar 

  7. C. Perkins, E. Belding-Royer, and S. Das, Ad hoc on-demand distance vector (AODV) routing (No. RFC 3561), 2003.

  8. S. Gurung and S. Chauhan, A novel approach for mitigating gray hole attack in MANET, Wireless Networks, Vol. 24, No. 2, pp. 565–579, 2018.

    Article  Google Scholar 

  9. R. H. Jhaveri and N. M. Patel, A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks, Wireless Networks, Vol. 21, No. 8, pp. 2781–2798, 2015.

    Article  Google Scholar 

  10. L. Tamilselvan and V. Sankaranarayanan, Prevention of co-operative black hole attack in MANET, Journal of Networks, Vol. 3, No. 5, pp. 13–20, 2008.

    Article  Google Scholar 

  11. A. Saini, and H. Kumar, Comparison between various black hole detection techniques in MANET. In National Conference on Computational Instrumentation, Chandigarh, India, 2010 (pp. 19–20).

  12. H. Khattak, F. Khurshid, and N. ul Amin, Preventing black and gray hole attacks in AODV using optimal path routing and hash. In Networking, Sensing and Control (ICNSC), 2013 10th IEEE International Conference on, 2013 (pp. 645–648): IEEE.

  13. F. Shi, W. Liu, D. Jin and J. Song, A cluster-based countermeasure against blackhole attacks in MANETs, Telecommunication Systems, Vol. 57, No. 2, pp. 119–136, 2014.

    Article  Google Scholar 

  14. J.-M. Chang, P.-C. Tsou, I. Woungang, H.-C. Chao and C.-F. Lai, Defending against collaborative attacks by malicious nodes in MANETs: a cooperative bait detection approach, IEEE Systems Journal, Vol. 9, No. 1, pp. 65–75, 2015.

    Article  Google Scholar 

  15. S. Shahabi, M. Ghazvini and M. Bakhtiarian, A modified algorithm to improve security and performance of AODV protocol against black hole attack, Wireless Networks, Vol. 22, No. 5, pp. 1505–1511, 2016.

    Article  Google Scholar 

  16. S. Gurung and S. Chauhan, A dynamic threshold based approach for mitigating black-hole attack in MANET, Wireless Networks, Vol. 24, No. 8, pp. 2957–2971, 2018.

    Article  Google Scholar 

  17. M.-Y. Su, Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems, Computer Communications, Vol. 34, No. 1, pp. 107–117, 2011.

    Article  Google Scholar 

  18. Network Simulator-NS (ver. 2). http://nsnam.isi.edu/nsnam/.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Omid Moradipour.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals perorated by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Moradipour, O., Fathi, M. An Anti-Gray Hole Attack Scheme in Mobile Ad Hoc Network. Int J Wireless Inf Networks 27, 558–567 (2020). https://doi.org/10.1007/s10776-020-00492-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10776-020-00492-6

Keywords

Navigation