Skip to main content

Mitigation Techniques for Gray Hole and Black Hole Attacks in Wireless Mesh Network

  • Conference paper
  • First Online:
Proceedings of the International Congress on Information and Communication Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 439))

Abstract

Wireless mesh network (WMN) is considered as a key technology in today’s networking era. In this, security is determined as a vital constraint. Several approaches have been proposed to provide secure communication in WMN but communication security possibilities always exist and are very hard to maintain. Black hole and gray hole are the two major attacks at the network layer in WMN. RAODV, IDSAODV, and RIDAODV are some security approaches against these attacks. These approaches can immune the communication at a certain rate. We have proposed a cache-based secure AODV routing protocol, i.e., SDAODV in which instead of using the RREQ messages, security is provided by using the last sequence number of each packet. Using this approach, we have improved the network throughput at a certain rate. The performance of the proposed approach is evaluated by showing the throughput graph.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akyildiz, Ian F., and Xudong Wang: A survey on wireless mesh networks. In: Communications Magazine, IEEE 43(9) (2005).

    Google Scholar 

  2. Redwan, Hassen, and Ki-Hyung Kim: Survey of security requirements, attacks and network integration in wireless mesh networks. In: IEEE conference on New Technologies, Mobility and Security, NTMS (2008).

    Google Scholar 

  3. Zhang, Yanchao, and Yuguang Fang: ARSA: an attack-resilient security architecture for multihop wireless mesh networks. In: IEEE Journal on Selected Areas in Communications, 24(10) (2006).

    Google Scholar 

  4. Baradeli, Nagaraj B., and Mr SP Srikanth: Architecture to Achieving Security in WMN (2004).

    Google Scholar 

  5. Cai, Jiwen, et al.: An adaptive approach to detecting black and gray hole attacks in ad hoc network. In: 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), (2010).

    Google Scholar 

  6. C. Karlof, D. Wagner.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Elsevier’s Ad Hoc J., vol 2(3), pp. 293–315 Sept (2003).

    Google Scholar 

  7. B Xiao, B. Yu, and C. Gao.: Chemas: identifying suspect nodes in selective forwarding attacks. In: Journal of Parallel Distributed Comput. Vol 67 pp. 1218–1230.

    Google Scholar 

  8. S. Marti, T. J. Giuli, K. Lai and M. Baker.: Mitigating Routing behaviour in mobile ad-hoc networks. In: Proc. International conference on mobile computing and networking, Boston, MA (2009).

    Google Scholar 

  9. R. Curtmola and C. Nita-Rotaru.: BSMR: Byzantine-resilient secure multicast routing in multi-hop wireless networks. In: Proc. Sensor, Mesh and Ad Hoc Communications and Networks, June (2007).

    Google Scholar 

  10. JiItsn Cai, Ping Yi, Jialin Chen, Zhiyang Wang, Ning Liu.: An adaptive approach to detecting black and Gray hole attacks in Adhoc networks. In: 24th IEEE International Conference on Advanced Information networking and application, pp. 775–891 (2010).

    Google Scholar 

  11. A. Patcha, A. Mishra.: Collaborative Security architecture of black hole attack prevention in mobile ad hoc networks [C]. In: Radio and Wireless Conference, pp. 75–78 (2003).

    Google Scholar 

  12. Hongmei Deng, Itsi Li, and Dharma P. Agrawal.: Routing Security in Wireless Ad Hoc Network. In: IEEE Communications Magazine, 40(10), pp. 70–75 October (2002).

    Google Scholar 

  13. C. Kim, E. Talipov and B. Ahn.: A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks. In: Proceeding from EUC’06: The 2006 International Conference on Emerging Directions in Embedded and Ubiquitous Computing, Seoul, 1(4), pp. 522–531 August (2006).

    Google Scholar 

  14. S. Dokurer, Y. M. Erten and E. A. Can.: Performance Analysis of Ad-Hoc Networks under Black Hole Attacks. In: Proceeding from SECON’07: IEEE Southeast Conference, Richmond, pp. 22–25 March (2007).

    Google Scholar 

  15. Shree, Om, and Francis J. Ogwu.: A Proposal for Mitigating Multiple Black-Hole Attack in Wireless Mesh Networks.” (2013).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Geetanjali Rathee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Geetanjali Rathee, Hemraj Saini (2016). Mitigation Techniques for Gray Hole and Black Hole Attacks in Wireless Mesh Network. In: Satapathy, S., Bhatt, Y., Joshi, A., Mishra, D. (eds) Proceedings of the International Congress on Information and Communication Technology. Advances in Intelligent Systems and Computing, vol 439. Springer, Singapore. https://doi.org/10.1007/978-981-10-0755-2_41

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0755-2_41

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0754-5

  • Online ISBN: 978-981-10-0755-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics