Abstract
Wireless mesh network (WMN) is considered as a key technology in today’s networking era. In this, security is determined as a vital constraint. Several approaches have been proposed to provide secure communication in WMN but communication security possibilities always exist and are very hard to maintain. Black hole and gray hole are the two major attacks at the network layer in WMN. RAODV, IDSAODV, and RIDAODV are some security approaches against these attacks. These approaches can immune the communication at a certain rate. We have proposed a cache-based secure AODV routing protocol, i.e., SDAODV in which instead of using the RREQ messages, security is provided by using the last sequence number of each packet. Using this approach, we have improved the network throughput at a certain rate. The performance of the proposed approach is evaluated by showing the throughput graph.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Akyildiz, Ian F., and Xudong Wang: A survey on wireless mesh networks. In: Communications Magazine, IEEE 43(9) (2005).
Redwan, Hassen, and Ki-Hyung Kim: Survey of security requirements, attacks and network integration in wireless mesh networks. In: IEEE conference on New Technologies, Mobility and Security, NTMS (2008).
Zhang, Yanchao, and Yuguang Fang: ARSA: an attack-resilient security architecture for multihop wireless mesh networks. In: IEEE Journal on Selected Areas in Communications, 24(10) (2006).
Baradeli, Nagaraj B., and Mr SP Srikanth: Architecture to Achieving Security in WMN (2004).
Cai, Jiwen, et al.: An adaptive approach to detecting black and gray hole attacks in ad hoc network. In: 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), (2010).
C. Karlof, D. Wagner.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Elsevier’s Ad Hoc J., vol 2(3), pp. 293–315 Sept (2003).
B Xiao, B. Yu, and C. Gao.: Chemas: identifying suspect nodes in selective forwarding attacks. In: Journal of Parallel Distributed Comput. Vol 67 pp. 1218–1230.
S. Marti, T. J. Giuli, K. Lai and M. Baker.: Mitigating Routing behaviour in mobile ad-hoc networks. In: Proc. International conference on mobile computing and networking, Boston, MA (2009).
R. Curtmola and C. Nita-Rotaru.: BSMR: Byzantine-resilient secure multicast routing in multi-hop wireless networks. In: Proc. Sensor, Mesh and Ad Hoc Communications and Networks, June (2007).
JiItsn Cai, Ping Yi, Jialin Chen, Zhiyang Wang, Ning Liu.: An adaptive approach to detecting black and Gray hole attacks in Adhoc networks. In: 24th IEEE International Conference on Advanced Information networking and application, pp. 775–891 (2010).
A. Patcha, A. Mishra.: Collaborative Security architecture of black hole attack prevention in mobile ad hoc networks [C]. In: Radio and Wireless Conference, pp. 75–78 (2003).
Hongmei Deng, Itsi Li, and Dharma P. Agrawal.: Routing Security in Wireless Ad Hoc Network. In: IEEE Communications Magazine, 40(10), pp. 70–75 October (2002).
C. Kim, E. Talipov and B. Ahn.: A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks. In: Proceeding from EUC’06: The 2006 International Conference on Emerging Directions in Embedded and Ubiquitous Computing, Seoul, 1(4), pp. 522–531 August (2006).
S. Dokurer, Y. M. Erten and E. A. Can.: Performance Analysis of Ad-Hoc Networks under Black Hole Attacks. In: Proceeding from SECON’07: IEEE Southeast Conference, Richmond, pp. 22–25 March (2007).
Shree, Om, and Francis J. Ogwu.: A Proposal for Mitigating Multiple Black-Hole Attack in Wireless Mesh Networks.” (2013).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Geetanjali Rathee, Hemraj Saini (2016). Mitigation Techniques for Gray Hole and Black Hole Attacks in Wireless Mesh Network. In: Satapathy, S., Bhatt, Y., Joshi, A., Mishra, D. (eds) Proceedings of the International Congress on Information and Communication Technology. Advances in Intelligent Systems and Computing, vol 439. Springer, Singapore. https://doi.org/10.1007/978-981-10-0755-2_41
Download citation
DOI: https://doi.org/10.1007/978-981-10-0755-2_41
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0754-5
Online ISBN: 978-981-10-0755-2
eBook Packages: EngineeringEngineering (R0)