Abstract
Mobile ad hoc network (MANET) has been a challenging field with its foremost criteria like heterogeneity of nodes, dynamic topology, energy constraint and security over the years. MANETs are globally popular for their cost-effectiveness ease of access and configuration. However, MANETs are vulnerable to many types of attacks like Blackhole, Wormhole, Grayhole, etc., which makes MANETs pretty much risky to rely upon when scaling up on a large scale. Under mobile ad hoc networks, all the transmission between the mobile nodes occurs wirelessly. Due to the infrastructure-less, self-organizing and dynamic nature of the nodes, it is an arduous task to enforce any security solutions against these kinds of vulnerabilities. Ad hoc on-demand vector (AODV), a supremely significant route-on-demand routing protocol for MANET, relies on the routing table at each intermediate node location. In this paper, we are mainly analyzing the performance of a MANET under Grayhole attack as per AODV routing protocol using NS-2 simulation environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aarti SST (2013) Study of MANET: characteristics, challenges, application and security attacks. Int J Adv Res Comput Sci Softw Eng 3(5)
Ali H, Shahzad W, Khan FA (2012) Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization. Appl Soft Comput 12(7):1913–1928
Cho J-H, Chen R, Chan KS (2016) Trust threshold based public key management in mobile ad hoc networks. Ad Hoc Netw 44:58–75
Das SK, Tripathi S (2018) Intelligent energy-aware efficient routing for MANET. Wirel Netw 24(4):1139–1159. https://doi.org/10.1007/s11276-016-1388-7
Gupta S, Das B (2013) Load based reliable routing in multi-sink sensor networks. Res Inventy Int J Eng Sci 2(12):59–64
Jha HN, Gupta S, Maity D (2020) Effect of wormhole attacks on MANET. In: Design frameworks for wireless networks. Springer, Singapore. https://doi.org/10.1007/978-981-13-9574-1_8
Sharma R (2016) Int J Comput Sci Inf Technol 7(3):1457–1460 (IJCSIT)
Dhaka A, Nandal A, Dhaka RS (2015) Gray and black hole attack identification using control packets in MANETs. Procedia Comput Sci 54:83–91. ISSN 1877–0509
Aarti PR (2015) Prevention and elimination of gray hole attack in mobile ad-hoc networks by enhanced multipath approach. Int J Eng Trends Technol (IJETT) 23(5):224–229. ISSN:2231–5381
Mittal V (2015) Prevention and elimination of gray hole attack in mobile ad-hoc networks by enhanced multipath approach. Int J Adv Res Comput Eng Technol (IJARCET) 4(5)
Yang H, Luo H, Ye F, Lu S, Zhang L (2004) Security in mobile ad hoc networks: challenges and solutions. UCLA Previously Published Works
Castellanos WE, Guerri JC, Arce P (2015) A QoS-aware routing protocol with adaptive feedback scheme for video streaming for mobile networks. Comput Commun 77:10–25
Perkins CE, Royer EM (1999) Ad-hoc on-demand distance vector routing. In: Proceedings of the 2nd IEEE workshop on mobile computing systems and applications, pp 90–100
Sheikh R, Chande MS, Mishra DK (2010) Security issues in MANET: a review. IEEE
Goyal P, Parmar V, Rishi R (2011) MANET: vulnerabilities, challenges, attacks, application. IJCEM Int J Comput Eng Manage 11:32–37
Lupu TG, Rudas I, Demiralp M, Mastorakis N (2009) Main types of attacks in wireless sensor networks. In: WSEAS international conference. Proceedings. Recent advances in computer engineering
Maheshwari R, Gao J, Das SR (2007) Detecting wormhole attacks in wireless networks using connectivity information. In: IEEE INFOCOM 2007–26th IEEE international conference on computer communications, pp 107–115
John NP, Thomas A (2012) Prevention and detection of black hole attack in AODV based mobile ad-hoc networks—a review. Int J Sci Res Publ 2(9)
Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing, pp 46–57
Dai HN, Wang Q, Li D, Wong RC (2013) On Eavesdropping attacks in wireless networks with directional antennas. Int J Distrib Sens Netw 9(8):760834
Jhaveri RH, Patel SJ, Jinwala DC (2012) DoS attacks in mobile ad hoc networks: a survey. In: 2nd international conference on advance computing and communication technologies, pp 535–541
Sen B, Sharma K, Ghose MK, Sharma A (2015) Gray hole attack in manets. Int J Adv Electron Comput Sci 2(10). ISSN: 2393–2835
Basarkod PI, Manvi SS (2015) Mobility and QoS aware routing in mobile ad hoc networks. Comput Electr Eng 48:86–99
Ning P, Sun K (2005) How to misuse AODV: a case study of Insider attacks against mobile ad-hoc routing protocols. Ad Hoc Netw 3(6):795–819
Nguyen HL, Nguyen UT (2008) A study of different types of attacks on multicast in mobile ad hoc networks. J Ad Hoc Netw 6:32–46
Deng H, Li W, Agrawal DP (2002) Routing security in wireless Ad Hoc networks. IEEE Commun Mag 40(10):70–75
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Gupta, S., Jha, H.N. (2021). Performance Analysis of MANET Under Grayhole Attack Using AODV Protocol. In: Das, S.K., Samanta, S., Dey, N., Patel, B.S., Hassanien, A.E. (eds) Architectural Wireless Networks Solutions and Security Issues. Lecture Notes in Networks and Systems, vol 196. Springer, Singapore. https://doi.org/10.1007/978-981-16-0386-0_15
Download citation
DOI: https://doi.org/10.1007/978-981-16-0386-0_15
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-0385-3
Online ISBN: 978-981-16-0386-0
eBook Packages: EngineeringEngineering (R0)