Skip to main content

Performance Analysis of MANET Under Grayhole Attack Using AODV Protocol

  • Chapter
  • First Online:
Architectural Wireless Networks Solutions and Security Issues

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 196))

  • 366 Accesses

Abstract

Mobile ad hoc network (MANET) has been a challenging field with its foremost criteria like heterogeneity of nodes, dynamic topology, energy constraint and security over the years. MANETs are globally popular for their cost-effectiveness ease of access and configuration. However, MANETs are vulnerable to many types of attacks like Blackhole, Wormhole, Grayhole, etc., which makes MANETs pretty much risky to rely upon when scaling up on a large scale. Under mobile ad hoc networks, all the transmission between the mobile nodes occurs wirelessly. Due to the infrastructure-less, self-organizing and dynamic nature of the nodes, it is an arduous task to enforce any security solutions against these kinds of vulnerabilities. Ad hoc on-demand vector (AODV), a supremely significant route-on-demand routing protocol for MANET, relies on the routing table at each intermediate node location. In this paper, we are mainly analyzing the performance of a MANET under Grayhole attack as per AODV routing protocol using NS-2 simulation environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aarti SST (2013) Study of MANET: characteristics, challenges, application and security attacks. Int J Adv Res Comput Sci Softw Eng 3(5)

    Google Scholar 

  2. Ali H, Shahzad W, Khan FA (2012) Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization. Appl Soft Comput 12(7):1913–1928

    Article  Google Scholar 

  3. Cho J-H, Chen R, Chan KS (2016) Trust threshold based public key management in mobile ad hoc networks. Ad Hoc Netw 44:58–75

    Article  Google Scholar 

  4. Das SK, Tripathi S (2018) Intelligent energy-aware efficient routing for MANET. Wirel Netw 24(4):1139–1159. https://doi.org/10.1007/s11276-016-1388-7

    Article  Google Scholar 

  5. Gupta S, Das B (2013) Load based reliable routing in multi-sink sensor networks. Res Inventy Int J Eng Sci 2(12):59–64

    Google Scholar 

  6. Jha HN, Gupta S, Maity D (2020) Effect of wormhole attacks on MANET. In: Design frameworks for wireless networks. Springer, Singapore. https://doi.org/10.1007/978-981-13-9574-1_8

  7. Sharma R (2016) Int J Comput Sci Inf Technol 7(3):1457–1460 (IJCSIT)

    Google Scholar 

  8. Dhaka A, Nandal A, Dhaka RS (2015) Gray and black hole attack identification using control packets in MANETs. Procedia Comput Sci 54:83–91. ISSN 1877–0509

    Google Scholar 

  9. Aarti PR (2015) Prevention and elimination of gray hole attack in mobile ad-hoc networks by enhanced multipath approach. Int J Eng Trends Technol (IJETT) 23(5):224–229. ISSN:2231–5381

    Google Scholar 

  10. Mittal V (2015) Prevention and elimination of gray hole attack in mobile ad-hoc networks by enhanced multipath approach. Int J Adv Res Comput Eng Technol (IJARCET) 4(5)

    Google Scholar 

  11. Yang H, Luo H, Ye F, Lu S, Zhang L (2004) Security in mobile ad hoc networks: challenges and solutions. UCLA Previously Published Works

    Google Scholar 

  12. Castellanos WE, Guerri JC, Arce P (2015) A QoS-aware routing protocol with adaptive feedback scheme for video streaming for mobile networks. Comput Commun 77:10–25

    Article  Google Scholar 

  13. Perkins CE, Royer EM (1999) Ad-hoc on-demand distance vector routing. In: Proceedings of the 2nd IEEE workshop on mobile computing systems and applications, pp 90–100

    Google Scholar 

  14. Sheikh R, Chande MS, Mishra DK (2010) Security issues in MANET: a review. IEEE

    Google Scholar 

  15. Goyal P, Parmar V, Rishi R (2011) MANET: vulnerabilities, challenges, attacks, application. IJCEM Int J Comput Eng Manage 11:32–37

    Google Scholar 

  16. Lupu TG, Rudas I, Demiralp M, Mastorakis N (2009) Main types of attacks in wireless sensor networks. In: WSEAS international conference. Proceedings. Recent advances in computer engineering

    Google Scholar 

  17. Maheshwari R, Gao J, Das SR (2007) Detecting wormhole attacks in wireless networks using connectivity information. In: IEEE INFOCOM 2007–26th IEEE international conference on computer communications, pp 107–115

    Google Scholar 

  18. John NP, Thomas A (2012) Prevention and detection of black hole attack in AODV based mobile ad-hoc networks—a review. Int J Sci Res Publ 2(9)

    Google Scholar 

  19. Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing, pp 46–57

    Google Scholar 

  20. Dai HN, Wang Q, Li D, Wong RC (2013) On Eavesdropping attacks in wireless networks with directional antennas. Int J Distrib Sens Netw 9(8):760834

    Article  Google Scholar 

  21. Jhaveri RH, Patel SJ, Jinwala DC (2012) DoS attacks in mobile ad hoc networks: a survey. In: 2nd international conference on advance computing and communication technologies, pp 535–541

    Google Scholar 

  22. Sen B, Sharma K, Ghose MK, Sharma A (2015) Gray hole attack in manets. Int J Adv Electron Comput Sci 2(10). ISSN: 2393–2835

    Google Scholar 

  23. Basarkod PI, Manvi SS (2015) Mobility and QoS aware routing in mobile ad hoc networks. Comput Electr Eng 48:86–99

    Google Scholar 

  24. Ning P, Sun K (2005) How to misuse AODV: a case study of Insider attacks against mobile ad-hoc routing protocols. Ad Hoc Netw 3(6):795–819

    Article  Google Scholar 

  25. Nguyen HL, Nguyen UT (2008) A study of different types of attacks on multicast in mobile ad hoc networks. J Ad Hoc Netw 6:32–46

    Article  Google Scholar 

  26. Deng H, Li W, Agrawal DP (2002) Routing security in wireless Ad Hoc networks. IEEE Commun Mag 40(10):70–75

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Samiran Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Gupta, S., Jha, H.N. (2021). Performance Analysis of MANET Under Grayhole Attack Using AODV Protocol. In: Das, S.K., Samanta, S., Dey, N., Patel, B.S., Hassanien, A.E. (eds) Architectural Wireless Networks Solutions and Security Issues. Lecture Notes in Networks and Systems, vol 196. Springer, Singapore. https://doi.org/10.1007/978-981-16-0386-0_15

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-0386-0_15

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-0385-3

  • Online ISBN: 978-981-16-0386-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics