Abstract
As the mobile ad hoc networks infrastructure has no centralized points of connections, the traffic from a source to a destination passes through number of intermediate nodes. When more than one neighbor node is available, the traffic passes through one of them based on some criteria. If a node behaves maliciously in all of the connections and drops the traffic, it creates a security blackhole, while a malicious node that behaves normally is some of the connections creates a security grayhole. Since the malicious node behaves normally in some connections, mitigating this attack is challenging. In this paper, we proposed 3L-AODV, a security protocol that uses three layers of protection and detection to mitigate the grayhole attack. As it does not require any modification on the AODV protocol, it can be implemented on any network that its routing is based on AODV. The analysis of our results shows that 3L-AODV could mitigate the grayhole attack without affecting the performance of the network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ahamed U, Fernando SD (2022) Lightweight security mechanism to mitigate active attacks in a mobile ad-hoc network. Int J Electron Telecommun 68(1):145–152
Alameri IA, Komarkova J (2020) A multi-parameter comparative study of manet routing protocols. In: 2020 15th Iberian conference on information systems and technologies (CISTI). IEEE, pp 1–6
Chawhan MD, Karmarkar K. Almelkar G, Borkar D, Kulat KD, Neole B (2022) Identification and prevention of gray hole attack using ids mechanism in manet. In: 2022 10th International conference on emerging trends in engineering and technology-signal and information processing (ICETET-SIP-22). IEEE, pp 1–6
Gurung S, Chauhan S (2018) A novel approach for mitigating gray hole attack in manet. Wirel Netw 24(2):565–579
Kamel M, Ligeti P, Nagy A, Reich C (2022) Distributed address table (dat): a decentralized model for end-to-end communication in iot. Peer-to-Peer Netw Appl 15(1):178–193
Kamel MBM, Yan Y, Ligeti P, Reich C (2022) Attribute verifier in internet of things. In: 2022 32nd International telecommunication networks and applications conference (ITNAC). IEEE, pp 1–3
Kamel MBM, Alameri I, Onaizah AN (2017) Staodv: a secure and trust based approach to mitigate blackhole attack on aodv based manet. In: 2017 IEEE 2nd advanced information technology, electronic and automation control conference (IAEAC). IEEE, pp 1278–1282
Kamel MB, Ligeti P, Reich C (2022) D3vn: decentralized abe-based distributed data validation network. In: Proceedings of seventh international congress on information and communication technology. Springer
Kamel MB, Ligeti P, Reich C (2022) Odabe: outsourced decentralized cp-abe in internet of things. In: Applied cryptography and network security workshops. Springer
Kamel MB, Ligeti P, Reich C (2022) Sdabe: efficient encryption in decentralized cp-abe using secret sharing. In: 2022 International conference on electrical, computer and energy technologies (ICECET). IEEE, pp 1–6
Kuo WK, Chu SH (2016) Energy efficiency optimization for mobile ad hoc networks. IEEE Access 4:928–940
Ourouss K, Naja N, Jamali A (2021) Defending against smart grayhole attack within manets: a reputation-based ant colony optimization approach for secure route discovery in dsr protocol. Wirel Pers Commun 116
Ramaprasad H, Lingareddy S (2021) A novel integrated scheme for detection and mitigation of route diversion attack in manet. Int J Adv Comput Sci Appl 12(11)
Rani P, Kavita, Verma S, Nguyen GN (2020) Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network. IEEE Access 8:121755–121764
Saad HN, Kamel MBM (2017) Weight analysis for weighted cluster algorithms in mobile ad-hoc network. J Theoret Appl Inf Technol 95(15)
Schweitzer N, Stulman A, Margalit RD, Shabtai A (2016) Contradiction based gray-hole attack minimization for ad-hoc networks. IEEE Trans Mob Comput 16(8):2174–2183
Shukla M, Joshi BK (2022) An effective scheme to mitigate blackhole attack in mobile ad hoc networks. In: Edge analytics. Springer, pp 149–164
Shukla M, Joshi BK, Singh U (2021) Mitigate wormhole attack and blackhole attack using elliptic curve cryptography in manet. Wirel Pers Commun 121(1):503–526
Yan J, Zhou M, Ding Z (2016) Recent advances in energy-efficient routing protocols for wireless sensor networks: a review. IEEE Access 4:5673–5686
Yan Y, Kamel MB, Ligeti P (2020) Attribute-based encryption in cloud computing environment. In: 2020 International conference on computing, electronics & communications engineering (iCCECE). IEEE, pp 63–68
Acknowledgements
This research was partially supported by Project no. TKP2021-NVA-29 implemented with the support provided by the Ministry of Culture and Innovation of Hungary from the National Research, Development and Innovation Fund, financed under the TKP2021-NVA funding scheme and the project No. 2019-1.3.1-KK-2019-00011 financed by the National Research, Development and Innovation Fund of Hungary under the Establishment of Competence Centers, Development of Research Infrastructure Programme funding scheme.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kamel, M.B.M., Abdullah, W.D., Hamoud, A.K., Valadares, D.C.G., Shareiyat, A., Ligeti, P. (2024). 3L-AODV: Three Layer Security Protocol for Grayhole Attack Mitigation in MANET. In: Yang, XS., Sherratt, R.S., Dey, N., Joshi, A. (eds) Proceedings of Eighth International Congress on Information and Communication Technology. ICICT 2023. Lecture Notes in Networks and Systems, vol 695. Springer, Singapore. https://doi.org/10.1007/978-981-99-3043-2_67
Download citation
DOI: https://doi.org/10.1007/978-981-99-3043-2_67
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-3042-5
Online ISBN: 978-981-99-3043-2
eBook Packages: EngineeringEngineering (R0)