Skip to main content

3L-AODV: Three Layer Security Protocol for Grayhole Attack Mitigation in MANET

  • Conference paper
  • First Online:
Proceedings of Eighth International Congress on Information and Communication Technology (ICICT 2023)

Abstract

As the mobile ad hoc networks infrastructure has no centralized points of connections, the traffic from a source to a destination passes through number of intermediate nodes. When more than one neighbor node is available, the traffic passes through one of them based on some criteria. If a node behaves maliciously in all of the connections and drops the traffic, it creates a security blackhole, while a malicious node that behaves normally is some of the connections creates a security grayhole. Since the malicious node behaves normally in some connections, mitigating this attack is challenging. In this paper, we proposed 3L-AODV, a security protocol that uses three layers of protection and detection to mitigate the grayhole attack. As it does not require any modification on the AODV protocol, it can be implemented on any network that its routing is based on AODV. The analysis of our results shows that 3L-AODV could mitigate the grayhole attack without affecting the performance of the network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahamed U, Fernando SD (2022) Lightweight security mechanism to mitigate active attacks in a mobile ad-hoc network. Int J Electron Telecommun 68(1):145–152

    Google Scholar 

  2. Alameri IA, Komarkova J (2020) A multi-parameter comparative study of manet routing protocols. In: 2020 15th Iberian conference on information systems and technologies (CISTI). IEEE, pp 1–6

    Google Scholar 

  3. Chawhan MD, Karmarkar K. Almelkar G, Borkar D, Kulat KD, Neole B (2022) Identification and prevention of gray hole attack using ids mechanism in manet. In: 2022 10th International conference on emerging trends in engineering and technology-signal and information processing (ICETET-SIP-22). IEEE, pp 1–6

    Google Scholar 

  4. Gurung S, Chauhan S (2018) A novel approach for mitigating gray hole attack in manet. Wirel Netw 24(2):565–579

    Article  Google Scholar 

  5. Kamel M, Ligeti P, Nagy A, Reich C (2022) Distributed address table (dat): a decentralized model for end-to-end communication in iot. Peer-to-Peer Netw Appl 15(1):178–193

    Article  Google Scholar 

  6. Kamel MBM, Yan Y, Ligeti P, Reich C (2022) Attribute verifier in internet of things. In: 2022 32nd International telecommunication networks and applications conference (ITNAC). IEEE, pp 1–3

    Google Scholar 

  7. Kamel MBM, Alameri I, Onaizah AN (2017) Staodv: a secure and trust based approach to mitigate blackhole attack on aodv based manet. In: 2017 IEEE 2nd advanced information technology, electronic and automation control conference (IAEAC). IEEE, pp 1278–1282

    Google Scholar 

  8. Kamel MB, Ligeti P, Reich C (2022) D3vn: decentralized abe-based distributed data validation network. In: Proceedings of seventh international congress on information and communication technology. Springer

    Google Scholar 

  9. Kamel MB, Ligeti P, Reich C (2022) Odabe: outsourced decentralized cp-abe in internet of things. In: Applied cryptography and network security workshops. Springer

    Google Scholar 

  10. Kamel MB, Ligeti P, Reich C (2022) Sdabe: efficient encryption in decentralized cp-abe using secret sharing. In: 2022 International conference on electrical, computer and energy technologies (ICECET). IEEE, pp 1–6

    Google Scholar 

  11. Kuo WK, Chu SH (2016) Energy efficiency optimization for mobile ad hoc networks. IEEE Access 4:928–940

    Article  Google Scholar 

  12. Ourouss K, Naja N, Jamali A (2021) Defending against smart grayhole attack within manets: a reputation-based ant colony optimization approach for secure route discovery in dsr protocol. Wirel Pers Commun 116

    Google Scholar 

  13. Ramaprasad H, Lingareddy S (2021) A novel integrated scheme for detection and mitigation of route diversion attack in manet. Int J Adv Comput Sci Appl 12(11)

    Google Scholar 

  14. Rani P, Kavita, Verma S, Nguyen GN (2020) Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network. IEEE Access 8:121755–121764

    Google Scholar 

  15. Saad HN, Kamel MBM (2017) Weight analysis for weighted cluster algorithms in mobile ad-hoc network. J Theoret Appl Inf Technol 95(15)

    Google Scholar 

  16. Schweitzer N, Stulman A, Margalit RD, Shabtai A (2016) Contradiction based gray-hole attack minimization for ad-hoc networks. IEEE Trans Mob Comput 16(8):2174–2183

    Article  Google Scholar 

  17. Shukla M, Joshi BK (2022) An effective scheme to mitigate blackhole attack in mobile ad hoc networks. In: Edge analytics. Springer, pp 149–164

    Google Scholar 

  18. Shukla M, Joshi BK, Singh U (2021) Mitigate wormhole attack and blackhole attack using elliptic curve cryptography in manet. Wirel Pers Commun 121(1):503–526

    Article  Google Scholar 

  19. Yan J, Zhou M, Ding Z (2016) Recent advances in energy-efficient routing protocols for wireless sensor networks: a review. IEEE Access 4:5673–5686

    Article  Google Scholar 

  20. Yan Y, Kamel MB, Ligeti P (2020) Attribute-based encryption in cloud computing environment. In: 2020 International conference on computing, electronics & communications engineering (iCCECE). IEEE, pp 63–68

    Google Scholar 

Download references

Acknowledgements

This research was partially supported by Project no. TKP2021-NVA-29 implemented with the support provided by the Ministry of Culture and Innovation of Hungary from the National Research, Development and Innovation Fund, financed under the TKP2021-NVA funding scheme and the project No. 2019-1.3.1-KK-2019-00011 financed by the National Research, Development and Innovation Fund of Hungary under the Establishment of Competence Centers, Development of Research Infrastructure Programme funding scheme.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammed B. M. Kamel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kamel, M.B.M., Abdullah, W.D., Hamoud, A.K., Valadares, D.C.G., Shareiyat, A., Ligeti, P. (2024). 3L-AODV: Three Layer Security Protocol for Grayhole Attack Mitigation in MANET. In: Yang, XS., Sherratt, R.S., Dey, N., Joshi, A. (eds) Proceedings of Eighth International Congress on Information and Communication Technology. ICICT 2023. Lecture Notes in Networks and Systems, vol 695. Springer, Singapore. https://doi.org/10.1007/978-981-99-3043-2_67

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-3043-2_67

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-3042-5

  • Online ISBN: 978-981-99-3043-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics