Addressing Packet Forwarding Misbehavior with Two Phase Security Scheme for AODV-based MANETs

Full Text (PDF, 552KB), PP.55-62

Views: 0 Downloads: 0

Author(s)

Ankit D. Patel 1,* Rutvij H. Jhaveri 2

1. Dept. of Computer Engineering & Information Technology, SVM Institute of Technology, Bharuch-392001, India

2. Dept. of Computer Engineering, SVM Institute of Technology, Bharuch-392001, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2016.05.08

Received: 11 Aug. 2015 / Revised: 20 Nov. 2015 / Accepted: 15 Jan. 2016 / Published: 8 May 2016

Index Terms

MANET, AODV, dual security, Grayhole attack, promiscuous mode monitoring

Abstract

One of the important issues related to MANETs is the security. Grayhole attack is one of the most prominent attacks on the network layer of MANET which tends to degrade the network performance by performing selective packet dropping. In this paper, we propose a security mechanism that tends to mitigate the Grayhole attack during the route discovery time as well as during data transmission time. We modify AODV protocol such that it can avoid Grayhole attacker node from participating in the data transmission route, and if the attacker node somehow enters the route, it can be detected through the promiscuous mode monitoring.

Cite This Paper

Ankit D. Patel, Rutvij H. Jhaveri, "Addressing Packet Forwarding Misbehavior with Two Phase Security Scheme for AODV-based MANETs", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.5, pp.55-62, 2016. DOI:10.5815/ijcnis.2016.05.08

Reference

[1]Ankit D. Patel, Kartik Chawda, “Blackhole and Grayhole Attacks in MANET”, Interna-tional Conference on Information Communication & Embedded Systems (ICICES 2014), IEEE, 2014.
[2]Rutvij H. Jhaveri, Sankita J. Patel, Devesh C. Jinwala, “Improving Route Discovery for AODV to prevent Blackhole and Grayhole Attacks in MANETs.”, INFOCOMP, Version 11, No. 1, p. 01-02, March 2012.
[3]Rutvij H. Jhaveri, Sankita J. Patel, Devesh C. Jinwala, “A novel approach for Grayhole and Blackhole Attack in Mobile Adhoc Networks.”, Second International Conference on Advanced Computing & Communication Technologies, IEEE, 2012.
[4]Rutvij H. Jhaveri, Sankita J. Patel, Devesh C. Jinwala, “DoS attacks in Mobile Adhoc Networks: A Survey”, Second International Conference on Advanced Computing & communication Technologies, IEEE, 2012.
[5]Ankit D. Patel, “Denial of Service attacks in MANET”, National Conference on Emerging Vistas of Technology (NCEVT-13), PIET, May 2013.
[6]Preetam Suman, Dhananjay Bisen, Poonam Tomar, Vikas Sejwar, Rajesh Shukla, “Comparative study of Routing Protocols for Mobile Ad-Hoc Networks”, November 2009.
[7]Su Mon Bo, Hannan Xiao, Aderemi Adereti, James A. Malcolm and Bruce Christianson, “A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack”, Third International Symposium on Information Assurance and Security, IEEE 2007.
[8]Charles E. Perkins, Elizabeth M. Royer, “Ad-hoc On-Demand Distance Vector Routing”.
[9]Vahid Nazari Talooki, Koorush Ziarati, “Performance Comparison of Routing Protocols For Mobile Ad Hoc Networks”, IEEE, 2006.
[10]Thomas Clausen, “Comparative Study of Routing Protocols for Mobile Ad-hoc Networks”, Unité de recherche INRIA Rocquencourt Domaine de Voluceau, Rocquencourt, BP 105, 78153 Le ChesnayCedex (France).
[11]Nital Mistry, Devesh C. Jinwala and MukeshZaveri, “Improving AODV Protocol against Blackhole Attacks”, International Multiconference of Engineers and Computer Scientists 2010, vol. 2, March 2010.
[12]Meenakshi Patel, Sanjay Sharma, “Detection of Malicious Attack in MANET A Behavioral Approach”, 3rd IEEE International Advance Computing Conference (IACC), IEEE, 2013.
[13]Ankit D. Patel, Kartik Chawda, “Dual Security against Grayhole attack in MANET”, Advances in Intelligent Systems and Computing, Springer, 2014.
[14]Rutvij H. Jhaveri, “MR-AODV: A Solution to Mitigate Blackhole and Grayhole Attacks in AODV Based MANETs “, Third International Conference on Advanced Computing & Communication Technologies, IEEE, 2013.
[15]Gundeep Singh Bindra, Ashish Kapoor, Ashish Narang, Arjun Agarwal, “Detection and Removal of Co-operative Blackhole and Grayhole attacks in MANET’s “, International Conference on System Engineering and Technology, IEEE, 2012.
[16]Ankit D. Patel, Rutvij Jhaveri, Shaishav Shah, “I-EDRI scheme to mitigate Grayhole attack in MANET”, Advances in Intelligent Systems and Computing, Springer, 2014.
[17]Payal N. Raj and Prashant B. Swadas “DPRAODV: A Dynamic Learning System against Blackhole attack in AODV based MANET”, IJCSI International Journal of Computer Science Issues, Vol. 2, 2009.
[18]Chen Wei, Long Xiang, Bai Yubein, Gao Xiaopeng, “ A new solution for resisting Grayhole Attack in Mobile Adhoc Networks.”, IEEE, 2007.
[19]Sukla Banerjee, “Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks”, Proceedings of the World Congress on Engineering and Computer Science 2008, WCECS 2008, October 22 - 24, 2008, San Francisco, USA.
[20]Disha G. Kariya, Atul B. Kathole, Sapna R. Heda, “Detecting Black and Gray Hole Attacks in Mobile Ad-hoc Network Using an Adaptive Method,”, International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 1, January 2012.
[21]Jaydip Sen, M. Girish Chandra, Harihara S.G. , Harish Reddy, P. Balamuralidhar, “ A mechanism for Detection of Grayhole Attack in Mobile Adhoc Networks.”, IEEE, 2007.
[22]Rutvij H. Jhaveri, Narendra M. Patel, “Mobile Ad-hoc Networking with AODV: A Review”, International Journal of Next-Generation Computing, 6(3):165-191, November 2015.