Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Clustering and the Impact of Grayhole Attack in MANET

M. Ashwin and M. Azath
Department of Computer Science and Engineering, Karpagam University, Coimbatore, India
Research Journal of Applied Sciences, Engineering and Technology   2015  3:299-307
http://dx.doi.org/10.19026/rjaset.11.1720  |  © The Author(s) 2015
Received: January ‎28, ‎2015  |  Accepted: March ‎1, ‎2015  |  Published: September 25, 2015

Abstract

Mobile Adhoc Network (MANET) does not rely on fixed infrastructure as opposed to wireless networks with infrastructure where users communicate directly with an access point or base station. The network is an autonomous, transitory mobile nodes association communicating over wireless links. Nodes in each other’s range communicate directly and discover each other dynamically. To ensure intra node communication when not in other’s send range, intermediate nodes act as routers relaying packets to destinations. Due to a wireless medium, security in such networks is compromised through many techniques. Grayhole attack is a common attack in MANETs. A simple grayhole attack allows malicious nodes to stop packets in a network and refuse to forward or drop messages passing through. This study investigates the impact of grayhole attack on Quality of Service (QoS) of MANETs. A weighted clustering algorithm is proposed and the impact of maliciousness investigated.

Keywords:

Clustering, grayhole attack, Mobile Adhoc Network (MANET), packet forwarding misbehavior,


References

  1. Abolhasan, M., T. Wysocki and E. Dutkiewicz, 2004. A review of routing protocols for mobile ad hoc networks. Ad hoc Netw., 2(1): 1-22.
    CrossRef    
  2. Agarwal, R. and D. Motwani, 2009. Survey of clustering algorithms for MANET. arXiv preprint arXiv:0912.2303.
  3. Anupama, M. and B. Sathyanarayana, 2011. Survey of cluster based routing protocols in mobile ad hoc networks. Int. J. Comput. Theor. Eng., 3(6): 806-815.
    CrossRef    
  4. Arya, M. and Y.K. Jain, 2011. Grayhole attack and prevention in mobile adhoc network. Int. J. Comput. Appl., 27(10): 21-26.
    CrossRef    
  5. Banerjee, S., 2008. Detection/removal of cooperative black and gray hole attack in mobile ad-hoc networks. Proceeding of the World Congress on Engineering and Computer Science, pp: 22-24.
  6. Bollobás, B., 1998. Random Graphs. Springer, New York, pp: 215-252.
    CrossRef    
  7. Chatterjee, M., S.K. Das and D. Turgut, 2000. An on-demand Weighted Clustering Algorithm (WCA) for ad hoc networks. Proceeding of IEEE Global Tele communications Conference (GLOBECOM'00), 3: 1697-1701.
    CrossRef    
  8. Gavalas, D., G. Pantziou, C. Konstantopoulos and B. Mamalis, 2006. Clustering of mobile ad hoc networks: An adaptive broadcast period approach. Proceeding of the IEEE International Conference on Communications (ICC'06), 9: 4034-4039.
    CrossRef    
  9. Gupta, N., M. Shrivastava and A. Singh, 2012. Cluster based on demand routing protocol for mobile ad hoc network. Int. J. Eng. Res. Technol. (IJERT), 1(3): 1-4.
  10. Jain, S., M. Jain and H. Kandwal, 2010. Advanced algorithm for detection and prevention of cooperative black and gray hole attacks in mobile ad hoc networks. Int. J. Comput. Appl., 1(7): 172-175.
    CrossRef    
  11. Jhaveri, R.H., 2013. MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based MANETs. Proceeding of 3rd International Conference on Advanced Computing and Communication Technologies (ACCT, 2013), pp: 254-260.
    CrossRef    
  12. Jhaveri, R.H., S.J. Patel and D.C. Jinwala, 2012. A novel approach for grayhole and blackhole attacks in mobile ad hoc networks. Proceeding of 2nd International Conference on Advanced Computing and Communication Technologies (ACCT, 2012), pp: 556-560.
    CrossRef    
  13. Johnson, D.B. and D.A. Maltz, 1996. Dynamic Source Routing in Ad Hoc Wireless Networks. Mobile Computing, Springer US, pp: 153-181.
    CrossRef    
  14. Kariya, D.G., A.B. Kathole and S.R. Heda, 2012. Detecting black and gray hole attacks in mobile ad-hoc network using an adaptive method. Int. J. Emerg. Technol. Adv. Eng., 2(1): 37-41.
  15. Khattak, H., 2013. A hybrid approach for preventing black and gray hole attacks in MANET. Proceeding of 8th International Conference on Digital Information Management (ICDIM), pp: 55-57.
    CrossRef    
  16. Khattak, H., N. Nizamuddin and F. Khurshid, 2013. Preventing black and gray hole attacks in AODV using optimal path routing and hash. Proceeding of 10th IEEE International Conference on Networking, Sensing and Control (ICNSC, 2013), pp: 645-648.
    CrossRef    
  17. Kumar, A. and M. Chawla, 2012. Destination based group Gray hole attack detection in MANET through AODV. Int. J. Comput. Sci. Issues, 9(4), ISSN (Online): 1694-0814.
  18. Kumar, K.M. and Y.J. Singh, 2014. A survey on detection and prevention techniques for gray-hole attack in MANET. Int. J. Comput. Sci. Inform. Technol., 5(2).
  19. Manickam, P., T.G. Baskar, M. Girija and D.D. Manimegalai, 2011. Performance comparisons of routing protocols in mobile ad hoc networks. arXiv preprint arXiv:1103.0658.
  20. Murthy, C.S.R. and B.S. Manoj, 2004. Ad Hoc Wireless Networks: Architectures and Protocols. Pearson Education-Prentice Hall, Upper Saddle River, NJ.
  21. Peethambaran, P. and J.S. Jayasudha, 2014. Survey of manet misbehaviour detection approaches. Int. J. Network Secur. Appl. (IJNSA), 6(3).
  22. Sen, J., M.G. Chandra, S.G. Harihara, H. Reddy and P. Balamuralidhar, 2007. A mechanism for detection of gray hole attack in mobile Ad Hoc networks. Proceeding of 6th International Conference on Information, Communications and Signal Processing, pp: 1-5.
    CrossRef    
  23. Sharma, S. and T. Singh, 2013. An effective intrusion detection system for detection and correction of gray hole attack in MANETs. Int. J. Comput. Appl., 68(12).
    CrossRef    
  24. Venkanna, U. and R.L. Velusamy, 2011. Black hole attack and their counter measure based on trust management in manet: A survey. Proceeding of 3rd International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom, 2011), pp: 232-236.
    CrossRef    
  25. Wei, C., L. Xiang, B. Yuebin and G. Xiaopeng, 2007. A new solution for resisting gray hole attack in mobile ad-hoc networks. Proceeding of 2nd International Conference on Communications and Networking in China (CHINACOM'07), pp: 366-370.
    CrossRef    
  26. Wu, E.H., J. Tsai and M. Gerla, 1997. The effect of radio propagation on multimedia, mobile, multihop networks: Models and countermeasures. Proceeding of IEEE Singapore International Conference on Networks, pp: 411-425.
  27. Xiaopeng, G. and C. Wei, 2007. A novel gray hole attack detection scheme for mobile ad-hoc networks. Proceeding of IFIP International Conference on Network and Parallel Computing Workshops (NPC, 2007), pp: 209-214.
    CrossRef    
  28. Yang, B., R. Yamamoto and Y. Tanaka, 2014. Dempster-Shafer evidence theory based trust management strategy against cooperative black hole attacks and gray hole attacks in MANETs. Proceeding of 16th International Conference on Advanced Communication Technology (ICACT, 2014), pp: 223-232.
    CrossRef    
  29. Yi, Y., T.J. Kwon and M. Gerla, 2001. Passive Clustering (pc) in ad hoc networks. Internet Draft, draft-ietf-yi-manet-pac-00.txt, November.
  30. Yi, Y., M. Gerla and T. Kwon, 2003. Efficient flooding in ad hoc networks: A comparative performance study. Proceeding of IEEE International Conference on Communications (ICC'03), 2: 1059-1063.

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved