Averting Grey Hole Attacks Using Secure Data Protocol in Mobile Ad-Hoc Networks

Mohammed Abdul Bari, Shahanawaj Ahamad, Sanjay Kalkal

Abstract


MANETs (Mobile Ad-hoc networks) are a group of self-forming and self-healing mobile hosts communicating with each other, which do not require central authority or fixed infrastructure. MANETs are mobile and heterogeneous networks. Due to their mobility and heterogeneity, they are more vulnerable to attacks. Grey hole attack is an attack, in which all the packets in a network are forwarded to the attacker node by neighbour nodes and are intentionally dropped. In this work, we proposed a secure data protocol which intends to identify and avert the grey hole attacks by considering the causes of packet drop in promiscuous mode. We improved an existing AODV based routing protocol for detection and prevention of grey hole attacks. The results of this experiments show that MANETs are secure against grey hole attacks with our proposed algorithm with AODV based routing protocol.

Full Text:

PDF

References


Y. Hu, A. Perrig, and D. Johnson, “Ariadne: A secure on-demand routing protocol for ad-hoc networks,” In Proceedings of the 8th Annual International Conference on Mobile Computing and Networking (MobiCom 2002), pp. 12-23, ACM Atlanta, GA, September 2002.

P. Papadimitratos, and Z. Haas, “Secure routing for mobile ad hec networks,” In Proceedings of SCS Communications Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 2002.

K. Snazgiri, B. Dahill, B. Levine, C. Shields, and E.A. Belding-Royer, “Secure routing protocol for ad hoc networks,” In Proceedings of International Conference on Network Protocols (ICNP), Paris, France, November 2002.

L. Zhou, and Z. Haas, “Securing ad hoc network,” IEEE Network Magazine, Special issue on network security, Vol. 13, No. 6, November/December 1999, pp. 24-30.

L. Buttyan, and J. Hubaux, “Enforcing cooperation in self-organizing mobile as hoc networks,” In Proceedings of IEEE/ACM Workshop on Mobile Ads Hoc Networks, Technical report DSC/2001/046, EPFL-DIICA, August 2002.

S. Marti, T. Guili, K. Lai, and M. Baker, “Mitigating routing misbehaviour in mobile ad hoc networks,” In Proceedings of MOBICOM 2000, pp. 255-265, 2000.

M. Jackobsson, J. Hubaux, and L. Buttyan, “A micro-payment scheme encouraging collaboration in multi-hop cellular networks,” In Proceedings of Financial Crypto 2003.

H. Yang, J. Shu, X. Meng, and S. Lu, “SCAN: Self-organized network layer security in mobile ad hoc networks,” IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, February 2006.




DOI: https://doi.org/10.23956/ijarcsse/V7I6/01622

Refbacks

  • There are currently no refbacks.

Comments on this article

View all comments




© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.