Mitigation of Black Hole and Grey Hole Attack In Mobile Ad hoc Networks

Wireless networks are gaining popularity to its peak today. Mobile Ad hoc Networks called MANETs are self-configuring wireless networks and it is without any centralized control made by mobile nodes. Nodes can act as both routers and hosts. The dynamic topology of MANETs allows nodes to join and leave the network at any point of time. So, it is vulnerable to various kinds of attacks like Active attack, Passive attack, Internal attack, External attack, Black hole and grey hole attack. Previouswork is done on security issues in MANET were based on reactive routing protocol example: Ad-Hoc On Demand Distance Vector (AODV). Various kinds of attacks were studied earlier, and their effects were elaborated by stating how these attacks disrupt the performance of MANET. In this paper, we present a review on number of techniques that helps to mitigate black hole and grey hole attack that effect the performance of MANET.

[1]  Huirong Fu,et al.  Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.

[2]  Öznur Özkasap,et al.  Ad-Hoc Networks , 2008, Encyclopedia of Algorithms.

[3]  Ning Liu,et al.  An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[4]  Junhai Luo,et al.  Black hole attack prevention based on authentication mechanism , 2008, 2008 11th IEEE Singapore International Conference on Communication Systems.

[5]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[6]  Li-Der Chou,et al.  A survey of black hole attacks in wireless mobile ad hoc networks , 2011, Human-centric Computing and Information Sciences.

[7]  Kundan Munjal Multiple Black Hole Node Attack Detection Scheme in MANET by Modifying AODV Protocol , 2013 .

[8]  Jaydip Sen,et al.  A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks , 2011, 2011 Second International Conference on Intelligent Systems, Modelling and Simulation.

[9]  H VineethaS.,et al.  Performance Analysis of Cluster Based Secure Multicast Key Management in MANET , 2013 .

[10]  K. Srivastava Secure Data Transmission in MANET Routing Protocol , 2012 .