Detection of Black Hole & Gray Hole in MANET

A Mobile Ad hoc system (MANET) includes a group of communicating cellular mobile nodes or equipment which do not contain any form of fixed system or centralized authority. The protection in MANET has become a considerable as well as involved issue inside the research community. This is because of higher desire in spreading online streaming videos as well as audio tracks in a variety of software, a single MANET may be installed rapidly in order to improve communications in an aggressive environment such as battleground or perhaps disaster situation likes problems in recovery procedure. Despite the countless attacks targeted at specified nodes in MANET that have recently been revealed, many attacks regarding numerous nodes even get small focus. A good reason regarding it is because individuals make usage of protection systems appropriate to wired networks in MANET and ignore the security steps which apply at MANET. Moreover, it might also need to do with the fact that no survey or taxonomy has been completed in order to make clear the qualities of several multiple node attacks. This paper covers the above mentioned gap by giving an appropriate meaning as well as categorization of collective attacks towards MANET through the variety of multiple node attacks found.

[1]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[2]  Sajal K. Das,et al.  Cooperative black and gray hole attacks in mobile ad hoc networks , 2008, ICUIMC '08.

[3]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[4]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[5]  Rubem Pereira,et al.  Conflict Free Address Allocation Mechanism for Mobile Ad Hoc Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[6]  Ravi Prakash,et al.  IP address assignment in a mobile ad hoc network , 2002, MILCOM 2002. Proceedings.

[7]  Ning Liu,et al.  An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[8]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[9]  W. Campbell,et al.  THE UNIVERSITY OF TEXAS AT DALLAS , 2004 .

[10]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[11]  Sukla Banerjee Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks , 2008 .

[12]  Huirong Fu,et al.  Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.