As MANET is a infrastructure less network where various wireless nodes without any central controller sends and receives
the data. As it is infrastructure less network. Is highly vulnerable to various kinds of attacks. For making network to be safer for
communication there requires various levels of protocols level protective measures. So that the performance of the network can be
safeguarded.
Published In:IJCSN Journal Volume 6, Issue 3
Date of Publication : June 2017
Pages : 421-424
Figures :--
Tables : --
Munish Wadhwa : Department of Computer Engineering
Guru Kashi University
Talwandi Sabo Bathinda,Punjab(151001) India.
Ashwani Sethi : Department of Computer Engineering
Guru Kashi University
Talwandi Sabo Bathinda,Punjab(151001) India.
MANET,Attacks,Sybil,Black hole,Gray Hole
It is clear that the network of MANET nature can have
performance deterioration if certain node behaves in
malicious way. As there is no central controller in the
network , which can control the access of the malicious
node. Without increasing the hardware cost protocol level
improvement is required so that network performance can
be enhanced.
[1] N.Venkatadri, Reham Abdellatif Abouuhogail and Ahmed
Yahya, “Secure TORA: Removal of Black Hole Attack
using Twofish Algorithm”, International Journal of
Software Engineering and its Applications, 2016.
[2] Pham Thi Ngoc Diep, Monika Sachdeva, “Detecting
Colluding Blackhole and Greyhole ttack
in Delay Tolerant Networks”, ICRTEDC-2015, Vol. 1,
Special Issue. 2.
[3] Jaydip Sen ,” Detection of Cooperative Black Hole Attack
in Wireless Ad Hoc Networks” , Bengal Intelligent Park,
Salt Lake Electronic Complex, Kolkata, INDIA,2014
[4] Bansi S. Kantariya1, Dr. Narendra M. Shekokar2,”
Detection and Mitigation of Greyhole Attack in Wireless
Sensors Network Using Trust Mechanism”, (2013)
[5] Pham Thi Ngoc Diep,” Detecting Colluding Blackhole
and Greyhole Attack in Delay Tolerant Networks”,2015.
[6] Yanzhi Ren,” Detecting Wormhole Attacks in Delay
Tolerant Networks”,2015 [7] Harsh Pratap Singh,” Cooperative Blackhole/ Grayhole
Attack Detection and Prevention in Mobile Ad hoc
Network: A Review”, Volume 64– No.3, February 2013
[8] Kanu Geete,” A Survey on Grey Hole Attack in
Wireless mesh Networks”, Volume 95– No.23, June
2014
[9] Akinlemi Olushola O, K. Suresh Babu, “An
Acknowledgement based approach for the detection of
routing misbehavior in MANETs,” IEEE Trans. Mobile
Comput., vol. 6, no. 5, pp. 536–550, May 2007.
[10] Madjid Merabti, David Llewellyn-Joes, and Kashif
Kifayat, “Routing security in wireless ad hoc network,”
IEEE Commun. Mag., vol. 40, no. 10, Oct. 2002.
[11] Ashima Singla and Ratika Sachdeva, “Prevention of
cooperative blackhole attacks in wireless ad hoc
networks,” in Proc. Int. Conf. Wireless Netw., Jun. 2003,
pp. 570–575.
[12] R. Kanni Selvam , Mr.C.Karthikeyan, “Preventing
cooperative blackhole attacks in mobile ad hoc
networks: Simulation implementation and evaluation,”
in Proc. IEEE ICC, 2007, pp. 362–367.
[13] Mohamed Salah Bouassida, Gilles Guette, Mohamed
Shawky, and Bertrand Ducourthial, “Providing faulttolerant
ad hoc routing service in adversarial
environments,” Wireless Pers.Commun., vol. 29, pp.
367– 388, 2004.
[14] Hegde.S, Uvaraj Arutkumaran.S, “An efficientMeshbased
core multicast routing protocol on MANETs,” J.
Internet Technol., vol. 8, no. 2, pp. 229– 239, Apr. 2007.
[15] D. Johnson and D. Maltz, “Dynamic source routing in
ad hoc wireless networks,” Mobile Comput., pp. 153–
181, 1996.