18 results on '"grayhole"'
Search Results
2. A MODIFIED AODV PROTOCOL TO MITIGATE COMBINED IMPACT OF MULTIPLE ATTACKS IN MANET
- Author
-
Monika Dangore and Hare Ram Sah
- Subjects
manet ,aodv protocol ,security threats ,grayhole ,wormhole ,Engineering (General). Civil engineering (General) ,TA1-2040 - Abstract
Since past two decades MANET researchers have focused on providing security solution to MANET to protect them from various network attacks. Most of the recent security approaches are restricted to address specific attacks only. This makes them obsolete when a different attack is introduced in the network. The objective of this research work is to offer a comprehensive solution to protect MANET from different security threats. We have proposed Multiple Attacks Protected Ad-hoc On-demand Distance Vector (MAP-AODV) Routing Protocol. It provides a consolidated approach to address different security threats in the network with the lowest computational overhead. The Node Behavior Score (NBS) module of the proposed protocol performs precise detection of the attack whereas Node Reliability Analysis (NRA) module achieves attack mitigation and reliable route formation. The efficiency of the proposed protocol is tested in the simultaneous presence of grayhole and wormhole nodes using NS2 simulation and compared against two existing protocols. The simulation results show better performance of the proposed protocol against different attack types.
- Published
- 2023
- Full Text
- View/download PDF
3. A MODIFIED AODV PROTOCOL TO MITIGATE COMBINED IMPACT OF MULTIPLE ATTACKS IN MANET.
- Author
-
Dangore, Monika and Sah, Hare Ram
- Subjects
AD hoc computer networks ,COMPUTER security ,ROUTING (Computer network management) ,COMPUTER networks ,WIRELESS communications - Abstract
Since past two decades MANET researchers have focused on providing security solution to MANET to protect them from various network attacks. Most of the recent security approaches are restricted to address specific attacks only. This makes them obsolete when a different attack is introduced in the network. The objective of this research work is to offer a comprehensive solution to protect MANET from different security threats. We have proposed Multiple Attacks Protected Ad-hoc On-demand Distance Vector (MAPAODV) Routing Protocol. It provides a consolidated approach to address different security threats in the network with the lowest computational overhead. The Node Behavior Score (NBS) module of the proposed protocol performs precise detection of the attack whereas Node Reliability Analysis (NRA) module achieves attack mitigation and reliable route formation. The efficiency of the proposed protocol is tested in the simultaneous presence of grayhole and wormhole nodes using NS2 simulation and compared against two existing protocols. The simulation results show better performance of the proposed protocol against different attack types. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
4. A Digital-Twin-Based Detection and Protection Framework for SDC-Induced Sinkhole and Grayhole Nodes in Satellite Networks.
- Author
-
Qiao, Gongzhe, Zhuang, Yi, Ye, Tong, and Qiao, Yuan
- Subjects
SINKHOLES ,DIGITAL twins ,SPACE environment ,DATA corruption ,PROBLEM solving ,DATA structures ,COSMIC rays - Abstract
In the space environment, cosmic rays and high-energy particles may cause a single-event upset (SEU) during program execution, and further cause silent data corruption (SDC) errors in program outputs. After extensive research on SEU and SDC errors, it has been found that SDC errors in the routing program in satellite networks may lead to the emergence of Sinkhole (SH) and Grayhole (GH) nodes in the network, which may cause damage to satellite networks. To find and solve the problems in time, a digital-twin-based detection and protection framework for SDC-induced SH and GH nodes in satellite networks is proposed. First, the satellite network fault model under SEU and the generation mechanism of SH and GH nodes induced by SDC errors are described. Then, the data structure based on digital twins required by the proposed detection and protection framework is designed, and the detection methods of SH and GH nodes induced by SDC errors are proposed. SKT and LLFI simulation tools are used to build a simulated Iridium satellite network and carry out fault injection experiments. Experiment results show that the accuracy of the proposed detection method is 98–100%, and the additional time cost of routing convergence caused by the proposed framework is 3.1–28.2%. Compared with existing SH and GH detection methods, the proposed methods can timely and accurately detect faults during the routing update stage. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
5. A Digital-Twin-Based Detection and Protection Framework for SDC-Induced Sinkhole and Grayhole Nodes in Satellite Networks
- Author
-
Gongzhe Qiao, Yi Zhuang, Tong Ye, and Yuan Qiao
- Subjects
satellite network ,routing mechanism ,SDC error ,digital twin ,sinkhole ,grayhole ,Motor vehicles. Aeronautics. Astronautics ,TL1-4050 - Abstract
In the space environment, cosmic rays and high-energy particles may cause a single-event upset (SEU) during program execution, and further cause silent data corruption (SDC) errors in program outputs. After extensive research on SEU and SDC errors, it has been found that SDC errors in the routing program in satellite networks may lead to the emergence of Sinkhole (SH) and Grayhole (GH) nodes in the network, which may cause damage to satellite networks. To find and solve the problems in time, a digital-twin-based detection and protection framework for SDC-induced SH and GH nodes in satellite networks is proposed. First, the satellite network fault model under SEU and the generation mechanism of SH and GH nodes induced by SDC errors are described. Then, the data structure based on digital twins required by the proposed detection and protection framework is designed, and the detection methods of SH and GH nodes induced by SDC errors are proposed. SKT and LLFI simulation tools are used to build a simulated Iridium satellite network and carry out fault injection experiments. Experiment results show that the accuracy of the proposed detection method is 98–100%, and the additional time cost of routing convergence caused by the proposed framework is 3.1–28.2%. Compared with existing SH and GH detection methods, the proposed methods can timely and accurately detect faults during the routing update stage.
- Published
- 2023
- Full Text
- View/download PDF
6. Impact Analysis of Blackhole, Flooding, and Grayhole Attacks and Security Enhancements in Mobile Ad Hoc Networks Using SHA3 Algorithm
- Author
-
Ramya, P., SairamVamsi, T., Angrisani, Leopoldo, Series editor, Arteaga, Marco, Series editor, Chakraborty, Samarjit, Series editor, Chen, Jiming, Series editor, Chen, Tan Kay, Series editor, Dillmann, Ruediger, Series editor, Duan, Haibin, Series editor, Ferrari, Gianluigi, Series editor, Ferre, Manuel, Series editor, Hirche, Sandra, Series editor, Jabbari, Faryar, Series editor, Kacprzyk, Janusz, Series editor, Khamis, Alaa, Series editor, Kroeger, Torsten, Series editor, Ming, Tan Cher, Series editor, Minker, Wolfgang, Series editor, Misra, Pradeep, Series editor, Möller, Sebastian, Series editor, Mukhopadhyay, Subhas Chandra, Series editor, Ning, Cun-Zheng, Series editor, Nishida, Toyoaki, Series editor, Panigrahi, Bijaya Ketan, Series editor, Pascucci, Federica, Series editor, Samad, Tariq, Series editor, Seng, Gan Woon, Series editor, Veiga, Germano, Series editor, Wu, Haitao, Series editor, Zhang, Junjie James, Series editor, Anguera, Jaume, editor, Satapathy, Suresh Chandra, editor, Bhateja, Vikrant, editor, and Sunitha, K.V.N., editor
- Published
- 2018
- Full Text
- View/download PDF
7. Trust-Based Routing for Mitigating Grayhole Attack in MANET
- Author
-
Ullah, Kefayat, Das, Prodipto, Kacprzyk, Janusz, Series Editor, Mandal, J. K., editor, Saha, Goutam, editor, Kandar, Debdatta, editor, and Maji, Arnab Kumar, editor
- Published
- 2018
- Full Text
- View/download PDF
8. Detection of Misbehaviors Nodes in Wireless Network with Help of Pool Manager
- Author
-
Chaudhary, Asha, More, Pournima, Kacprzyk, Janusz, Series editor, Pal, Nikhil R., Advisory editor, Bello Perez, Rafael, Advisory editor, Corchado, Emilio S., Advisory editor, Hagras, Hani, Advisory editor, Kóczy, László T., Advisory editor, Kreinovich, Vladik, Advisory editor, Lin, Chin-Teng, Advisory editor, Lu, Jie, Advisory editor, Melin, Patricia, Advisory editor, Nedjah, Nadia, Advisory editor, Nguyen, Ngoc Thanh, Advisory editor, Wang, Jun, Advisory editor, Bhalla, Subhash, editor, Bhateja, Vikrant, editor, Chandavale, Anjali A., editor, Hiwale, Anil S., editor, and Satapathy, Suresh Chandra, editor
- Published
- 2018
- Full Text
- View/download PDF
9. Capitulation of mitigation techniques of packet drop attacks in MANET to foreground nuances and ascertain trends.
- Author
-
Singh, Sandeep, Bhasin, Anshu, and Kalia, Anshul
- Subjects
- *
SYNCOPE , *NETWORK performance , *AD hoc computer networks - Abstract
Summary: MANET is a kind of wireless ad hoc networks, in which mobile nodes operate in dynamic, distributed, and cooperative environment. Open nature of MANET makes it vulnerable to various kinds of attacks. Of these, the most severe are the packet drop attacks such as Blackhole attack, Cooperative Blackhole, and Grayhole attacks. The malicious nodes drop the packets as these packets are routed through them in accordance with the malefic strategy of the particular packet drop attack, which adversely affects the network performance. A substantial amount of research papers focus on dealing with packet drop attacks in the last few years, but security is still an impending issue. In this paper, we have presented the systematic review of the literature of last 6 years on all variants of packet drop attacks. We have classified these techniques into four categories, namely, mathematical based, monitoring based, network dependent, and amalgamation based which are further sub divided into 12 categories. These papers are categorized in a well‐defined structure to bring out their contribution, to underline the left‐out things, and to foreground the emerging issues for future research. Detailed observations are recorded following a panoptic study in order to identify and divulge more eligible and effective mitigation techniques in a particular environment. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
10. BEST: Battery, Efficiency and Stability Based Trust Mechanism Using Enhanced AODV for Mitigation of Blackhole Attack and Its Variants in MANETs.
- Author
-
KHANNA, NITIN and SACHDEVA, MONIKA
- Subjects
SYNCOPE ,TRUST ,INFORMATION dissemination ,ELECTRIC batteries ,CELL separation - Abstract
This paper attempts to resolve the issue of mitigation of blackhole attack and its variants by presenting a battery, efficiency and stability based trust mechanism that performs both prevention and detection of packet drop attacks followed by isolation using the process of dissemination of information validated by the fair nodes. The proposed work operates in two modes to combat both single as well as co-operative form of attack. In standard mode, the promiscuous facility and trust update lead to detection of attack while in advance mode a set of trusted trace packets and procedures detect co-operative attacking nodes thus break the co-operation among malicious nodes. After detection of malicious nodes, dissemination process leads to isolation of the attacking node and validation is performed to avoid bad mouthing attack. The work is compared with several published mechanisms against parameters like PDR, normalized control load, accuracy in detection and residual energy. [ABSTRACT FROM AUTHOR]
- Published
- 2020
11. I-EDRI Scheme to Mitigate Grayhole Attack in MANETs
- Author
-
Patel, Ankit D., Jhaveri, Rutvij H., Shah, Shaishav N., Kacprzyk, Janusz, Series editor, Jain, Lakhmi C., editor, Patnaik, Srikanta, editor, and Ichalkaranje, Nikhil, editor
- Published
- 2015
- Full Text
- View/download PDF
12. Dual Security Against Grayhole Attack in MANETs
- Author
-
Patel, Ankit D., Chawda, Kartik, Kacprzyk, Janusz, Series editor, Jain, Lakhmi C., editor, Patnaik, Srikanta, editor, and Ichalkaranje, Nikhil, editor
- Published
- 2015
- Full Text
- View/download PDF
13. Secure Group based Routing and Flawless Trust Formulation in MANET using Unsupervised Machine Learning Approach for IoT Applications
- Author
-
Maitreyi Ponguwala and DR.Sreenivasa Rao
- Subjects
MANET ,Recommendation Filtering ,Blackhole ,Grayhole ,IoT applications ,Science ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
INTRODUCTION: Mobile Adhoc Network (MANET) is integrated with Internet of Things (IoT) in many application cases due to its flexibility and scalability. The dynamic nature of MANET introduces some security threats in IoT environment. In those threats, Blackhole attack and Grayhole attack are severe routing attacks that disrupts routing algorithm to crack transmission in the entire network.OBJECTIVES: Many security mechanisms are introduced in MANET based on trust computation schemes. However, computation of inaccurate trust value degrades the performance of mitigation schemes. Thus the major objective of this work is to design a novel security mechanism to protect the MANET-IoT from different adversaries.METHODS: in this paper we propose a novel group based routing algorithm with recommendation filtering supported by security monitors (SMs). Unsupervised machine learning algorithm is adapted for the purpose of recommendation filtering in the network. Initially the entire network is grouped by Secure Certificate based Group Formation (SCGF) algorithm. In each group, Recommendation Filtering by K-means algorithm (RF-K means) algorithm is employed to perform trustcomputation. For secure and optimal route selection, hybrid optimization algorithm that combines Genetic Algorithm and Fire Fly Algorithm (GA-FFA) is proposed. Data transmission is protected by novel Hash Message Authentication Code with Advanced Encryption Standard (HMAC-AES) algorithm in which hash function is integrated with cryptography function.RESULTS: The proposed work is validated in network simulator-3 environment and the obtained results show better performance in terms of packet delivery ratio (96.3%), throughput (135kbps), delay (3.26ms), detection rate (99%), and energy consumption (8.5%).CONCLUSION: The MANET-IoT network is secured by group formation and trust filtering approaches. Further,involvement of cryptography function ensures data security whereas hash function ensures data integrity.
- Published
- 2019
- Full Text
- View/download PDF
14. AODV and SAODV under Attack: Performance Comparison
- Author
-
Abdelshafy, Mohamed A., King, Peter J. B., Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Kobsa, Alfred, editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Weikum, Gerhard, editor, Guo, Song, editor, Lloret, Jaime, editor, Manzoni, Pietro, editor, and Ruehrup, Stefan, editor
- Published
- 2014
- Full Text
- View/download PDF
15. Secure Group based Routing and Flawless Trust Formulation in MANET using Unsupervised Machine Learning Approach for IoT Applications.
- Author
-
Ponguwala, Maitreyi and Rao, D. R. Sreenivasa
- Subjects
ROUTING (Computer network management) ,MACHINE learning ,INTERNET of things ,AD hoc computer networks ,DATA transmission systems - Abstract
INTRODUCTION: Mobile Adhoc Network (MANET) is integrated with Internet of Things (IoT) in many application cases due to its flexibility and scalability. The dynamic nature of MANET introduces some security threats in IoT environment. In those threats, Blackhole attack and Grayhole attack are severe routing attacks that disrupts routing algorithm to crack transmission in the entire network. OBJECTIVES: Many security mechanisms are introduced in MANET based on trust computation schemes. However, computation of inaccurate trust value degrades the performance of mitigation schemes. Thus the major objective of this work is to design a novel security mechanism to protect the MANET-IoT from different adversaries. METHODS: in this paper we propose a novel group based routing algorithm with recommendation filtering supported by security monitors (SMs). Unsupervised machine learning algorithm is adapted for the purpose of recommendation filtering in the network. Initially the entire network is grouped by Secure Certificate based Group Formation (SCGF) algorithm. In each group, Recommendation Filtering by K-means algorithm (RF-K means) algorithm is employed to perform trust computation. For secure and optimal route selection, hybrid optimization algorithm that combines Genetic Algorithm and Fire Fly Algorithm (GA-FFA) is proposed. Data transmission is protected by novel Hash Message Authentication Code with Advanced Encryption Standard (HMAC-AES) algorithm in which hash function is integrated with cryptography function. RESULTS: The proposed work is validated in network simulator-3 environment and the obtained results show better performance in terms of packet delivery ratio (96.3%), throughput (135kbps), delay (3.26ms), detection rate (99%), and energy consumption (8.5%). CONCLUSION: The MANET-IoT network is secured by group formation and trust filtering approaches. Further, involvement of cryptography function ensures data security whereas hash function ensures data integrity. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
16. Detection and removal of co-operative blackhole and grayhole attacks in MANETs.
- Author
-
Singh Bindra, Gundeep, Kapoor, Ashish, Narang, Ashish, and Agrawal, Arjun
- Abstract
A MANET, by definition, comprises of nodes which are mobile. It has a dynamic topology and lacks a central controlling entity. These features along with undefined and unsecure boundaries make its security a very challenging issue. Blackhole and grayhole attacks can in fact seriously compromise the performance of a critical infrastructure like a MANET. In this paper we propose a mechanism to detect and remove the blackhole and grayhole attacks. The solution we are proposing tackles these attacks by maintaining an Extended Data Routing Information (EDRI) Table at each node in addition to the Routing Table of the AODV protocol. The mechanism is capable of detecting a malicious node. It also maintains a history of the node's previous malicious instances to account for the gray behaviour. Refresh packet, Renew Packet, BHID Packet, Further request and Further reply packets are also used in addition to the existing packets (RREQ and RREP). Our technique is capable of finding chain of cooperating malicious nodes which drop a significant fraction of packets. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
17. Two-Level Secure Re-routing (TSR) in Mobile Ad Hoc Networks.
- Author
-
Saha, Himadri Nath, Bhattacharyya, Debika, Bandhyopadhyay, A.K., and Banerjee, P.K.
- Abstract
The lack of static infrastructure, open nature and node mobility causes several issues in Mobile Ad Hoc Network (MANET), such as energy utilization, node authentication and secure routing. In this paper we propose a new scheme, Two-level Secure Re-routing (TSR), an attack resilient architecture for Mobile Ad hoc networks. It is significantly different from existing solutions, as it does not focus on any specific attack, but instead, taking a general approach it achieves resilience against a wide range of routing disruption DoS attacks. TSR is a double-layer scheme that detects attacks at the transport layer but responds to them at the network layer. The concept of local supervision using watch-nodes has been incorporated to make it a secure architecture. Also, because routing disruption attacks have a pronounced effect on the size of the TCP congestion window, monitoring the window size is effective in detecting such events. Using both these methods, TSR is able to detect attacks. Once an attack is detected by the local supervision, it is verified by congestion window abnormalities and only then TSR initiates a re-routing process to find a new route. Our simulation results will show how attacks can be detected and data packets are re-routed after attacks have been detected. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
18. Secure Group based Routing and Flawless Trust Formulation in MANET using Unsupervised Machine Learning Approach for IoT Applications
- Author
-
DR.Sreenivasa Rao and Maitreyi Ponguwala
- Subjects
Wireless ad hoc network ,Computer science ,Hash function ,Grayhole ,Energy Engineering and Power Technology ,Data security ,Cryptography ,MANET ,lcsh:QA75.5-76.95 ,Recommendation Filtering ,Data integrity ,Message authentication code ,lcsh:Science ,Marketing ,Renewable Energy, Sustainability and the Environment ,business.industry ,Network packet ,lcsh:Mathematics ,IoT applications ,lcsh:QA1-939 ,Blackhole ,Packet drop attack ,lcsh:Q ,lcsh:Electronic computers. Computer science ,business ,Computer network - Abstract
INTRODUCTION: Mobile Adhoc Network (MANET) is integrated with Internet of Things (IoT) in many application cases due to its flexibility and scalability. The dynamic nature of MANET introduces some security threats in IoT environment. In those threats, Blackhole attack and Grayhole attack are severe routing attacks that disrupts routing algorithm to crack transmission in the entire network. OBJECTIVES: Many security mechanisms are introduced in MANET based on trust computation schemes. However, computation of inaccurate trust value degrades the performance of mitigation schemes. Thus the major objective of this work is to design a novel security mechanism to protect the MANET-IoT from different adversaries. METHODS: in this paper we propose a novel group based routing algorithm with recommendation filtering supported by security monitors (SMs). Unsupervised machine learning algorithm is adapted for the purpose of recommendation filtering in the network. Initially the entire network is grouped by Secure Certificate based Group Formation (SCGF) algorithm. In each group, Recommendation Filtering by K-means algorithm (RF-K means) algorithm is employed to perform trust computation. For secure and optimal route selection, hybrid optimization algorithm that combines Genetic Algorithm and Fire Fly Algorithm (GA-FFA) is proposed. Data transmission is protected by novel Hash Message Authentication Code with Advanced Encryption Standard (HMAC-AES) algorithm in which hash function is integrated with cryptography function. RESULTS: The proposed work is validated in network simulator-3 environment and the obtained results show better performance in terms of packet delivery ratio (96.3%), throughput (135kbps), delay (3.26ms), detection rate (99%), and energy consumption (8.5%). CONCLUSION: The MANET-IoT network is secured by group formation and trust filtering approaches. Further, involvement of cryptography function ensures data security whereas hash function ensures data integrity.
- Published
- 2019
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.