Third International conference on advances in communication, network and computing

Research Article

A Novel Solution for Grayhole Attack in AODV Based MANETs

Download
322 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-35615-5_9,
        author={Rutvij Jhaveri and Sankita Patel and Devesh Jinwala},
        title={A Novel Solution for Grayhole Attack in AODV Based MANETs},
        proceedings={Third International conference on advances in communication, network and computing},
        proceedings_a={CNC},
        year={2012},
        month={12},
        keywords={MANETs Security Grayhole Attack AODV R-AODV},
        doi={10.1007/978-3-642-35615-5_9}
    }
    
  • Rutvij Jhaveri
    Sankita Patel
    Devesh Jinwala
    Year: 2012
    A Novel Solution for Grayhole Attack in AODV Based MANETs
    CNC
    Springer
    DOI: 10.1007/978-3-642-35615-5_9
Rutvij Jhaveri1,*, Sankita Patel2,*, Devesh Jinwala2,*
  • 1: Shri S’ad Vidya Mandal Institute of Technology
  • 2: Sardar Vallabhbhai National Institute of Technology
*Contact email: rutusoft@yahoo.com, sjp@coed.svnit.ac.in, dcj@coed.svnit.ac.in

Abstract

Security plays a vital role to provide protected data transmission in Mobile Ad-hoc Networks (MANETs). Mobile nodes communicate in multi-hop way via routing protocols that work in physically insecure environment. MANETs are susceptible to various Denial-of-Service (DoS) attacks on network layer due to their unique characteristics such as unclear line of defense, limited communication resources, lack of centralized monitoring, wireless radio communication and varying topology. Grayhole attack is a major DoS attack that disrupts data transmission in the network by sending false routing information. To keep the communication route free from such attacks, it is imperative to design a secure and efficient protocol. In this paper, we provide a modification of Ad-hoc On-demand Distance Vector (AODV) protocol to prevent Grayhole attack in which a node sending bogus routing information is detected and recorded by the node receiving it. To avoid the use of extra control packets, default routing packets are given additional responsibility to pass information about malicious nodes. The simulation results in ns-2 show that the solution is reliable against multiple attackers and gives significant improvement in packet delivery ratio with negligible difference in end-to-end delay and routing overhead.