SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 781
Gray-Hole Attack Minimization based on contradiction for ad-hoc
networks
Suha Farheen taj H N1, Chinnaswamy C N2, Sunil Kumar B V3, Varshika S4, & Supriya S5
1,3,4,5 B.E Dept of ISE, NIE, Mysuru, Karnataka, India
2Assocaiate Professor Dept of ISE, NIE, Mysuru, Karnataka, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The development for other rising advance
technology for example, IoT and portable information
correspondence frameworks are sought after for security
purposes. A strategy for limiting the Gray-Hole attack in an
AD-HOC arrange is necessary for better informationrecovery.
This attack don't work after the attack has initiated, it
utilizes the interior learning of the AODV protocol and OLSR
protocol to avoid the Gray-Hole attack. Mobile ad-hoc
network (MANET) is a remote arrange that can exchange the
data from source to goal remotely, Because of the open open
communication media the portable specially appointed
organize has some security limitations there are the
possibility of information leakage in the network Gray-hole
attack, black-hole attack, wormhole attack are the major
threats in the mobile ad-hoc network. In Gray-hole attack
specific dropping of the bundles happens, and the data can't
be additionally transmitted .this paper examine the proper
arrangements and built up the reasonable arrangement to
keep the system from the Gray- hole attack.
Key Words: MANET, Gray-hole attack, DCFM, OLSR,AODV.
1. INTRODUCTION
A mobile ad hoc network (MANET) is generally defined as a
network that has many free or autonomous nodes, often
composed of mobile devices or other mobile pieces, thatcan
arrange themselves in various ways and operate without
strict top-down network administration.[4] Therearemany
different types of setups that could be called MANETs Some
use 4G networks and other systems as examples of a
potential topology for a MANET, while others refer to a
vehicular ad-hoc network, where the free network nodes
are installed in cars and other vehicles.
The security threats have been extensively discussed and
investigated in the wired and wireless networks, the
correspondingly perplexing situation has also happened in
MANET due to the inherent design defects. There are many
security issues which have been studied in recent years. For
instance, snooping attacks, wormhole attacks, black hole
attacks, routing table overflowandpoisoningattacks,packet
replication, denial of service (DoS) attacks, distributed DoS
(DDoS) attacks, et cetera Especially, themisbehaviorrouting
problem is one of the popularized security threats such as
black hole attacks. Some researchers propose their secure
routing idea to solve this issue, but the security problem is
still unable to prevent completely.
blackhole attack is a type of denial-of-serviceattack inwhich
a router that is supposed to relay packets instead discards
them. This usually occurs from a router becoming
compromised from a number of different causes. One cause
mentioned in research is through a denial-of-service attack
on the router using a known DDoS tool. Because packets are
routinely dropped from a lossy network, the packet drop
attack is very hard to detect and prevent.
The malicious router can also accomplish this attack
selectively, e.g. by dropping packets for a particularnetwork
destination, at a certain time of the day, a packet every n
packets or every second, or a randomly selected portion of
the packets.
This is rather called a grey hole attack. rendering anti-
blackhole algorithms is useless . Thus, mitigation of the
gray-hole attack will also solve the more famous black-hole
attack as well.
Optimized Link State Routing (OLSR) protocol is a MANET
routing protocol and is evaluated mainly for two things.
Primarily OLSR is less secure like AODV and others. The
reason for it being less secure is that it is a table-driven in
nature and uses a methodology called selective flooding
technique, where redundancy is reduced and thus the
security possibilities of the protocol is reduced. Another
reason for selecting OLSR is that is an highly effective
routing protocol for MANET. A brief information about
formal routing is provided by the proposed methodology
termed Denial Contradictions with Fictitious Node
Mechanism (DCFM) which provides brief informationabout
formal routing. Here, fictitious node acts as a virtual node
and large networks are managed from attacks
2.Related work
1.In recent papers, [1] Nadav Schweitzer, Ariel Stulman,
Member, IEEE, Asaf Shabtai and Roy David Marg alit
proposed a method for Gary- Hole attack detection. In any
case, it doesn't fulfil every one of the information that must
be sent. It has the burdens, for example, doesn’t illuminate
the source about the information failure. It can't recognize
the redress goal hub, Time utilization is high, Packet's
proficiency is low.
2.Sukla Banerjee proposed a mechanism for
detection/removal of cooperativeblack andGrayHoleattack
in mobile ad-hoc networks. In this instead of sending the
total data traffic at a tie it divides the total traffic into some
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 782
small sized blocks. So that malicious nodes can be detected
and removed in between the transmission of two such
blocks by ensuring an end-to-end checking. Source node
sends a prelude message to thedestinationnodebeforestart
of the sending any block to alert it about the incoming data
block. It is time consuming algorithm it takes time in
converting of total traffic into small sized blocks
3. Toutouh [1] Recent advances in wireless technologies
have given rise to the emergence of vehicular ad hoc
networks (VANETs). In such networks, the limited coverage
of WiFi and the high mobility of the nodes generate frequent
topology changes and network fragmentations. For these
reasons, and taking into account that there is no central
manager entity, routing packets through the network is a
challenging task. Therefore, offering an efficient routing
strategy is crucial to the deployment of VANETs. This paper
deals with the optimal parameter setting of the optimized
link state routing (OLSR), which is a well-known mobile ad
hoc network routing protocol, by defining an optimization
problem. This way, a series of representative metaheuristic
algorithms (particle swarm optimization, differential
evolution, genetic algorithm, and simulated annealing) are
studied in this paper to find automatically optimal
configurations of this routing protocol. In addition, a set of
realistic VANET scenarios (based in the city of Malaga) have
been defined to accurately evaluate the performance of the
network under our automatic OLSR. In the experiments,our
tuned OLSR configurations result in better quality of service
(QoS) than the standard requestforcomments(RFC),aswell
as several human experts, making it amenable forutilization
in VANET configurations.
4. Y.-C. Hu, [3] As mobile ad hoc network applications are
deployed, security emerges as a central requirement. In this
paper, we introduce the wormhole attack, a severe attack in
ad hoc networks that is particularly challenging to defend
against. The wormhole attack is possible even if the attacker
has not compromised any hosts, and even if all
communication provides authenticity and confidentiality.
In the wormhole attack, an attacker records packets (or
bits) at one location in the network, tunnels them (possibly
selectively) to another location, and retransmits them there
into the network. The wormhole attack can form a serious
threat in wireless networks, especially against many ad hoc
network routing protocols and location-based wireless
security systems. For example, most existingadhoc network
routing protocols, without some mechanism to defend
against the wormhole attack, would be unable to find routes
longer than one or two hops, severely disrupting
communication. We present a general mechanism, called
packet leashes, for detecting and, thus defending against
wormhole attacks, and we present a specific protocol, called
TIK, that implements leashes. We also discuss topology-
based wormhole detection, and showthatitisimpossible for
these approaches to detect some wormhole topologies.
3.Existing System
Mobile ad-hoc network (MANET) is decentralizedsystem,in
this system hubs can move progressively. OSINetwork layer
faces a few attack. Gray hole attack chip away at most
notable succession number amid Replay message, a
gathering of gray hole hubs effectively utilized against
steering in MANET called community gray hole attack
4.Proposed system
An OLSR based system is helpless against gray hole attack.
The aggressor may send, for example, a sham HELLO
messages to its one-jump neighbors,assertingtoknowmore
one-bounce neighbors than it really does. This will
misguidedly build its likelihood of being picked as a sole
MPR by its neighbors. The more neighbors an aggressor
cases to have, the bigger the potential effect of the attack.
Denial Contradictions with Fictitious Mechanism Node
Component DCFM was proposed by so as to address the
problem of hub privacy in OLSR basedsystems.It recognizes
potential malicious hubs attempting to adulterate HELLO
messages utilizing just interior data inside the casualty,
without depending on any brought together or outer
confided in party. Such early discovery keeps a conceivable
attack before it can manifest. DCFM confirms the legitimacy
of a HELLO message by searching for logical inconsistencies
between what the message claims also, its pre-gained
topological information. As indicated by ,DCFM, sole MPRs
assignments are permitted just when no logical
inconsistencies are found. With the nearness of
contradictions, a MPR can be assigned for every one of the
two-bounce neighbors for which the presumed hub is the
main access point. It cannot, be that as it may, be assigned as
sole MPR for two jump neighbors that can be come to
through different ways. Following , and as defended in , in
this work we accept that TC messages can't be restock.
5. System Architecture
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 783
In the above diagram, number of nodes and communication
range has been initialized and configured into network
simulator, and then select the routingpathinthenetwork.In
the selected path send the data from source node to
destination node through the neighbour node using nearest
next hop approach. If any DOS attack detected in the path,
find the attacked neighbour nodes and mark it as attacker
node. Finally data should send from source node to
destination node through non attacker neighbour nodes by
applying OLSR Routing approach.
6.Performance Analysis
6.1 Simulation
Simulation is the imitation of the operation of a real-world
process or system.[1] The act of simulating something first
requires that a model be developed; this model represents
the key characteristics, behaviours and functions of the
selected physical or abstract system or process. The model
represents the system itself, whereas the simulation
represents the operation of the system over time.. Using
mathematical formulas, or actually capturing and playing
back observations from a production network. The
behaviour of the network and the various applications and
services it supports can then be observed in a test lab;
various attributes of the environment can also be modified
in a controlled manner to assess how the network would
behave under different conditions.
6.2Experimental result
7.Conclusion
This paper introduces a change calculation for OLSR based
systems for moderating Gray-hole attack . Utilizing
exclusively inward learning picked up by taking an interest
hubs, we can decline caught parcels by a two fold digit
factor; well past what DCFM alone can achieve under
comparable conditions. Single supposition is a dynamic
attacker attempt to malicious impact arrange topology to
build the attack surface. dormant attackers who can at
present go undetected can likewise drop bundles, they can't
ensure that courses will go through them fundamentally
supporting the likelihood of attack achievement.
8. REFERENCES
[1] J. Toutouh, J. Garcia-Nieto, and E. Alba, “Intelligent
OLSR routing protocol optimization for VANETs,” IEEE
Trans. Veh. Technol., vol. 61, no. 4, pp. 1884– 1894, May
2012.
[2]. "Contradiction Based Gray-Hole Attack in Ad-Hoc
Networks" Nadav Schweitzer, Ariel Stulman, Member,
Asaf Shabtai and Roy David Margalit IEEE Transactions
on Vehicular Technology, vol. 61, no. 4, pp. 1884–1894,
May 2012
[3]. Y.-C. Hu, A. Perrig, and D. B. Johnson, “Wormhole
attacks in wireless networks,” IEEE Journal on Selected
Areas in Communications, vol. 24,no. 2, pp. 370–380,
Feb 2006
[4]https://www.techopedia.com/definition/5532/mobi
le-adhoc-network-manet
[5]https://en.wikipedia.org/wiki/Packet_drop_attack
[6]. H. Deng, H. Li, and D.P. Agrawal, “Routing security in
wireless a hoc networks,” IEEE Communications
Magazine, October 2002.

More Related Content

What's hot

Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manetMeena S Pandi
 
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSRTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSIJNSA Journal
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
 
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANETMLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANETijsptm
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networksZdravko Danailov
 
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
 
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks IJNSA Journal
 
NetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionNetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionDESHPANDE M
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsPvrtechnologies Nellore
 
A Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNA Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNiosrjce
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
 
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsConsensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsIJCNCJournal
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks byjpstudcorner
 

What's hot (18)

Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manet
 
Wormhole Attack
Wormhole AttackWormhole Attack
Wormhole Attack
 
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSRTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
K1803036872
K1803036872K1803036872
K1803036872
 
Kw2418391845
Kw2418391845Kw2418391845
Kw2418391845
 
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANETMLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
 
A43030104
A43030104A43030104
A43030104
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
 
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
 
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
 
NetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionNetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and Detection
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
 
A Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNA Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSN
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
 
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsConsensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks by
 

Similar to IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks

SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET Journal
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
 
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET Journal
 
SPECTRUM SHARING FOR 6G COMMUNICATION
SPECTRUM SHARING FOR 6G COMMUNICATIONSPECTRUM SHARING FOR 6G COMMUNICATION
SPECTRUM SHARING FOR 6G COMMUNICATIONIRJET Journal
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...theijes
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsIOSR Journals
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETJasmine Culbreth
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksBRNSSPublicationHubI
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...IRJET Journal
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...IRJET Journal
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...IJARIIT
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Alexander Decker
 

Similar to IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks (20)

SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
 
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
 
SPECTRUM SHARING FOR 6G COMMUNICATION
SPECTRUM SHARING FOR 6G COMMUNICATIONSPECTRUM SHARING FOR 6G COMMUNICATION
SPECTRUM SHARING FOR 6G COMMUNICATION
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
 
ant2
ant2ant2
ant2
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETs
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANET
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
Ijariie1170
Ijariie1170Ijariie1170
Ijariie1170
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 

Recently uploaded (20)

Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 

IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 781 Gray-Hole Attack Minimization based on contradiction for ad-hoc networks Suha Farheen taj H N1, Chinnaswamy C N2, Sunil Kumar B V3, Varshika S4, & Supriya S5 1,3,4,5 B.E Dept of ISE, NIE, Mysuru, Karnataka, India 2Assocaiate Professor Dept of ISE, NIE, Mysuru, Karnataka, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The development for other rising advance technology for example, IoT and portable information correspondence frameworks are sought after for security purposes. A strategy for limiting the Gray-Hole attack in an AD-HOC arrange is necessary for better informationrecovery. This attack don't work after the attack has initiated, it utilizes the interior learning of the AODV protocol and OLSR protocol to avoid the Gray-Hole attack. Mobile ad-hoc network (MANET) is a remote arrange that can exchange the data from source to goal remotely, Because of the open open communication media the portable specially appointed organize has some security limitations there are the possibility of information leakage in the network Gray-hole attack, black-hole attack, wormhole attack are the major threats in the mobile ad-hoc network. In Gray-hole attack specific dropping of the bundles happens, and the data can't be additionally transmitted .this paper examine the proper arrangements and built up the reasonable arrangement to keep the system from the Gray- hole attack. Key Words: MANET, Gray-hole attack, DCFM, OLSR,AODV. 1. INTRODUCTION A mobile ad hoc network (MANET) is generally defined as a network that has many free or autonomous nodes, often composed of mobile devices or other mobile pieces, thatcan arrange themselves in various ways and operate without strict top-down network administration.[4] Therearemany different types of setups that could be called MANETs Some use 4G networks and other systems as examples of a potential topology for a MANET, while others refer to a vehicular ad-hoc network, where the free network nodes are installed in cars and other vehicles. The security threats have been extensively discussed and investigated in the wired and wireless networks, the correspondingly perplexing situation has also happened in MANET due to the inherent design defects. There are many security issues which have been studied in recent years. For instance, snooping attacks, wormhole attacks, black hole attacks, routing table overflowandpoisoningattacks,packet replication, denial of service (DoS) attacks, distributed DoS (DDoS) attacks, et cetera Especially, themisbehaviorrouting problem is one of the popularized security threats such as black hole attacks. Some researchers propose their secure routing idea to solve this issue, but the security problem is still unable to prevent completely. blackhole attack is a type of denial-of-serviceattack inwhich a router that is supposed to relay packets instead discards them. This usually occurs from a router becoming compromised from a number of different causes. One cause mentioned in research is through a denial-of-service attack on the router using a known DDoS tool. Because packets are routinely dropped from a lossy network, the packet drop attack is very hard to detect and prevent. The malicious router can also accomplish this attack selectively, e.g. by dropping packets for a particularnetwork destination, at a certain time of the day, a packet every n packets or every second, or a randomly selected portion of the packets. This is rather called a grey hole attack. rendering anti- blackhole algorithms is useless . Thus, mitigation of the gray-hole attack will also solve the more famous black-hole attack as well. Optimized Link State Routing (OLSR) protocol is a MANET routing protocol and is evaluated mainly for two things. Primarily OLSR is less secure like AODV and others. The reason for it being less secure is that it is a table-driven in nature and uses a methodology called selective flooding technique, where redundancy is reduced and thus the security possibilities of the protocol is reduced. Another reason for selecting OLSR is that is an highly effective routing protocol for MANET. A brief information about formal routing is provided by the proposed methodology termed Denial Contradictions with Fictitious Node Mechanism (DCFM) which provides brief informationabout formal routing. Here, fictitious node acts as a virtual node and large networks are managed from attacks 2.Related work 1.In recent papers, [1] Nadav Schweitzer, Ariel Stulman, Member, IEEE, Asaf Shabtai and Roy David Marg alit proposed a method for Gary- Hole attack detection. In any case, it doesn't fulfil every one of the information that must be sent. It has the burdens, for example, doesn’t illuminate the source about the information failure. It can't recognize the redress goal hub, Time utilization is high, Packet's proficiency is low. 2.Sukla Banerjee proposed a mechanism for detection/removal of cooperativeblack andGrayHoleattack in mobile ad-hoc networks. In this instead of sending the total data traffic at a tie it divides the total traffic into some
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 782 small sized blocks. So that malicious nodes can be detected and removed in between the transmission of two such blocks by ensuring an end-to-end checking. Source node sends a prelude message to thedestinationnodebeforestart of the sending any block to alert it about the incoming data block. It is time consuming algorithm it takes time in converting of total traffic into small sized blocks 3. Toutouh [1] Recent advances in wireless technologies have given rise to the emergence of vehicular ad hoc networks (VANETs). In such networks, the limited coverage of WiFi and the high mobility of the nodes generate frequent topology changes and network fragmentations. For these reasons, and taking into account that there is no central manager entity, routing packets through the network is a challenging task. Therefore, offering an efficient routing strategy is crucial to the deployment of VANETs. This paper deals with the optimal parameter setting of the optimized link state routing (OLSR), which is a well-known mobile ad hoc network routing protocol, by defining an optimization problem. This way, a series of representative metaheuristic algorithms (particle swarm optimization, differential evolution, genetic algorithm, and simulated annealing) are studied in this paper to find automatically optimal configurations of this routing protocol. In addition, a set of realistic VANET scenarios (based in the city of Malaga) have been defined to accurately evaluate the performance of the network under our automatic OLSR. In the experiments,our tuned OLSR configurations result in better quality of service (QoS) than the standard requestforcomments(RFC),aswell as several human experts, making it amenable forutilization in VANET configurations. 4. Y.-C. Hu, [3] As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. For example, most existingadhoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a general mechanism, called packet leashes, for detecting and, thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes. We also discuss topology- based wormhole detection, and showthatitisimpossible for these approaches to detect some wormhole topologies. 3.Existing System Mobile ad-hoc network (MANET) is decentralizedsystem,in this system hubs can move progressively. OSINetwork layer faces a few attack. Gray hole attack chip away at most notable succession number amid Replay message, a gathering of gray hole hubs effectively utilized against steering in MANET called community gray hole attack 4.Proposed system An OLSR based system is helpless against gray hole attack. The aggressor may send, for example, a sham HELLO messages to its one-jump neighbors,assertingtoknowmore one-bounce neighbors than it really does. This will misguidedly build its likelihood of being picked as a sole MPR by its neighbors. The more neighbors an aggressor cases to have, the bigger the potential effect of the attack. Denial Contradictions with Fictitious Mechanism Node Component DCFM was proposed by so as to address the problem of hub privacy in OLSR basedsystems.It recognizes potential malicious hubs attempting to adulterate HELLO messages utilizing just interior data inside the casualty, without depending on any brought together or outer confided in party. Such early discovery keeps a conceivable attack before it can manifest. DCFM confirms the legitimacy of a HELLO message by searching for logical inconsistencies between what the message claims also, its pre-gained topological information. As indicated by ,DCFM, sole MPRs assignments are permitted just when no logical inconsistencies are found. With the nearness of contradictions, a MPR can be assigned for every one of the two-bounce neighbors for which the presumed hub is the main access point. It cannot, be that as it may, be assigned as sole MPR for two jump neighbors that can be come to through different ways. Following , and as defended in , in this work we accept that TC messages can't be restock. 5. System Architecture
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 783 In the above diagram, number of nodes and communication range has been initialized and configured into network simulator, and then select the routingpathinthenetwork.In the selected path send the data from source node to destination node through the neighbour node using nearest next hop approach. If any DOS attack detected in the path, find the attacked neighbour nodes and mark it as attacker node. Finally data should send from source node to destination node through non attacker neighbour nodes by applying OLSR Routing approach. 6.Performance Analysis 6.1 Simulation Simulation is the imitation of the operation of a real-world process or system.[1] The act of simulating something first requires that a model be developed; this model represents the key characteristics, behaviours and functions of the selected physical or abstract system or process. The model represents the system itself, whereas the simulation represents the operation of the system over time.. Using mathematical formulas, or actually capturing and playing back observations from a production network. The behaviour of the network and the various applications and services it supports can then be observed in a test lab; various attributes of the environment can also be modified in a controlled manner to assess how the network would behave under different conditions. 6.2Experimental result 7.Conclusion This paper introduces a change calculation for OLSR based systems for moderating Gray-hole attack . Utilizing exclusively inward learning picked up by taking an interest hubs, we can decline caught parcels by a two fold digit factor; well past what DCFM alone can achieve under comparable conditions. Single supposition is a dynamic attacker attempt to malicious impact arrange topology to build the attack surface. dormant attackers who can at present go undetected can likewise drop bundles, they can't ensure that courses will go through them fundamentally supporting the likelihood of attack achievement. 8. REFERENCES [1] J. Toutouh, J. Garcia-Nieto, and E. Alba, “Intelligent OLSR routing protocol optimization for VANETs,” IEEE Trans. Veh. Technol., vol. 61, no. 4, pp. 1884– 1894, May 2012. [2]. "Contradiction Based Gray-Hole Attack in Ad-Hoc Networks" Nadav Schweitzer, Ariel Stulman, Member, Asaf Shabtai and Roy David Margalit IEEE Transactions on Vehicular Technology, vol. 61, no. 4, pp. 1884–1894, May 2012 [3]. Y.-C. Hu, A. Perrig, and D. B. Johnson, “Wormhole attacks in wireless networks,” IEEE Journal on Selected Areas in Communications, vol. 24,no. 2, pp. 370–380, Feb 2006 [4]https://www.techopedia.com/definition/5532/mobi le-adhoc-network-manet [5]https://en.wikipedia.org/wiki/Packet_drop_attack [6]. H. Deng, H. Li, and D.P. Agrawal, “Routing security in wireless a hoc networks,” IEEE Communications Magazine, October 2002.