Simulation of Gray Hole Attack in Adhoc Network Using NS2
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 4
Abstract
A Wireless ad-hoc network is a short-lived network set up by wireless mobile computers or nodes moving randomly in the places that have no network infrastructure. While the nodes communicate with each other, they assist by forwarding data packets to other nodes in the network. Thus the nodes discover a path to the destination node using routing protocols. Though, due to safety measures of the routing protocols, wireless ad-hoc networks are undefended to attacks of the malicious nodes. One of these attacks is the Gray Hole Attack against network integrity absorb all data packets in the network and data packets do not connect with the destination node. As a result data loss will occur. There are many detection and protection procedures to reduce the intruder that perform the gray hole attack. In this paper, simulate the gray hole attack in AODV This paper analyze the effect of gray hole attack on MANET and detection of these attacks by using IDS.
Authors and Affiliations
Ms. Meenakshi , Mr. Kapil Kumar Kaswan
An Efficient Steganographic Scheme Using Skin Tone Detection and Discrete Wavelet Transformation
Steganography is a technique used for secret communication, in which secret information is embedded into a cover medium. The Secret information may be some text or image or even audio clip and the cover medium may be som...
Integrating Mutiview clusters with Tensor Methods
Integrating multiview cluster is an crucial issue in heterogeneous environment. Spectral clustering is used for integrating cluster in heterogeneous environment. In this paper, we used Principal Modularity Maximization b...
A NOVEL 2 STEP RANDOM COLORED GRID GRAPHICAL PASSWORD AUTHENTICATION SYSTEM
Security in the computer is largely supported by passwords for authentication process. Use of alphanumeric passwords is the most common Authentication method. This conventional authentication method has been shown to hav...
CLASSIFICATION TECHNIQUES APPLIED FOR INTRUSION DETECTION
Intrusion detection system (IDS) was designed to monitor the network activity and it identifies the normal and abnormal behavioral pattern in the network. If there was any abnormal pattern, it indicates the system is in...
Comparative Analysis of Digital Image Watermarking Techniques - SVD based Algorithms in Different Wavelet Domains
The aim of digital watermarking is to hide some secret information or logo into the multimedia content for protecting the content from unauthorized access or illegal use. Digital image watermarking is a promising domain...