Simulation of Gray Hole Attack in Adhoc Network Using NS2
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 4
Abstract
A Wireless ad-hoc network is a short-lived network set up by wireless mobile computers or nodes moving randomly in the places that have no network infrastructure. While the nodes communicate with each other, they assist by forwarding data packets to other nodes in the network. Thus the nodes discover a path to the destination node using routing protocols. Though, due to safety measures of the routing protocols, wireless ad-hoc networks are undefended to attacks of the malicious nodes. One of these attacks is the Gray Hole Attack against network integrity absorb all data packets in the network and data packets do not connect with the destination node. As a result data loss will occur. There are many detection and protection procedures to reduce the intruder that perform the gray hole attack. In this paper, simulate the gray hole attack in AODV This paper analyze the effect of gray hole attack on MANET and detection of these attacks by using IDS.
Authors and Affiliations
Ms. Meenakshi , Mr. Kapil Kumar Kaswan
CONTENT BASED IMAGE RETRIEVAL USING COLOR, TEXTURE & SHAPE
Images contain information in a very dense and complex form, which a human eye, after years of training, can extract and understand. The main goal is to extract form an image a set of composing objects or real life attri...
SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION
The main goal of this paper is to embed a watermark in the speech signal, using the three techniques such as Discrete Cosine Transform (DCT) along with Singular Value Decomposition (SVD) and Discrete Wavelet Transform (D...
Recognition of Handwritten Tamil Characters using Wavelet
During early days many research works have been carried out for the Online Characters. But few research works have been proposed for the Offline characters especially for South Indian Languages at the early stages and no...
Routing and Security in Self Organizing Mobile Ad Hoc Networks (MANET): Challenges and Solutions
Ad hoc networks in general have to deal with a highly decentralized as well as a continuously changing topology due to the mobility of the nodes. MANET is not a new paradigm in wireless community. The technology is quite...
An SMS and USSD Model for Locationbased Mobile Advertising
The use of mobile phones to deliver context specific information in the form of advertisements tailored to a user’s profile, location among other related characteristics has been on the increase in the last few years. Lo...