Simulation of Gray Hole Attack in Adhoc Network Using NS2

Abstract

A Wireless ad-hoc network is a short-lived network set up by wireless mobile computers or nodes moving randomly in the places that have no network infrastructure. While the nodes communicate with each other, they assist by forwarding data packets to other nodes in the network. Thus the nodes discover a path to the destination node using routing protocols. Though, due to safety measures of the routing protocols, wireless ad-hoc networks are undefended to attacks of the malicious nodes. One of these attacks is the Gray Hole Attack against network integrity absorb all data packets in the network and data packets do not connect with the destination node. As a result data loss will occur. There are many detection and protection procedures to reduce the intruder that perform the gray hole attack. In this paper, simulate the gray hole attack in AODV This paper analyze the effect of gray hole attack on MANET and detection of these attacks by using IDS.

Authors and Affiliations

Ms. Meenakshi , Mr. Kapil Kumar Kaswan

Keywords

Related Articles

An Efficient Steganographic Scheme Using Skin Tone Detection and Discrete Wavelet Transformation

Steganography is a technique used for secret communication, in which secret information is embedded into a cover medium. The Secret information may be some text or image or even audio clip and the cover medium may be som...

Integrating Mutiview clusters with Tensor Methods

Integrating multiview cluster is an crucial issue in heterogeneous environment. Spectral clustering is used for integrating cluster in heterogeneous environment. In this paper, we used Principal Modularity Maximization b...

A NOVEL 2 STEP RANDOM COLORED GRID GRAPHICAL PASSWORD AUTHENTICATION SYSTEM

Security in the computer is largely supported by passwords for authentication process. Use of alphanumeric passwords is the most common Authentication method. This conventional authentication method has been shown to hav...

CLASSIFICATION TECHNIQUES APPLIED FOR INTRUSION DETECTION

Intrusion detection system (IDS) was designed to monitor the network activity and it identifies the normal and abnormal behavioral pattern in the network. If there was any abnormal pattern, it indicates the system is in...

Comparative Analysis of Digital Image Watermarking Techniques - SVD based Algorithms in Different Wavelet Domains

The aim of digital watermarking is to hide some secret information or logo into the multimedia content for protecting the content from unauthorized access or illegal use. Digital image watermarking is a promising domain...

Download PDF file
  • EP ID EP131677
  • DOI -
  • Views 92
  • Downloads 0

How To Cite

Ms. Meenakshi, Mr. Kapil Kumar Kaswan (2014). Simulation of Gray Hole Attack in Adhoc Network Using NS2. International Journal of Computer Science & Engineering Technology, 5(4), 419-423. https://europub.co.uk/articles/-A-131677