Vous êtes sur la page 1sur 6

Analysis to Improve Gray-Hole Attack Minimization in MANET

MURALEE V,
Department of Computer Science And Engineering, Government College Of Engineering-Dharmapuri.
muraleeviswanath@gmail.com

TANPREETSINGH K,
Department of Computer Science And Engineering, Government College Of Engineering-Dharmapuri.
tanpreetsingh975@gmail.com

Dr.R ManiKandan , Assistant Professor ,


Department of Computer Science And Engineering, Government College Of Engineering-Dharmapuri.
rmkmanikandan@yahoo.co.uk

Abstract:
An ad hoc network is a network that is composed of individual devices communicating with each
other directly.A Gray-hole attack is one of the popular attacks against mobile ad hoc networks (MANETs)
where a malicious node agrees to participate in route formation but later on denies data forwarding. Now
days this network is widely used all around the world because it does not require any fixed wired network
to establish communication between the source and the destination. Energy efficient high and The attack
surface can be enhanced, however, with specific steps executed by the attacker to increase the probability
of landing on the path to/from a specific (or all) victim(s). To introduce algorithm Adaptive sequence flow
Distributed (ADFD) algorithm used to data could be send securely and sequentially in source to
destination. Spark trotter algorithm (STA) used to find the multiple path from source to destination and
improve the energy .These are the algorithms which change their routing decisions whenever network
topology or traffic load changes. The changes in routing decisions are reflected in the topology as well as
traffic of the network.

Index Terms—MANET, AODV , Gray-Hole Attack, DCFM.


1. Introduction Malicious nodes can generate new routing
messages to advertise nonexistent links and provide
Mobile ad-hoc network is the collection of
incorrect link state information, and flood other nodes
mobile node deployed with temporary purpose. It may
with routing traffic. One of the widely known attacks is
be infrastructure-less or based of fixed infrastructure. It
the Gray Hole Attack. It is the variation of Black hole
allows to mobile node to communicate with each other
attack. Black hole attack is one of the security threat in
without using third party devices. Here, every node is
which the traffic is redirected to such a node that
self-configurable node and capable to transmit, receive
actually does not exist in the network and that node
or forward packet as per requirement. Every node can
drops the entire packet. But in Gray-Hole attack, nodes
work as router and help to discover route among nodes.
will drop the packets selectively.
Mobile ad-hoc network advancement provides
many reimbursements which are;
 Ad-hoc networks are easy to set up and cheap to 2. RELATED WORK
deploy In this section we investigate previous work on
 Mobility and relocation gives freedom to access Mobile Adhoc Networking of the Gray hole attack
and shifting animation in the Mobile Adhoc Networks.
 Flexible and Scalable 2.1 GRAY-HOLE ATTACK
 Low cost network solution Gray hole attacks knots can cause in three directions:
1) Malicious node while the rest of the package basically designed to have characteristics i.e. integrity,
returns the specified packets from node to bring down authentication, non-repudiation and confidentiality.
and destroy.
2) A node can be identified in time, destructive 2.4 Gray hole attack caused by RREQ
behavior,
and optional packages fall and destroy.
3) Both attacks (black hole and gray hole)
merge with each other, for example, a malicious node
may fall in a given period of time specified node and
destroy. Then the node is in a normal state. Because of
these features, it is very difficult to detect Grey holes
attacks. Grey holes and black holes attacks can be
easily both on-demand distance vector routing
protocols such as routing response on the application
and run dynamic source routing [5].

Figure 2. Gray hole attack


2.2 Working of AODV
Fig 2: An attacker can send fake RREQ messages to form
The RREQ consists of the node’s IP address, current gray hole attack
sequence no, broadcast ID and most current sequence
no. for the destination known to the source node. The 2.5 Gray hole attack caused by RREP
destination node, on reception of RREQ, ends a route
reply (RREP) packet along the back path set up at The intruder may create a RREP message to make
intermediary nodes during the route discovery Gray hole as follows: adjust the type field to RREP (2);
procedure. Set the hop count field to 1;Set the source IP address as
2.3 Security Flaws in AODV the source node of the route and the destination IP
address as the destination node of the route, Increment
AODV is susceptible to routing attacks by malicious the destination sequence no. by minimum one; adjust
nodes because of possible paper applications. Although the source IP address (in the IP header) to a non-
a conclusion may survey the important points of the available IP address (Grayle).The intruder unicasts the
paper, do not repeat the abstract as the conclusion. A faked RREP[12] message to the originating node.
conclusion might describe on the significance of the
work or recommend applications and extensions
4. The Proposed Analytical Model
4.1 Proposed Algorithm to Identify and
Prevent from Attack:
Algorithm:(Adaptive Sequence Flow Distributed
Algorithm)
To detect and prevention from attack.
Type of attacker = Black hole as a Malicious attacker
Steps:
Begin
i. Establish a network for n number of nodes.
ii. Define sender, receiver nodes.
iii. Find out all neighbors of source node.
For sender to receiver
i. Sender Send Route Request message to neighbor
nodes for finding the destination
ii. If next node is destination Then direct path is
established
iii. Else Broadcast the RREQ to next neighbors and
maintaining the hop count information.
iv. If destination (receiver) is found then select the
route of minimum hop count and deliver data through
that minimum hop count path h.
a) Multiple paths are selected on the basis of hop
counts h1, h2, h3…….. hn, n=1,23…
Fig 3: Gray Hole is formed by fake RREP
b) Σ Hn = (h1, h2, h3…….. hn) up to destination is
3. BLOCK DIAGRAM Minimum then select for data sending and next route of
hop count h1, h2, h3 …….. hn ≥ Min is select for
multiple path.
For destination to source
i. Select the path with minimum hop counts
ii. Unicast RREP to pervious node with digital
signature
iii. Verify digital signature
iv. If (all signatures are valid)
v. Establish a path for data transfer.
vi. If (Any intermediate or destination node is
malicious node)
vii. Then add the malicious node information in
malicious node column and again rebroadcast Route
request (RREQ) .

5. EXPERIMENTAL RESULT
In the experimental work the simulation has been The figure 5 represents the nodes under the normal
performed using NS2 network simulator tool. The network when there is no malicious activity in the
different scenario is simulated that provides us network.The normal AODV protocol could work and
different graphs and output results to compare our the route would be established.
study to the previous one. The n number of nodes are
examined under normal network environment and
under the malicious environment that provides with
different values on the graph of throughput, packet loss
and d e l a y .

Figure 4. Dropped FTP packet in Gray Hole


attack.

To prevent the Grayhole the approach used will be Figure 7. Network of nodes under attack.
using some threshold value of new field called
probability that would need to trusted network and the
less packet loss and less packet-delivery ratio of the
network.

Figure 8. Combined Graph of Throughput And


Figure 5. Nodes under Normal Network. Packet Loss under Different Network.
The figure above shows the defend against the
attack in the network. The attack is defended by new
algorithm and the new path is find for sending the [2] D. Raffo, C. Adjih, T. Clausen, and P. Mühlethaler,
packet from the source to destination. “An advanced signature system for olsr,” in
The figure above show the throughput of Proceedings of the 2Nd ACM Workshop on Security of
network under attack and network when defended Ad Hoc and Sensor Networks, ser. SASN ’04. New
against the attack. The red marginal line shows the York, NY, USA: ACM, 2004, pp. 10–16. [Online].
throughput after defend against the attack which gives
the higher ration in graph on other way green line show [2] Fatima Ameza, Nassima Assam and Rachid
the throughput under the attack that have very low Beghdad, “Defending AODV Routing Protocol
Against the Gray Hole Attack”, International Journal of
throughput.
Computer Science and Information Security, Vol. 8,
No.2, 2010, pp.112-117.

[3] Nital Mistry, Devesh C. Jinwala and Mukesh


Zaveri, “Improving AODV Protocol against Grayhole
Attacks”, International Multiconference of Engineers
and Computer Scientists 2010, vol. 2, March 2010.

[4] Payal N. Raj and Prashant B. Swadas,”DPRAODV:


A dynamic learning system against gray hole attack in
AODV based Manet”, International Journal of
Computer Science Issues, Vol. 2, Issue 3, 2010, pp:54-
59.

[5] Piyush Agrawal, R. K. Ghosh, Sajal K. Das,


Cooperative Black and Gray Hole Attacks in Mobile
Ad Hoc Networks In Proceedings of the 2nd
international conference on Ubiquitous information
management and communication, 2008.
Figure 9. Combined Graph of Packet Loss under
[6] A. Nadeem, M.Howarth “ Protection of MANETs
different network. from a range of attacks using an intrusion detection &
prevention system” published in Springer science +
6. CONCLUSION Business Media in 2011.
We proposed a secure data protocol for averting grey
hole attacks in ADFD and SPARK TROTTR based [7] Ashok M.Kanthe, Dina Simunic and Ramjee Prasad
algorithm. The protocol maintains the packets that are “Effects of Malicious Attacks in Mobile Ad–hoc
transmitted in a promiscuous mode to ensure the Networks” published in IEEE Journal in 2012.
delivery of packets towards the destination node. If any [8] Mozmin Ahmed and Md. Anwar Hussain
of the node drops the packets, our protocol checks for “Performance of an IDS in an Adhoc Network under
the cause of packet drop to recognize the Gray Hole Black Hole and Gray Hole attacks” published in IEEE
Attack which causes the destruction of the networks in 2014.
and reduce efficiency and loss of information and data,
increased energy consumption; This prevents a trusted [9] G.Usha and Dr.S.Bose “Impact of Gray Hole
node from being listed as a grey hole node. Attack on Adhoc networks” published in IEEE Journal
2014.
References
[1] T. Clausen, P. Jacquet, C. Adjih, A. Laouiti, P. [10] W. Wang, B. Bhargava, “Visualization of
Minet, P. Muhlethaler, A. Qayyum, and L. Viennot, Wormholes in sensor networks”, ACM workshop on
“Optimized Link State Routing Protocol (OLSR),” Wireless Security, pp. 51-60, 2004.
2003, network Working Group. [Online].
[11] Mohammad Al-Shurman, Seong-Moo Yoo and
Seungjin Park, “Gray Hole Attack in Mobile Ad Hoc
Networks”, ACMSE, April 2004, pp.96-97.

[12] Anu Bala, Munish Bansal and Jagpreet Singh,


“Performance Analysis of MANET under Grayhole
Attack”, First International Conference on Networks &
Communications, 2009, pp. 141-145.

[13] Latha Tamilselvan and Dr. V Sankaranarayanan,


“Prevention of Grayhole Attack in MANET”, The 2nd
International Conference on Wireless Broadband and
Ultra Wideband Communications, 2007, pp. 21-26.

[14] Geng Peng and Zou Chuanyun,”Routing Attacks


and Solutions in Mobile Ad hoc Networks”,
International Conference on Communication
Technology, November 2006, pp. 1-4.

[15] J. M. Chang, P. C. Tsou, I. Woungang, H. C.


Chao, and C. F. Lai,“Defending against collaborative
attacks by malicious nodes in manets: A cooperative
bait detection approach,” IEEE Systems Journal, vol. 9,
no. 1, pp. 65–75, March 2015.

[16] R. H. Jhaveri and N. M. Patel, “A sequence


number based bait detection scheme to thwart grayhole
attack in mobile ad hoc networks,” Wireless Networks,
vol. 21, no. 8, pp. 2781–2798, 2015.

[17] A. D. Patel and K. Chawda, Dual Security Against


Grayhole Attack in MANETs. New Delhi: Springer
India, 2015, pp. 33–37.

[18] G. S. Bindra, A. Kapoor, A. Narang, and A.


Agrawal, “Detection and removal of co-operative
blackhole and grayhole attacks in manets,” in System
Engineering and Technology (ICSET), 2012
International Conference on, Sept 2012, pp. 1–5.

[19] A. D. Patel, R. H. Jhaveri, and S. N. Shah, I-EDRI


Scheme to Mitigate Grayhole Attack in MANETs.
New Delhi: Springer India, 2015, pp. 39– 43. .

Vous aimerez peut-être aussi