Académique Documents
Professionnel Documents
Culture Documents
MURALEE V,
Department of Computer Science And Engineering, Government College Of Engineering-Dharmapuri.
muraleeviswanath@gmail.com
TANPREETSINGH K,
Department of Computer Science And Engineering, Government College Of Engineering-Dharmapuri.
tanpreetsingh975@gmail.com
Abstract:
An ad hoc network is a network that is composed of individual devices communicating with each
other directly.A Gray-hole attack is one of the popular attacks against mobile ad hoc networks (MANETs)
where a malicious node agrees to participate in route formation but later on denies data forwarding. Now
days this network is widely used all around the world because it does not require any fixed wired network
to establish communication between the source and the destination. Energy efficient high and The attack
surface can be enhanced, however, with specific steps executed by the attacker to increase the probability
of landing on the path to/from a specific (or all) victim(s). To introduce algorithm Adaptive sequence flow
Distributed (ADFD) algorithm used to data could be send securely and sequentially in source to
destination. Spark trotter algorithm (STA) used to find the multiple path from source to destination and
improve the energy .These are the algorithms which change their routing decisions whenever network
topology or traffic load changes. The changes in routing decisions are reflected in the topology as well as
traffic of the network.
5. EXPERIMENTAL RESULT
In the experimental work the simulation has been The figure 5 represents the nodes under the normal
performed using NS2 network simulator tool. The network when there is no malicious activity in the
different scenario is simulated that provides us network.The normal AODV protocol could work and
different graphs and output results to compare our the route would be established.
study to the previous one. The n number of nodes are
examined under normal network environment and
under the malicious environment that provides with
different values on the graph of throughput, packet loss
and d e l a y .
To prevent the Grayhole the approach used will be Figure 7. Network of nodes under attack.
using some threshold value of new field called
probability that would need to trusted network and the
less packet loss and less packet-delivery ratio of the
network.