Simulation of Gray Hole Attack in Adhoc Network Using NS2

Abstract

A Wireless ad-hoc network is a short-lived network set up by wireless mobile computers or nodes moving randomly in the places that have no network infrastructure. While the nodes communicate with each other, they assist by forwarding data packets to other nodes in the network. Thus the nodes discover a path to the destination node using routing protocols. Though, due to safety measures of the routing protocols, wireless ad-hoc networks are undefended to attacks of the malicious nodes. One of these attacks is the Gray Hole Attack against network integrity absorb all data packets in the network and data packets do not connect with the destination node. As a result data loss will occur. There are many detection and protection procedures to reduce the intruder that perform the gray hole attack. In this paper, simulate the gray hole attack in AODV This paper analyze the effect of gray hole attack on MANET and detection of these attacks by using IDS.

Authors and Affiliations

Ms. Meenakshi , Mr. Kapil Kumar Kaswan

Keywords

Related Articles

Enhancing Security System of Short Message Service for M-Commerce in GSM

Global System for Mobile (GSM) is a second generation cellular standard developed to cater voice services and data delivery using digital modulation. Short Message Service (SMS) is the text communication service componen...

Role of CMS Services in fulfilling the basic requirement of an ideal E-Learning website

During the past decades, researchers, schools, and governments around the world have supported enhancing student learning by using digital tools, i.e. the e-learning. E-learning is essentially the computer and network en...

Advantages of Blackman Window over Hamming Window Method for designing FIR Filter

In signal processing, there are mainly two types of filters exist and the are Finite Impulse Response(FIR) filter and Infinite Impulse Response(IIR) filter. Finite Impulse Response(FIR) filter can be designed form Infini...

4G User Acceptance Technology Prediction using Grey Prediction Algorithm

The main objective in this study is to prediction of 4G user acceptance in India. Mobile technologies bring more benefits to users when more people use it in the network. This research will show the adoption intentions o...

Robust Face Recognition Using Artificial Neural Network

Face recognition is done naturally by humans. However, developing a computer algorithm to do the same thing is difficult. Assume for the moment we start with images, and we want to distinguish between images of different...

Download PDF file
  • EP ID EP131677
  • DOI -
  • Views 91
  • Downloads 0

How To Cite

Ms. Meenakshi, Mr. Kapil Kumar Kaswan (2014). Simulation of Gray Hole Attack in Adhoc Network Using NS2. International Journal of Computer Science & Engineering Technology, 5(4), 419-423. https://europub.co.uk./articles/-A-131677