Identification and Prevention of Joint Gray Hole and Black Hole Attacks | IGI Global Scientific Publishing
Reference Hub2
Identification and Prevention of Joint Gray Hole and Black Hole Attacks

Identification and Prevention of Joint Gray Hole and Black Hole Attacks

Munesh C. Trivedi, Sachin Malhotra
Copyright: © 2019 |Volume: 10 |Issue: 2 |Pages: 11
ISSN: 1941-6237|EISSN: 1941-6245|EISBN13: 9781522565079|DOI: 10.4018/IJACI.2019040106
Cite Article Cite Article

MLA

Trivedi, Munesh C., and Sachin Malhotra. "Identification and Prevention of Joint Gray Hole and Black Hole Attacks." IJACI vol.10, no.2 2019: pp.80-90. https://doi.org/10.4018/IJACI.2019040106

APA

Trivedi, M. C. & Malhotra, S. (2019). Identification and Prevention of Joint Gray Hole and Black Hole Attacks. International Journal of Ambient Computing and Intelligence (IJACI), 10(2), 80-90. https://doi.org/10.4018/IJACI.2019040106

Chicago

Trivedi, Munesh C., and Sachin Malhotra. "Identification and Prevention of Joint Gray Hole and Black Hole Attacks," International Journal of Ambient Computing and Intelligence (IJACI) 10, no.2: 80-90. https://doi.org/10.4018/IJACI.2019040106

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Ad-hoc networks consist of a set of autonomous communicating devices that can communicate with each other by establishing multi-hop radio connections, and these connections are maintained in a localized manner. In these types of networks, especially where the nature of communicating nodes is mobile, e.g., MANETs, maintaining security remains a serious challenge due to their wireless, open, and shared communication medium, reliance on cooperative algorithms, dynamically adaptable topologies, an absence of centralized watching points, etc. Most of the existing protocols, utilized for routing in MANETs are susceptible to diverse varieties of attacks. However, it is also susceptible to the well-known gray and black hole attacks. In these types of attacks, malicious nodes are incorrectly advertised as sensible ways to a destination node throughout the route discovery method. This attack becomes complicated when a bunch of malicious nodes are acting together. In this work, a novel mechanism is introduced to identify the malicious node or nodes that have tried to perform malicious activity. Here, identification is made by their increased data routing information (DRI).

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global Scientific Publishing bookstore.