Visible to the public Improved approach of co-operative gray hole attack prevention monitored by meta heuristic on MANET

TitleImproved approach of co-operative gray hole attack prevention monitored by meta heuristic on MANET
Publication TypeConference Paper
Year of Publication2017
AuthorsGeetanjali, Gupta, J.
Conference Name2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)
Date Publishedsep
KeywordsCooperative Gray Hole attack, data packets, gray hole attack prevention, intermediate nodes, malicious node, MANET, meta heuristic, mobile ad hoc networks, mobile ad-hoc network, Mobile Ad-Hoc Network (MANET), Mobile communication, mobile computing, mobile nodes, multiple gray hole attack, network simulator, particle swarm optimisation, particle swarm optimization, pubcrawl, Resiliency, Scalability, Security Heuristics, telecommunication security, wireless movable nodes
Abstract

Mobile ad-hoc network (MANET) contains various wireless movable nodes which can communicate with each other and they don't require any centralized administrator or network infrastructure and also can communicate with full capacity because it is composed of mobile nodes. They transmit data to each other with the help of intermediate nodes by establishing a path. But sometime malicious node can easily enter in network due to the mobility of nodes. That malicious node can harm the network by dropping the data packets. These type of attack is called gray hole attack. For detection and prevention from this type of attack a mechanism is proposed in this paper. By using network simulator, the simulation will be carried out for reporting the difficulties of prevention and detection of multiple gray hole attack in the Mobile ad-hoc network (MANET). Particle Swarm Optimization is used in this paper. Because of ad-hoc nature it observers the changing values of the node, if the value is infinite then node has been attacked and it prevents other nodes from sending data to that node. In this paper, we present possible solutions to prevent the network. Firstly, find more than one route to transmit packets to destination. Second, we provide minimum time delay to deliver the packet. The simulation shows the higher throughput, less time delay and less packet drop.

URLhttps://ieeexplore.ieee.org/document/8269703/
DOI10.1109/ISPCC.2017.8269703
Citation Keygeetanjali_improved_2017