Review of Acknowledgment Based Techniques for Detection of Black Hole/Gray Hole Attacks in MANETs

Authors

  • Rajveer Kaur Radiant Institute of Engineering & Technology, Abohar, Punjab
  • Dr. Shaveta Rani Punjab Technical University Giani Zail Singh Campus, Bathinda, Punjab
  • Dr. Paramjeet Singh Punjab Technical University Giani Zail Singh Campus, Bathinda, Punjab

DOI:

https://doi.org/10.24297/ijct.v5i3.3522

Keywords:

MANETs, DSR, node misbehavior, packet dropping, selfish node, malicious node, Black Hole attack, Gray Hole attack

Abstract

In Mobile Ad hoc NETworks (MANETs) nodes communicate via wireless links, without any fixed infrastructure like base stations, central servers or mobile switching. Each node in MANET can act as a host or as a router. Due inherent characteristics like decentralization, self configuring, self -organizing networks, they can be deployed easily without need of expensive infrastructure and  have wide range of military to civilian and commercial applications. But wireless medium, dynamically changing topology, limited battery and lack of centralized control in MANETs, make them vulnerable to various types of attacks. This paper focus on network layer packet dropping attacks – Black Hole & Gray Hole attacks in Dynamic Source Routing (DSR) based MANETs and discuss various pros and cons of acknowledgement based techniques for detection of above said attacks.

Downloads

Download data is not yet available.

Author Biographies

Rajveer Kaur, Radiant Institute of Engineering & Technology, Abohar, Punjab

Department of Computer Science & Engineering

Dr. Shaveta Rani, Punjab Technical University Giani Zail Singh Campus, Bathinda, Punjab

Department of Computer Science & Engineering

Dr. Paramjeet Singh, Punjab Technical University Giani Zail Singh Campus, Bathinda, Punjab

Department of Computer Science & Engineering

Downloads

Published

2013-05-30

How to Cite

Kaur, R., Rani, D. S., & Singh, D. P. (2013). Review of Acknowledgment Based Techniques for Detection of Black Hole/Gray Hole Attacks in MANETs. INTERNATIONAL JOURNAL OF COMPUTERS &Amp; TECHNOLOGY, 5(3), 214–219. https://doi.org/10.24297/ijct.v5i3.3522

Issue

Section

Research Articles