2012
DOI: 10.5120/8507-2511
|View full text |Cite
|
Sign up to set email alerts
|

A Mechanism for Gray Hole Attack Detection in Mobile Adhoc Networks

Abstract: The mobile ad-hoc networks are vulnerable to Denial of Service (DoS) attacks. MANET has features like self organizing, working as router as well as host having dynamic topology. In MANET, nodes have limited resources like bandwidth, battery power and storage capacity. Gray hole attack is a kind of denial of service (DoS) attack in mobile ad hoc networks. It is specialized type of black hole attack which changes its state from honest to malicious and vice versa. Gray hole attack is an event that degrades the ov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…Kanthe et al [3] proposed a mechanism for detection of gray hole attack. Gray hole is detected by count of false replies.…”
Section: A Mechanisms Against Gray Hole Attackmentioning
confidence: 99%
See 3 more Smart Citations
“…Kanthe et al [3] proposed a mechanism for detection of gray hole attack. Gray hole is detected by count of false replies.…”
Section: A Mechanisms Against Gray Hole Attackmentioning
confidence: 99%
“…If any malicious node get detected by innocent node, it do not inform to others when detection of gray hole attack [3].In cooperative gray hole attack detection mechanism CBAODV [5] static values are used to assign credit for every node. As MANET network changes its state dynamically, static values are not suitable for this type of networks.…”
Section: Limitationsmentioning
confidence: 99%
See 2 more Smart Citations
“…al. [13] Proposed Algorithm in which checks False_Reply_Count is greater than False_Reply_threshold if it is true then it black list the node. In this method, it stops the detection if the routing table sequence number is less than reply packet sequence number.…”
Section: Related Workmentioning
confidence: 99%