A Cipher Based Acknowledgement Approach for Securing MANETs by Mitigating Black and Gray Hole Attacks

  • Neha
  • Gurjot Kaur WaliaEmail author
  • Harminder KaurEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 805)


Mobile indicates moving devices and Ad Hoc indicates temporary structure so mobile ad hoc network is a kind of temporary structure less networks. MANET is a collection of independent networks and this network is a non centralized, temporary mesh of continuously moving random nodes where each device in network works as a router and route packets to share data with each other. Due to its continuously evolving topology, limited resource and low safety, this is endangered to different attacks and black hole attack is one of them. To overcome this problem in MANET, a malicious node detection and encryption based approach has been used. In the proposed work reverse tracking mechanism has been used for detection of attacker nodes, that degrades performance of the network and a cipher based mechanism has been proposed to mitigate the multiple black hole and gray hole attacks, which yielded better results than other methods in terms of throughput, PDR, delay and network overhead.


MANET Security Cipher text Black hole attack Gray hole attack Nodes Routing 


  1. 1.
    Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Royer, E.M.B.: A secure routing protocol for ad hoc networks. In: Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP 2002), pp. 1092–1648 (2002)Google Scholar
  2. 2.
    Papadimitratos, P., Haas, Z.J.: Secure routing for mobile ad hoc networks. In: Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), San Antonio, pp. 27–31 (2002)Google Scholar
  3. 3.
    Hu, Y.C., Perrig, P., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks, pp. 21–38. Wireless Networks Business Media, Inc. Manufactured in The Netherlands (2005)Google Scholar
  4. 4.
    Sen, J., Chandra, M.G., Harihara, S.G., Reddy, H., Balamuralidhar, P.: A mechanism for detection of gray hole attack in mobile ad hoc networks. In: International Conference on Information, Communications & Signal Processing, pp. 1–5 (2007)Google Scholar
  5. 5.
    Gao, X.P., Chen, W.: A novel gray hole attack detection scheme for mobile ad-hoc network. In: IFIP International Conference on Network and Parallel Computing, pp. 209–214 (2007)Google Scholar
  6. 6.
    Nadeem, A., Howarth, M.: A generalized intrusion detection & prevention mechanism for securing MANETs. In: IEEE International Conference on Ultra-Modern Telecommunications & Workshops, pp. 1–6 (2009)Google Scholar
  7. 7.
    Cai, J., Yi, P., Chen, J., Wang, Z., Liu, N.: An adaptive approach to detecting black and gray hole attacks in ad hoc network. In: IEEE International Conference on Advanced Information Networking and Applications (2010). ISSN 1550-445XGoogle Scholar
  8. 8.
    Al-Omari, S.A.K., Sumari, P.: An overview of mobile ad hoc network for the existing protocol and application. J. Appl. Graph Theory Wirel. Ad-Hoc Netw. Sens. Netw. 2(1), 87–110 (2010)Google Scholar
  9. 9.
    Taggu, A., Taggu, A.: Trace Gray: an application-layer scheme for intrusion detection in MANET using mobile agents. In: IEEE International Conference on Communication Systems and Networks (COMSNETS 2011), Bangalore, India, pp. 1–4 (2011)Google Scholar
  10. 10.
    Patel, M., Sharma, S.: Detection of malicious attack in MANET a behavioral approach. In: IEEE International Advance Computing Conference (IACC), pp. 388–393 (2012)Google Scholar
  11. 11.
    Kanthe, A.M., Simunic, D., Prasad, R.: Effects of malicious attacks in mobile ad–hoc networks. In: IEEE International Conference on Computational Intelligence and Computing Research, pp. 1–5 (2012)Google Scholar
  12. 12.
    Mulert, J.V., Welch, I., Seah, W.K.G.: Security threats and solutions in MANETs- a case study using AODV and SAODV. J. Netw. Comput. Appl. 35, 1249–1259 (2012)CrossRefGoogle Scholar
  13. 13.
    Kalia, N., Munjal, K.: Multiple black hole node attack detection scheme in MANET by modifying AODV protocol. Int. J. Eng. Adv. Technol. 2(3) (2013). ISSN 2249-8958Google Scholar
  14. 14.
    Sonia, A.A.: A review paper on pooled black hole attack in MANET. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(5) (2013). ISSN 2277-128XGoogle Scholar
  15. 15.
    Kondaiah, B., Nagendra, D.M.: An efficient protection against collaborative attacks in MANET using cooperative bait detection scheme. Int. J. Innovation Res. Comput. Commun. Eng. (IJIRCCE) 4(2), 2356–2362 (2016)Google Scholar
  16. 16.
    Bang, A.O., Ramteke, P.L.: MANET: history, challenges and applications. Int. J. Appl. Innov. Eng. Manage. (IJAIEM) 2(9) (2013). ISSN 2319-4847Google Scholar
  17. 17.
    Vasantha, S.V., Damodaram, D.A.: Bulwark AODV against black hole and gray hole attacks in MANET. In: IEEE International Conference on Computational Intelligence and Computing Research (2015)Google Scholar
  18. 18.
    Goyal, P., Parmar, V., Rishi, R.: MANET: vulnerabilities, challenges, attacks, application. IJCEM Int. J. Comput. Eng. Manage. 11 (2011). ISSN 2230-7893Google Scholar
  19. 19.
    Shakshuki, E.M., Kang, N., Sheltami, T.R.: EAACK- A Secure Intrusion- Detection System for MANETs. IEEE Trans. Industr. Electron. 60(3), 1089–1098 (2013)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Guru Nanak Dev Engineering CollegeLudhianaIndia

Personalised recommendations