Trust Value based Algorithm to Identify and Defense Gray-Hole and Black-Hole attack present in MANET using Clustering Method

Authors(2) :-Neelam Janak Kumar Patel, Dr. Khushboo Tripathi

A Mobile ad hoc network (MANET) is infrastructure less network and has numbers of mobile nodes. Any node can work as a router that receives and sends packets and routes them. Networks are highly affected by various types of attacks so securities are a challenges factor. Proper energy utilization becomes a challenging issue because of its highly decentralized infrastructure, dynamic topology and resource constrained. In this research paper, we use 32 mobiles nodes in the network, there are not any centralize control in the network so we implemented clustering technology for proper energy utilization of nodes. Dividing all nodes into three clusters, in each cluster selected cluster head which has maximum energy level. In MANET packet dropped or delayed by the malicious node. Hence, there is the need for effective intrusion detection system which can detect a maximum number of the intruder and corresponding packets be forwarded through some alternate paths in the network. We propose an alternate solution to detect the malicious node with help of trust value. It would remove the need for inbuilt IDS in the wireless networks and result in improving the performance of the network.

Authors and Affiliations

Neelam Janak Kumar Patel
Ph.D. Research Scholar, Department of CSE, ASET, Amity University, Haryana, India
Dr. Khushboo Tripathi
Assistant Professor, Department of CSE, ASET, Amity University, Haryana, India

Routing Protocols, Wireless Ad Hoc Network, MANET, AODV, Black hole, Gray hole

  1. K. Rama Abirami, M. G. Sumithra, "Evaluation of Neighbor Credit Value Based AODV Routing Algorithms for Selfish Node Behavior Detection", Springer Science and Business Media Cluster Computing, Vol. 1,2018.
  2. Uzma Shaikh, Arokia Paul Rajan, "Intrusion Detection and Avoidance of Black and Grey Hole Attacks using AODV Protocol Based MANET", International Journal of Engineering & Technology, Vol.7, pp.123-141, 2018.
  3. VidyaKumari Saurabh, PROF. Roopesh Sharma, RavikantItare, "Cluster-based Technique for Detection and Prevention of Black-Hole Attack in MANETS", IEEE International Conference on Electronics, Communication, and Aerospace Technology ICECA, pp.489-494, 2017.
  4. Shashi Gurung, Siddhartha Chauhan, "A Dynamic Threshold Based Approach for Mitigating Black-Hole Attack in MANET", Springer Wireless Network, pp.1-16, 10.1007/s11276-017-1514-1, 2017.
  5. Deepak Kumar Verma, Renu Jain, Ashwani Kush, "Intrusion Detection using RREP Messages of AODV Routing Protocol", International Journal of Applied Engineering Research, Vol.12, Issue.9, pp.1956-1961, 2017.ISSN 0973-4562.
  6. Snehal P. Dongare, Prof. R. S. Mangrulkar, "Optimal Cluster Head Selection Based Energy Efficient Technique for Defending against Gray Hole and Black Hole Attacks in Wireless Sensor Networks", Elsevier Procedia Computer Science, Vol.78, pp. 423-430, 2016.
  7. Amol R. Dhakne, Prashant N. Chatur, "TCNPR: Trust Calculation based on Nodes Properties and Recommendations for Intrusion Detection in Wireless Sensor Network", IJCSNS International Journal of Computer Science and Network Security, Vol.16, Issue.12, pp.1-10, 2016.
  8. Shikha Sharma, Manish Mahajan, "Security Mechanisms for Mitigating Multiple Black hole Attack in MANETs", IJISE International Journal of Innovative Science, Engineering & Technology, Vol. 2, Issue 11, pp. 582-588, 2015.ISSN 2348-7968.
  9. Debdutta Barman Roy, Rituparna Chaki, Nabendu Chaki, "BHIDS: A new, Cluster-Based Algorithm for Black Hole IDS", Wiley Inter-Science, Security and Communication Networks, Vol.3, pp.278–288, 2014.
  10. Rajendra Aaseri, Pankaj Choudhary, Nirmal Roberts, "Trust Value Algorithm: A Secure Approach against Packet Drop Attack in Wireless Ad-Hoc Networks", International Journal of Network Security & Its Applications (IJNSA), Vol.5, Issue.3, pp.99-111, 2013.
  11. Fidel Thachil, K CShet, "A Trust-Based Approach for AODV Protocol to Mitigate Black Hole Attack in MANET", IEEE International Conference on Computing Sciences, ICCS, pp.281-285. 2012.
  12. Ming-Yang Su, "Prevention of Selective Black Hole Attacks on Mobile Ad Hoc Networks through Intrusion Detection Systems", Elsevier Computer Communications, Vol 34, Issue 1, pp.107-117, 2011.

Publication Details

Published in : Volume 4 | Issue 4 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 281-287
Manuscript Number : IJSRSET184458
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Neelam Janak Kumar Patel, Dr. Khushboo Tripathi, " Trust Value based Algorithm to Identify and Defense Gray-Hole and Black-Hole attack present in MANET using Clustering Method, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 4, pp.281-287, March-April-2018.
Journal URL :

Article Preview

Follow Us

Contact Us