Authors :
Shalini Bhaskar Bajaj
Volume/Issue :
Volume 10 - 2025, Issue 9 - September
Google Scholar :
https://tinyurl.com/s2b3y3se
Scribd :
https://tinyurl.com/m5vn8fa7
DOI :
https://doi.org/10.38124/ijisrt/25sep900
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 30 to 40 days to display the article.
Abstract :
The current era is defined by pervasive mobility, which significantly influences networking technologies.
Evaluating new communication systems, particularly in terms of their reliability and adaptability within the Internet, has
become a key focus for modern research. Thus, this area is focused on researchers to provide solutions for pressing
challenges in Mobile Ad-Hoc Networks (MANETs). In this context, Mobile Ad Hoc Networks (MANETs) have emerged as
a prominent area of study due to their decentralized structure and dynamic topology, making them suitable for
environments lacking fixed infrastructure. However, these very characteristics also render MANETs highly vulnerable to
security threats such as gray hole attacks. This paper investigates the impact of gray hole attacks on the Ad hoc On-Demand
Distance Vector Routing (AODV) and Dynamic Source Routing (DSR) protocols. The results of these protocols were
analyzed using the NS2.35 simulator on Ubuntu 22.04. A malicious node is introduced in the simulation, which initially
behaves normally during route discovery but later drops data packetsselectively. The study evaluates the effects of malicious
node behavior on critical performance metrics such as packet delivery ratio, end-to-end delay and throughput. The findings
underscore the susceptibility of DSR to such attacks and explore potential countermeasures to improve the security and
robustness of routing in MANETs.
Keywords :
MANETs, AODV, DSR, Gray Hole Attack, NS2.
References :
- D., P.K., Sandhya, E., Sk, K.S. et al. Enhancing security and efficiency in Mobile Ad Hoc Networks using a hybrid deep learning model for flooding attack detection. Sci Rep 15, 818 (2025). https://doi.org/10.1038/s41598-024-84421-0.
- Sharma, R. (2016). Gray-hole Attack in Mobile Ad-hoc Networks: A Survey. International Journal of Computer Science and Information Technologies, 7(3), 1457-1460.
- Arega, K. L., Raga, G., & Bareto, R. (2020). Survey on performance analysis of AODV, DSR and DSDV in MANET. Computer Engineering and Intelligent Systems, 11(3), 23-32.
- Chowdari, R., & Srinivas, K. (2017). A survey on detection of Blackhole and Grayhole attacks in Mobile Ad-hoc Networks.
- Radha, M., & Rao, M. N. (2019). Gray hole attack detection prevention and elimination using Sdpegh in Manet. International Journal of Engineering and Advanced Technology (IJEAT), 8(3).
- Dipakkumar, J. S., Srivastava, A. K., & Vithlani, S. K. (2016, March). Simulation based study of gray hole attack in MANET. In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 3529-3534). IEEE.
- Behzad, S., Fotohi, R., & Dadgar, F. (2015). Defense against the attacks of the black hole, gray hole and wormhole in MANETs based on RTT and PFT. International Journal of Computer Science and Network Solutions (IJCSNS), 3(3), 89-103.
- Weeks, M., & Altun, G. (2006). Efficient, secure, dynamic source routing for ad-hoc networks. Journal of Network and Systems Management, 14, 559-581.
- Raghu, R., Nawaz, B., Sundar, S. S., Kumar, A. S., & Sivakumar, C. Enhanced DSR protocol to analyze black hole attack in MANETs using NS2. academia. edu.
- Verma, M., & Barwar, N. C. (2014). A comparative analysis of DSR and AODV protocols under Blackhole and Grayhole attacks in MANET. International Journal of Computer Science and Information Technologies, 5(6), 7228-7231.Cormack, G. V., Lynam, T. R., & Riehle, D. M. (1998). Virtual reference collection: Model, recommendations, and implementation. Information Processing & Management, 34(3), 355-369.
- Ourouss, K., Naja, N., & Jamali, A. (2021). Defending against smart grayhole attack within MANETs: A reputation-based ant colony optimization approach for secure route discovery in DSR protocol. Wireless Personal Communications, 116, 207-226.
- Khosa, T. N., Mathonsi, T. E., & Du Plessis, D. P. (2023). A model to prevent gray hole attacks in mobile ad-hoc networks. Journal of Advances in Information Technology, 14(3), 532-542.
- Kumar, T. A., Devi, A., Padmapriya, N., Jayalakshmi, S., & Divya, P. (2021). A Survey on Advance Black/Grey hole Detection and Prevention Techniques in DSR & AODV Protocols. International Journal on Wireless, Networking & Mobile Communication Innovations [ISSN: 2581-5113 (online)], 5(1).
- MANKOTIA, V., Sunkaria, R. K., & Gurung, S. (2023). Dual Security Based Protocol Against Gray-Hole Attack in MANET. Adhoc & Sensor Wireless Networks, 56.
- Hassan, S. M., Mohamad, M. M., & Muchtar, F. B. (2024). Advanced intrusion detection in MANETs: A survey of machine learning and optimization techniques for mitigating black/gray hole attacks. IEEE Access.
- Shafi, S., Mounika, S., & Velliangiri, S. J. P. C. S. (2023). Machine learning and trust based AODV routing protocol to mitigate flooding and blackhole attacks in MANET. Procedia Computer Science, 218, 2309-2318.
- Sarao, P. (2022). Performance Analysis of MANET under Security Attacks. J. Commun., 17(3), 194-202
The current era is defined by pervasive mobility, which significantly influences networking technologies.
Evaluating new communication systems, particularly in terms of their reliability and adaptability within the Internet, has
become a key focus for modern research. Thus, this area is focused on researchers to provide solutions for pressing
challenges in Mobile Ad-Hoc Networks (MANETs). In this context, Mobile Ad Hoc Networks (MANETs) have emerged as
a prominent area of study due to their decentralized structure and dynamic topology, making them suitable for
environments lacking fixed infrastructure. However, these very characteristics also render MANETs highly vulnerable to
security threats such as gray hole attacks. This paper investigates the impact of gray hole attacks on the Ad hoc On-Demand
Distance Vector Routing (AODV) and Dynamic Source Routing (DSR) protocols. The results of these protocols were
analyzed using the NS2.35 simulator on Ubuntu 22.04. A malicious node is introduced in the simulation, which initially
behaves normally during route discovery but later drops data packetsselectively. The study evaluates the effects of malicious
node behavior on critical performance metrics such as packet delivery ratio, end-to-end delay and throughput. The findings
underscore the susceptibility of DSR to such attacks and explore potential countermeasures to improve the security and
robustness of routing in MANETs.
Keywords :
MANETs, AODV, DSR, Gray Hole Attack, NS2.