REAL

3L-AODV: Three Layer Security Protocol for Grayhole Attack Mitigation in MANET

Alshawki, Mohammed B. and Abdullah, Wisam Dawood and Hamoud, Alaa Khalaf and Valadares, Dalton C. G. and Shareiyat, Ammar and Ligeti, Péter (2024) 3L-AODV: Three Layer Security Protocol for Grayhole Attack Mitigation in MANET. In: Proceedings of Eighth International Congress on Information and Communication Technology. Lecture Notes in Networks and Systems (695). Springer Nature Singapore Pte Ltd, Singapore, pp. 813-823. ISBN 9789819930425; 9789819930432

[img]
Preview
Text
3L-AODV Three Layer Security Protocol for Grayhole Attack Mitigation in MANET.pdf - Accepted Version

Download (357kB) | Preview

Abstract

As the Mobile Adhoc Networks infrastructure has no centralized points of connections, the traffic from a source to a destination pass through number of intermediate nodes. When more than one neighbour node is available, the traffic pass through one of them based on some criteria. If a node behaves maliciously in all of the connections and drops the traffic, it creates a security blackhole, while a malicious node that behaves normally is some of the connections creates a security grayhole. Since the malicious node behaves normally is some connections, mitigating this attack is challenging. In this paper we proposed Three Layer Ad-hoc On Demand Vector (3L-AODV), a security protocol that uses three layers of protection and detection to mitigate the grayhole attack. As it does not require any modification on the AODV protocol, it can be implemented on any network that its routing is based on AODV. The analysis of our results shows that 3L-AODV could mitigate the grayhole attack without affecting the performance of the network.

Item Type: Book Section
Additional Information: Department of Computer Algebra, Eotvos Lorand University, Budapest, Hungary Institute for Data Science, Cloud Computing and IT Security, Furtwangen University of Applied Sciences, Furtwangen im Schwarzwald, Germany Department of Computer Science, University of Kufa, Najaf, Iraq Department of Computer Science, University of Tikrit, Tikrit, Iraq Department of Computer Information Systems, University of Basrah, Basrah, Iraq Virtus RDI Center, Federal University of Campina Grande, Campina Grande, Brazil Federal Institute of Pernambuco, Pernambuco, Caruaru, Brazil Department of CSS, University of Stockholm, Stockholm, Sweden Department of Vulnerability Operations Center, Orange Cyberdefense, Stockholm, Sweden Conference code: 298799 Export Date: 26 February 2024 Correspondence Address: Kamel, M.B.M.; Department of Computer Algebra, Hungary; email: mkamel@inf.elte.hu Funding details: Nemzeti Kutatási Fejlesztési és Innovációs Hivatal, NKFI Funding details: Nemzeti Kutatási, Fejlesztési és Innovaciós Alap, NKFIA, 2019-1.3.1-KK-2019-00011 Funding text 1: This research was partially supported by Project no. TKP2021-NVA-29 implemented with the support provided by the Ministry of Culture and Innovation of Hungary from the National Research, Development and Innovation Fund, financed under the TKP2021-NVA funding scheme and the project No. 2019-1.3.1-KK-2019-00011 financed by the National Research, Development and Innovation Fund of Hungary under the Establishment of Competence Centers, Development of Research Infrastructure Programme funding scheme.
Subjects: Q Science / természettudomány > QA Mathematics / matematika > QA75 Electronic computers. Computer science / számítástechnika, számítógéptudomány
SWORD Depositor: MTMT SWORD
Depositing User: Dorottya Cseresnyés
Date Deposited: 18 Sep 2024 06:24
Last Modified: 25 Jun 2025 08:13
URI: https://real.mtak.hu/id/eprint/205036

Actions (login required)

Edit Item Edit Item