The deployment of gray hole attack leads to various types of attacks. This paper provides an overview of DSR, the most popular routing algorithm of WSN and how DSR will be comprised of gray hole attack. Routing concept along with fitness function of genetic algorithm has been used in this work. The performance of WSN has been checked using genetic algorithm as well as without genetic algorithm. It has been observed that gray hole attack prevention has been done using genetic algorithm at good rate.
C. Siva Ram Murthy, B.S. Manoj, \"Ad Hoc Wireless Networks : Architectures and Protocols\", Prentice Hall PTR, May 2004, New Jersey, USA
K. Biswas and Md. Liaqat Ali, “Security threats in Mobile Ad-Hoc Network”, Master Thesis, Blekinge Institute of Technology” Sweden, 22nd March 2007.
P.V.Jani, “Security within Ad-Hoc Networks,” Position Paper, PAMPAS Workshop, Sept. 16/17 2002.
HaiyunLuo,FanYe,SongwuLu,LixiaZhang,\"Security in mobile ad hoc networks:challenges and solutions \",Volume :11,Issues:1,PP:38-47,IEEE Journals & Magazines,2004.
Hongmei Deng & Wei Li, Dharma P. Agarwal (2002) “Routing security in wireless ad hoc networks”, University of Cincinnati, IEEE Communications magazine, Vol. 40, No. 10.
http://www.boente.eti.br/fuzzy/ebook-fuzzy-mitchell.pdf
YinghuiGuo, “Detecting Blackhole and Greyhole Attacks in Vehicular Delay Tolerant Networks”, COMSNETS 2013.
Vimal, “Performance Analysis of Black Hole Attack in Vanet”, I. J. Computer Network and Information Security, 2012, 11, 47-54.
Ram Shringar Raw1, Manish Kumar1, Nanhay Singh, “Security Challenges, Issues And Their Solutions For Vanet”, International Journal Of Network Security & Its Applications (Ijnsa), Vol.5, No.5, September 2013.
Priyanka Sirola(et.al), “An Analytical Study of Routing Attacks in Vehicular Ad-hoc Networks (VANETs)”, International Journal of Computer Science Engineering (IJCSE), Vol. 3 No.04 .pp210-218,July 2014.
Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey,” Computer Networks, vol. 38, 2002.
L. Tong, Q. Zhao, S. Adireddy. Sensor Networks with Mobile Agents.IEEE Military Communications Conference, Boston, MA, USA, 2003:688-693.
M. Ketel, N. Dogan, A. Homaifar. Distributed Sensor Networks Based on Mobile Agents Paradigm.
Gray hole attack, Security, Genetic Algorithm, DSR.