Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation
نویسندگان
چکیده
Mobile ad hoc networks (MANETs) are being used more and in a variety of fields, including the environment, energy efficiency, smart transportation, intelligent agriculture, Internet Things (IoT) ecosystems. They also anticipated to play an increasingly significant role future due strong evolution wireless technology recent years. Nevertheless, this inter-node communication is vulnerable various security attacks such as Man–In-The-Middle (MITM) attacks, which considered be main challenge MANETs. This happens when harmful node intercepts data shared by legal nodes. Therefore, goal work investigate impact attackers’ strategies execute MITM assaults MANETs, message-delayed message-dropped assaults. The output shows that these have severe on entities MANETs network experiences high number compromised messages well E2ED PLD. Finally, using symmetry or asymmetry cryptographies, our proposal will avoid intercept between
منابع مشابه
A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملInterlayer Attacks in Mobile Ad Hoc Networks
In this paper, we demonstrate a new class of protocol-compliant exploits that initiates at the MAC layer but targets ad hoc on-demand routing mechanisms. A misbehaved node implementing this type of attacks completely follows the specifications of IEEE802.11 standard and the existing on-demand routing protocols. However, it can cause routing shortcut attacks or detour attacks. We detail the expl...
متن کاملRouting Attacks in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) are a set of mobile nodes which are self-configuring and connected by wireless links automatically as per the defined routing protocol. These nodes communicate with each other by exchange of packets, which for those nodes not in wireless range goes hop by hop. Unique characteristics, such as dynamic network topology, limited bandwidth, and limited power, nodes ru...
متن کاملSignificance of Mobile AD-HOC Networks (MANETS)
Wireless networks use radio frequencies in air to transmit and receive data instead of using some physical cables. Wireless networks are formed of routers and hosts. In a wireless network, the routers are responsible for forwarding packets in the network and hosts may be sources or sinks of data flows .The fundamental difference between wired and wireless networks is the that the networks compo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Symmetry
سال: 2022
ISSN: ['0865-4824', '2226-1877']
DOI: https://doi.org/10.3390/sym14081543