The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network
نویسندگان
چکیده
In this paper, for a battlefield self-organizing network the security flaw of RTS/CTS handshake mechanism will be analyzed based on its hierarchical and clustering features. By utilizing the fact that Cluster-type structure is easily to lead to the false blocking problem, a Denial of Service attack method is proposed. In this method, the attacker utilizes the pair nodes to forge malicious information, and thus, the communications among the nodes in the same cluster are blocked. Moreover, a defense strategy against the proposed attack is presented. The simulations with NS-2.33 show that the throughput descends largely in the attacking state, and when the defense strategy is implemented, the situation that the throughput descends could be improved obviously.
منابع مشابه
Stochastic Analysis of Mean Interference for RTS/CTS Mechanism
The RTS/CTS handshake mechanism in WLAN is studied using stochastic geometry. The effect of RTS/CTS is treated as a thinning procedure for a spatially distributed point process that models the potential transceivers in a WLAN, and the resulting concurrent transmission processes are described. Exact formulas for the intensity of the concurrent transmission processes and the mean interference exp...
متن کاملEffectiveness of RTS/CTS handshake in IEEE 802.11 based ad hoc networks
IEEE 802.11 MAC mainly relies on two techniques to combat interference: physical carrier sensing and RTS/CTS handshake (also known as ‘‘virtual carrier sensing’’). Ideally, the RTS/CTS handshake can eliminate most interference. However, the effectiveness of RTS/CTS handshake is based on the assumption that hidden nodes are within transmission range of receivers. In this paper, we prove using an...
متن کاملHow effective is the IEEE 802.11 RTS/CTS handshake in ad hoc networks
IEEE 802.11 MAC mainly relies on two techniques to combat interference: physical carrier sensing and RTS/CTS handshake (also known as “virtual carrier sensing”). Ideally, the RTS/CTS handshake can eliminate most interference. However, the effectiveness of RTS/CTS handshake is based on the assumption that hidden nodes are within transmission range of receivers. In this paper, we prove using anal...
متن کاملEffectiveness of RTS=CTS handshake in IEEE 802.11a Wireless LANs
The RTS=CTS reservation scheme in IEEE 802.11a Wireless LANs (WLANs) is employed to improve performance as it shortens packet collision duration and addresses the hidden station problem. An investigation has been conducted into how effective the RTS=CTS handshake is in reducing collision duration for 54 Mbit=s by extending an existing mathematical model for the particular packet overheads and d...
متن کاملADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS
In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computer and Information Science
دوره 3 شماره
صفحات -
تاریخ انتشار 2010