Vulnerabilities, Attacks and their Detection Techniques in Ad hoc Network

نویسندگان

  • Rauki Yadav
  • Naveen Hemrajani
  • I. Aad
  • J.-P. Hubaux
  • John S. Baras
  • Svetlana Radosavac
  • George Theodorakopoulos
  • Dan Sterne
  • Thomas Clausen
چکیده

The aim of this Paper is to study the performance of the OLSR protocol. This paper is about security issues in OLSR. There are many ways a malicious node can exploit the vulnerabilities to launch attack on network. OLSR is a proactive routing protocol, Control packets has been send by OLSR to build and update the topology. As a part of this paper I have simulated a new attack method against OLSR based ad-hoc networks named as detour attack. Initially the attack is simulated with one attacker then with multiple attacks and the overall performance of network is observed under attack as well as normal conditions .The observations are made with different set of topologies and for different positions of attacking nodes. Finally a detection technique is

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

Survey on Detection and Prevention Techniques for Malicious Node in MANET

Wireless ad-hoc networks has now become one of the most vibrant and active field of communication and networks. Due to lack of a defined central authority, MANETs are more vulnerable to security attacks and thus security is essential requirement in MANET as compared to the wired network. The nature and structure of MANET makes it attractive to various types of attackers. In this paper the princ...

متن کامل

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

ADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS

In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...

متن کامل

Security Issues in Mobile Ad Hoc Networks

In this paper, we discuss security issues and their current solutions in the mobile ad hoc network. Owe to the vulnerable nature of the mobile ad hoc network, there are numerous security threats that disturb the development of it. We first analyse the main vulnerabilities in the mobile ad hoc networks, which have made it much easier to suffer from attacks than the traditional wired network. The...

متن کامل

Intrusion Detection and Response in Ad Hoc Networks

Ad hoc networks have received great attention in recent years, mainly due to their important advantages and their growing demand. Nevertheless, ad hoc networks present many inherent vulnerabilities and demand efficient security mechanisms in order to be safeguarded. An efficient intrusion detection approach combined with an authenticated intrusion response can act as an effective line of defens...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012