Cross-Layer Designs for Mitigating Range Attacks in Ad Hoc Networks
نویسنده
چکیده
This paper analyzes application level performance during a range attack in ad hoc networks. This new denial of service (DoS) attack is based on periodical changes in the transmission range of a wireless node. It is very difficult to detect this attack, because it is perfectly normal for the transmission range to vary. The main contribution of this paper is to present two cross-layer designs for mitigating the range attack. The research methodology is based on using the ns2 network simulator. Nodes are downloading web pages from a server node in a small simulated ad hoc network, and the complete transmission time for each download is measured. According to the simulation results, the proposed mitigation mechanisms can even double the amount of transmissions fulfilling a specific requirement for maximum delay during a range attack.
منابع مشابه
Mitigating Denial of Service Attacks in Computer Networks
Monograph Article dissertation (summary + original articles) Department Laboratory Field of research Opponents Supervisor Abstract Keywords Network security, denial of service attacks, attack mechanisms, defense mechanisms. X This dissertation studies how to defend against denial of service (DoS) attacks in computer networks. As it is not possible to prevent these attacks, one must concentrate ...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملCluster Based Cross Layer Intelligent Service Discovery for Mobile Ad-Hoc Networks
The ability to discover services in Mobile Ad hoc Network (MANET) is a major prerequisite. Cluster basedcross layer intelligent service discovery for MANET (CBISD) is cluster based architecture, caching ofsemantic details of services and intelligent forwarding using network layer mechanisms. The cluster basedarchitecture using semantic knowledge provides scalability and accuracy. Also, the mini...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملDefense against Routing Disruption Attacks in Mobile Ad Hoc Networks
We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disruption Denial-of-Service (DoS) attacks. Unlike many existing solutions, TUF does not focus on a particular type of attack, but instead takes an approach that is fundamentally more general. TUF is a cross-layer technique tha...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006