Modelling Critical Node Attacks in MANETs
نویسندگان
چکیده
MANETs (mobile ad hoc networks) operate in a self-organised and decentralised way. Attacks against nodes that are highly relied to relay tra c could result in a wide range of service outage. A comprehensive model that could enhance the understanding of network behaviour under attacks is important to the design and construction of resilient self-organising networks. Previously, we modelled MANETs as an aggregation of time-varying graphs into a static weighted graph, in which the weights represent link availability of pairwise nodes. Centrality metrics were used to measure node significance but might not always be optimal. In this paper, we define a new metric called criticality1 that can capture node significance more accurately than centrality metrics. We demonstrate that attacks based on criticality have greater impact on network performance than centrality-based attacks in real-time MANETs.
منابع مشابه
A two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملDynamic anomaly detection by using incremental approximate PCA in AODV-based MANETs
Mobile Ad-hoc Networks (MANETs) by contrast of other networks have more vulnerability because of having nature properties such as dynamic topology and no infrastructure. Therefore, a considerable challenge for these networks, is a method expansion that to be able to specify anomalies with high accuracy at network dynamic topology alternation. In this paper, two methods proposed for dynamic anom...
متن کاملSecure and Efficient Traffic Pattern Discovery in MANETs
Anonymous Communication is a critical issue in case of mobile ad-hoc networks (MANETs). It is very tough to learn the source and destination of the communication link and the other intermediate nodes that are involved in the communication. Many techniques are proposed to improve the anonymous communication in case of MANETs. However, MANETs are vulnerable under certain situations like passive a...
متن کاملMitigating Colluding Injected and Duplication Key Attacks in Manet
In this chapter, two new attacks are introduced in MANETs. The CIA in Mobile Ad hoc networks (MANETs) has been successfully eliminated in Wireless Sensor networks, but in MANETs the legitimate node is also reported as a malicious node (Farah Kandah et al 2011). In CIA, an adversary utilizes a colluding attack in MANETs by injecting malicious nodes in the network and hiding their identities from...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کامل