Packet Drop Attack: a Serious Threat to Operational Mobile Ad Hoc Networks
نویسندگان
چکیده
In recent years the widespread availability of wireless communications, mobile computing and handheld devices has led to the growth and significance of wireless mobile ad hoc networks. Security issues are paramount in such networks even more so than in wired networks. Though there have been many works in the recent years on secure routing protocols, the “Packet Drop Attack” amongst the nodes is not adequately addressed. In this paper, we analyze a class of secure routing protocols such as SAODV, ARAN and Security Aware Ad Hoc Routing to show how they are vulnerable to packet drop attacks. We also investigate another class of secure routing protocols such as CONFIDANT that cater to defend packet drop attacks but fail due to not having well-defined trust model. The detail study of packet drop events in these protocols leads us to propose a defense-in-depth strategy to secure mobile ad hoc networks through the integration of three layers -prevention layer (based on cryptographic techniques), detection-reaction layer (based on monitoring technique) and enforcement layer (based on obligations).
منابع مشابه
A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملBlackhole Detection in Manets Using Artificial Neural Networks
Mobile ad hoc networks (MANETs) are one of the fastest growing areas of research. A MANET is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and predetermined organization of available links. Some characteristics of MANETs such as communication via wireless links, resource constraints (such as bandwidth and battery power), cooperation bet...
متن کامل