Analysis of Current Routing Attacks in Mobile Ad Hoc Networks
Year 2015,
, 127 - 132, 30.03.2015
Hande Bakiler
Aysel Şafak
Abstract
Mobile ad hoc networks (MANET) has no fixed infrastructure and depends on nodes to perform routing of data packets. MANET nodes are highly self organized even with a collection of few mobile nodes. Security is an important issue for mobile ad hoc networks. Even though mobile ad hoc networks have many advantages over the traditional wired network, when it comes to security it poses an immense set of threats. The scope of this project is to study about Misbehavior Node attack, Byzantine attack and Pulse Jammer attack on Reactive Routing Protocol i.e. Ad Hoc On Demand Distance Vector (AODV) on MANET simulation environment. To perform the simulations we used OPNET modeller 14.5 as the network simulator for our proposed work. The results showed that MANET posed a high security risk attack either from internal or from external attack.
References
- REFERENCES
- Hongmei Deng, Wei Li, and Dharma P. Agrawal, “Routing Security in Wireless Ad Hoc Networks,” IEEE Communications Magazine, pp. 70-75, October 2002.
- Ekta Nehra and Er. Jasvir Singh, “Performance Comparison of AODV, TODV,OLSR and ABR using OPNET,” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, pp. 984-990, May 2013.
- Changling Liu and Jörg Kaiser, “A Survey of Mobile Ad Hoc Network Routing Protocols,” The University of Magdeburg, October 2005.
- Rakesh Kumar Jha, Idris Z. Bholebawa, Upena D. Dalal, and A. Vishal Wankhede, "Detection and Fortification Analysis of WiMAX Network: With Misbehavior Node Attack," International Journal on Communications, Network and System Sciences, vol. 5, pp. 353-367, June 2012.
- Yu Zhang, Loukas Lazos, and William Jr. Kozma, “AMD: Audit-based Misbehavior Detection in Wireless Ad Hoc Networks,” IEEE Transactions on Mobile Computing, pp. 1-14.
- Niroj Kumar Pani, “A Secure Zone-Based Routing Protocol for Mobile Ad Hoc Networks,” Department of Computer Science and Engineering, National Institute of Technology, May 2009.
- A. Rajaram and Dr. S. Palaniswami, “The Trust-Based MAC-Layer Security Protocol for Mobile Ad hoc Networks,” International Journal of Computer Science and Engineering, Vol. 2, No. 2, pp 400-408, 2010.
- David J. Thuente and Mithun Acharya, “Intelligent Jamming in Wireless Networks with Applications to 802.11b and Other Networks,” North Carolina State University.
Year 2015,
, 127 - 132, 30.03.2015
Hande Bakiler
Aysel Şafak
References
- REFERENCES
- Hongmei Deng, Wei Li, and Dharma P. Agrawal, “Routing Security in Wireless Ad Hoc Networks,” IEEE Communications Magazine, pp. 70-75, October 2002.
- Ekta Nehra and Er. Jasvir Singh, “Performance Comparison of AODV, TODV,OLSR and ABR using OPNET,” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, pp. 984-990, May 2013.
- Changling Liu and Jörg Kaiser, “A Survey of Mobile Ad Hoc Network Routing Protocols,” The University of Magdeburg, October 2005.
- Rakesh Kumar Jha, Idris Z. Bholebawa, Upena D. Dalal, and A. Vishal Wankhede, "Detection and Fortification Analysis of WiMAX Network: With Misbehavior Node Attack," International Journal on Communications, Network and System Sciences, vol. 5, pp. 353-367, June 2012.
- Yu Zhang, Loukas Lazos, and William Jr. Kozma, “AMD: Audit-based Misbehavior Detection in Wireless Ad Hoc Networks,” IEEE Transactions on Mobile Computing, pp. 1-14.
- Niroj Kumar Pani, “A Secure Zone-Based Routing Protocol for Mobile Ad Hoc Networks,” Department of Computer Science and Engineering, National Institute of Technology, May 2009.
- A. Rajaram and Dr. S. Palaniswami, “The Trust-Based MAC-Layer Security Protocol for Mobile Ad hoc Networks,” International Journal of Computer Science and Engineering, Vol. 2, No. 2, pp 400-408, 2010.
- David J. Thuente and Mithun Acharya, “Intelligent Jamming in Wireless Networks with Applications to 802.11b and Other Networks,” North Carolina State University.