DocumentCode :
2811516
Title :
Attack generating and its implication on Ad Hoc Networks
Author :
Menaria, Sumitra ; Valiveti, Sharada ; Kotecha, Ketan
Author_Institution :
Inst. of Technol. Comput. Sci. & Eng., Ahmedabad, India
fYear :
2011
fDate :
22-24 April 2011
Firstpage :
473
Lastpage :
477
Abstract :
These days, Ad Hoc Networks are in demand in some crucial applications due to their open architecture and the mobility feature. Here, nodes cooperate with each other for communication. This very characteristic poses an immense problem in Ad Hoc Networks from the Security Point of view. Also due to the lack of Central Administration, Ad Hoc Networks fall prey to the Insider Attacks. Implementation of good Intrusion Detection Systems are ideal for insider attacks. For developing highly efficient intrusion detection system, it is mandatory to understand the effect of attacks on performance of Ad Hoc networks. In this paper we discuss general overview of wireless ad hoc networks, survey of various attacks and analysis of effects of black hole attack, dropping route request attack and Route Request flooding attacks on Ad Hoc networks. The ns-2 simulator was used for simulation of various attacks.
Keywords :
ad hoc networks; security of data; telecommunication security; attack generating; black hole attack; central administration; dropping route request attack; insider attacks; intrusion detection; mobility feature; ns-2 simulator; open architecture; route request flooding attacks; security; wireless ad hoc networks; Ad hoc networks; Data models; Floods; Intrusion detection; Measurement; Routing; Routing protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Emerging Trends in Networks and Computer Communications (ETNCC), 2011 International Conference on
Conference_Location :
Udaipur
Print_ISBN :
978-1-4577-0239-6
Type :
conf
DOI :
10.1109/ETNCC.2011.6255884
Filename :
6255884
Link To Document :
بازگشت