Title :
Attack generating and its implication on Ad Hoc Networks
Author :
Menaria, Sumitra ; Valiveti, Sharada ; Kotecha, Ketan
Author_Institution :
Inst. of Technol. Comput. Sci. & Eng., Ahmedabad, India
Abstract :
These days, Ad Hoc Networks are in demand in some crucial applications due to their open architecture and the mobility feature. Here, nodes cooperate with each other for communication. This very characteristic poses an immense problem in Ad Hoc Networks from the Security Point of view. Also due to the lack of Central Administration, Ad Hoc Networks fall prey to the Insider Attacks. Implementation of good Intrusion Detection Systems are ideal for insider attacks. For developing highly efficient intrusion detection system, it is mandatory to understand the effect of attacks on performance of Ad Hoc networks. In this paper we discuss general overview of wireless ad hoc networks, survey of various attacks and analysis of effects of black hole attack, dropping route request attack and Route Request flooding attacks on Ad Hoc networks. The ns-2 simulator was used for simulation of various attacks.
Keywords :
ad hoc networks; security of data; telecommunication security; attack generating; black hole attack; central administration; dropping route request attack; insider attacks; intrusion detection; mobility feature; ns-2 simulator; open architecture; route request flooding attacks; security; wireless ad hoc networks; Ad hoc networks; Data models; Floods; Intrusion detection; Measurement; Routing; Routing protocols;
Conference_Titel :
Emerging Trends in Networks and Computer Communications (ETNCC), 2011 International Conference on
Conference_Location :
Udaipur
Print_ISBN :
978-1-4577-0239-6
DOI :
10.1109/ETNCC.2011.6255884