DocumentCode :
3574461
Title :
Intelligent stealthy attack on MAODV in mobile ad hoc networks
Author :
Pushpa, A. Menaka ; Kathiravan, K.
Author_Institution :
Dept. of Comput. Sci. & Eng., Easwari Eng. Coll., Chennai, India
fYear :
2014
Firstpage :
1
Lastpage :
6
Abstract :
Nowadays, common interest in an information grows rapidly that evolves, many application areas like share market, e- agribusiness and on-demand services. In these applications, delivering information to multiple receivers at the same time makes multicast communication is the next generation dominated data transmission mechanism in mobile ad hoc networks. In spite of efficient bandwidth utilization, multicast is most vulnerable against various types of internal and Byzantine attacks. Existing Intrusion Detection Systems and attacker prevention techniques act too smart to defend these attacking strategies. Accordingly adversaries also update their attacking strategy intelligently to intervene the successful defending schemes. In our work, we present a novel intelligent internal attack on a tree-based multicast routing protocol in MANET. Intelligent adversary launches it´s attacking strategy on MAC layer against collision avoidance mechanism only when it can gain more in an attack´s success rate. Our simulation study observes the robustness of MAODV against this internal attacking approach. Multicast session´s performance metrics such as PDR, throughput and packets drop ratio are analyzed with the presence of adversaries in the multicast group. We also examine the impact of attacker´s location in the multicast tree. We design an analytical model that shows the impact of internal attack on multicast group through empirical study. Analytical results compare with NS2 simulation results that prove the validity of analytical models. This empirical study illustrates the importance of designing smarter internal attacker detection mechanism to protect multicast routing protocols from the above-mentioned intelligent internal attacks.
Keywords :
access protocols; bandwidth allocation; computer network security; data communication; mobile ad hoc networks; multicast protocols; routing protocols; telecommunication traffic; trees (mathematics); Byzantine attack; MAC layer; MANET; MAODV; bandwidth utilization; collision avoidance mechanism; denial of service attack; information delivery; intelligent internal attack; intelligent stealthy attack; intrusion detection system; mobile ad hoc network; multicast communication; multicast routing protocol; multicast tree; next generation data transmission mechanism; smarter internal attacker detection mechanism design; Analytical models; Mobile ad hoc networks; Robustness; Routing; Routing protocols; Throughput; Byzantine attacks; IDS; MANET; MAODV; attacker prevention technique; internal attacks; multicast;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Computing (ICoAC), 2014 Sixth International Conference on
Print_ISBN :
978-1-4799-8466-4
Type :
conf
DOI :
10.1109/ICoAC.2014.7229740
Filename :
7229740
Link To Document :
بازگشت