DocumentCode :
568500
Title :
Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs
Author :
Ehsan, Humaira ; Khan, Farrukh Aslam
Author_Institution :
Dept. of Comput. Sci., Nat. Univ. of Comput. & Emerging Sci., Islamabad, Pakistan
fYear :
2012
fDate :
25-27 June 2012
Firstpage :
1181
Lastpage :
1187
Abstract :
From the security perspective Mobile Ad hoc Networks (MANETs) are amongst the most challenging research areas and one of the key reasons for this is the ambiguous nature of insider attacks in these networks. In recent years, many attempts have been made to study the intrinsic attributes of these insider attacks but the focus has generally been on the analysis of one or very few particular attacks, or only the survey of various attacks without any performance analysis. Therefore, a major feature that research has lately lacked is a detailed and comprehensive study of the effects of various insider attacks on the overall performance of MANETs. In this paper we investigate, in detail, some of the most severe attacks against MANETs namely the blackhole attack, sinkhole attack, selfish node behavior, RREQ flood, hello flood, and selective forwarding attack. A detailed NS-2 implementation of launching these attacks successfully using Ad hoc On-Demand Distance Vector (AODV) routing protocol has been presented and a comprehensive and comparative analysis of these attacks is performed. We use packet efficiency, routing overhead, and throughput as our performance metrics. Our simulation-based study shows that flooding attacks like RREQ flood and hello flood drastically increase the routing overhead of the protocol. Route modification attacks such as sinkhole and blackhole are deadly and severely affect the packet efficiency and bring down the throughput to unacceptable ranges.
Keywords :
mobile ad hoc networks; routing protocols; telecommunication security; AODV routing protocol; MANET; RREQ flood; ad hoc on-demand distance vector routing protocol; blackhole; blackhole attack; hello flood; malicious AODV; mobile ad hoc networks security; performance metrics; route modification attacks; routing attacks; selective forwarding attack; selfish node behavior; sinkhole; sinkhole attack; Ad hoc networks; Data models; Mobile computing; Routing; Routing protocols; Throughput; Blackhole; Hello flood; MANETs; Network layer attacks; RREQ flood; Selective forwarding; Selfish Node; Sinkhole;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location :
Liverpool
Print_ISBN :
978-1-4673-2172-3
Type :
conf
DOI :
10.1109/TrustCom.2012.199
Filename :
6296111
Link To Document :
بازگشت