DocumentCode :
1882013
Title :
Colluding injected attack in mobile ad-hoc networks
Author :
Kandah, Farah ; Singh, Yashawi ; Wang, Chonggang
Author_Institution :
Dept. of Comput. Sci., North Dakota State Univ., Fargo, ND, USA
fYear :
2011
fDate :
10-15 April 2011
Firstpage :
235
Lastpage :
240
Abstract :
The growth of laptops, personal digital assistant (PDA) and 802.11/Wi-Fi wireless networking have made mobile ad-hoc network (MANET) and machine-to-machine (M2M) popular research topics recently. With more attention on M2M and MANETs lately, the security issues become more important and urgent for managing and deploying in such networks. The flexible deployment nature and the lack of fixed infrastructure make MANETs suffer from varieties of security attacks. In this paper, we show how an adversary can utilize a colluding attack in MANET by injecting malicious nodes in the network, while hiding their identities from other legitimate nodes. We will name this attack as the Colluding Injected Attack (CIA). These injected nodes will work together to generate a severe attack in the network, which aims to create a collision at an arbitrary node, which in turn will result in making the attacked node unable to receive or relay any packet. As a result this node could be wrongly reported as having a malicious behavior by any other node in the same neighborhood, or it might be reported as unreachable if it is a destination node. Our simulation results show that the existence of an adversary that launching the colluding injected attack (CIA) will mislead the decision of previous attack detection schemes.
Keywords :
mobile ad hoc networks; mobility management (mobile radio); telecommunication security; IEEE 802.11-Wi-Fi wireless networking; MANET; attack detection schemes; colluding injected attack; destination node; laptops; mobile ad-hoc networks; personal digital assistant; Communication system security; Mobile ad hoc networks; Mobile communication; Mobile computing; Wireless communication; Wireless sensor networks; Mobile ad-hoc networks; adversary; attack; colluding; malicious;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-1-4577-0249-5
Electronic_ISBN :
978-1-4577-0248-8
Type :
conf
DOI :
10.1109/INFCOMW.2011.5928815
Filename :
5928815
Link To Document :
بازگشت