DocumentCode :
3524428
Title :
Cognitive radio ad-hoc networks: Attacks and its impact
Author :
Babu, B. Ramesh ; Tripathi, Meenakshi ; Gaur, Manoj Singh ; Gopalani, Dinesh ; Jat, Dharm Singh
Author_Institution :
Dept. of Comput. Sci. & Eng., Malaviya Nat. Inst. of Technol. Jaipur, Jaipur, India
fYear :
2015
fDate :
17-20 May 2015
Firstpage :
125
Lastpage :
130
Abstract :
In the current scenario Cognitive Radio (CR) is the best available solution to overcome spectrum shortage problem. Cognitive Radio Ad Hoc Networks (CRAHNs) is the use of CR technology in the wireless ad-hoc network scenario. The field of CRAHNs is still in this nascent stage therefore not much work has been done related to security issues associated with these types of networks. In order to provide secure data transmission over these networks it is mandatory to make these networks robust and less vulnerable against the various types of attacks. Through this report we have presented an implementation and simulation study of Network Layer Attacks primarily Black Hole Attack and Gray Hole Attack in detail with their impacts on the various network parameters. The Black Hole Attack is a type of Denial of Service(DoS) attack where the node that has turned malicious advertises itself as the most optimal path to reach the destination, thus drawing all the traffic towards itself and later either it drops all the received packets or prevent them from reaching their destinations. The Gray Hole Attack is a variation of black hole attack in which selective forwarding principles are used to selectively drop some data and to forward the rest. In this Project using NS2 with the CRAHN extension as the simulator, effect of these attacks on the various network parameters of CRAHNs have been recorded and compared to present an oversight of how performance is affected whenever the network gets injected with these attacks.
Keywords :
ad hoc networks; cognitive radio; computer network security; CRAHN; NS2; black hole attack; cognitive radio ad-hoc networks; data transmission; denial of service attack; gray hole attack; network layer attacks; spectrum shortage; wireless ad-hoc network; Ad hoc networks; Cognitive radio; Delays; Routing; Routing protocols; Throughput; Balckhole; CRAHNs; Grayhole; Primary user; Routing; Secondary user;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Emerging Trends in Networks and Computer Communications (ETNCC), 2015 International Conference on
Conference_Location :
Windhoek
Print_ISBN :
978-1-4799-7706-2
Type :
conf
DOI :
10.1109/ETNCC.2015.7184821
Filename :
7184821
Link To Document :
بازگشت