Intelligent stealthy attack on MAODV in mobile ad hoc networks
Autor: | Menaka Pushpa Arthur, K. Kathiravan |
---|---|
Rok vydání: | 2014 |
Předmět: |
Routing protocol
Protocol Independent Multicast Multicast business.industry Inter-domain computer.internet_protocol Computer science Network packet ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS Distance Vector Multicast Routing Protocol Throughput Mobile ad hoc network Computer security computer.software_genre Source-specific multicast Geocast Reliable multicast Multicast address IP multicast Xcast business computer Pragmatic General Multicast Computer network |
Zdroj: | 2014 Sixth International Conference on Advanced Computing (ICoAC). |
DOI: | 10.1109/icoac.2014.7229740 |
Popis: | Nowadays, common interest in an information grows rapidly that evolves, many application areas like share market, e- agribusiness and on-demand services. In these applications, delivering information to multiple receivers at the same time makes multicast communication is the next generation dominated data transmission mechanism in mobile ad hoc networks. In spite of efficient bandwidth utilization, multicast is most vulnerable against various types of internal and Byzantine attacks. Existing Intrusion Detection Systems and attacker prevention techniques act too smart to defend these attacking strategies. Accordingly adversaries also update their attacking strategy intelligently to intervene the successful defending schemes. In our work, we present a novel intelligent internal attack on a tree-based multicast routing protocol in MANET. Intelligent adversary launches it's attacking strategy on MAC layer against collision avoidance mechanism only when it can gain more in an attack's success rate. Our simulation study observes the robustness of MAODV against this internal attacking approach. Multicast session's performance metrics such as PDR, throughput and packets drop ratio are analyzed with the presence of adversaries in the multicast group. We also examine the impact of attacker's location in the multicast tree. We design an analytical model that shows the impact of internal attack on multicast group through empirical study. Analytical results compare with NS2 simulation results that prove the validity of analytical models. This empirical study illustrates the importance of designing smarter internal attacker detection mechanism to protect multicast routing protocols from the above-mentioned intelligent internal attacks. |
Databáze: | OpenAIRE |
Externí odkaz: |