MIRA: Misleading Routing Attack in Mobile Ad-hoc Networks

被引:0
|
作者
Kandah, Farah [1 ]
Singh, Yashaswi [1 ]
Zhang, Weiyi [2 ]
Wang, Tie [3 ]
机构
[1] N Dakota State Univ, Dept Comp Sci, Fargo, ND 58105 USA
[2] AT&T Labs Res, Middletown, NJ 07748 USA
[3] Microsoft, San Jose, CA 95134 USA
关键词
Mobile ad-hoc networks; adversary; malicious; misleading routing attack;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The growth of laptops, personal digital assistant (PDA) and 802.11/Wi-Fi wireless networking have made mobile ad-hoc network (MANET) a popular research topic recently. Due to the flexible deployment nature and the lack of fixed infrastructure, MANETs suffer from varieties of security attacks. In this paper, we propose the misleading routing attack (MIRA), which is different from the well known gray/black hole attacks, in which a node is relaying the coming packets and not dropping them. MIRA attack aims to delay the packet as much as possible so as to let the source node time out before it receives the acknowledgment. Also it aims to overload the network by increasing the number of unexpected routing packets generated in the network. Our simulation results show that the existence of an adversary in the network launching a misleading routing attack will degrade packet transmissions in the network and increasing the number of lost packets as well as the retransmissions at the sender.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] A Misleading active Routing Attack in Mobile Ad-hoc Networks
    Kandah, F.
    Singh, Y.
    Zhang, W.
    Wang, T.
    International Journal of Security and Networks, 2012, 7 (01) : 17 - 29
  • [2] Mitigating Misleading Routing Attack using Path Signature in Mobile Ad-Hoc Networks
    Kandah, Farah
    Singh, Yashaswi
    Zhang, Weiyi
    Ma, Yulu
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 617 - 622
  • [3] Rushing Attack Against Routing Protocols in Mobile Ad-Hoc Networks
    Ghoreishi, Seyed-Mohsen
    Abd Razak, Shukor
    Isnin, Ismail Fauzi
    Chizari, Hassan
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 220 - 224
  • [4] Wormhole Attack in Mobile Ad-hoc Networks
    Sharma, Madhu
    Jain, Ashish
    Shah, Shweta
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [5] Prefix routing in mobile ad-hoc networks
    Chen, X
    Wu, J
    Jia, XD
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2002, : 66 - 71
  • [6] Routing protocols in mobile Ad-hoc networks
    Gilaberte, RL
    Herrero, LP
    Proceedings of the Fourth IASTED International Conference on Communication Systems and Networks, 2005, : 196 - 201
  • [7] Routing with Dijkstra in Mobile Ad-Hoc Networks
    Mahmoodi, Khudaydad
    Balcilar, Muhammet
    Amasyali, M. Fatih
    Yavuz, Sirma
    Uzun, Yuecel
    Davletov, Feruz
    RoboCup 2013: Robot World Cup XVII, 2014, 8371 : 316 - 325
  • [8] Routing system in mobile ad-hoc networks
    Minochkin, A., I
    Romanjuk, V. A.
    2006 16TH INTERNATIONAL CRIMEAN CONFERENCE MICROWAVE & TELECOMMUNICATION TECHNOLOGY, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2006, : 359 - +
  • [9] Routing protocols in Mobile Ad-hoc Networks
    Mikaric, Bratislav
    Rancic, Dejan
    Ilic, Slavisa
    PRZEGLAD ELEKTROTECHNICZNY, 2020, 96 (08): : 106 - 111
  • [10] Reliable routing in mobile Ad-Hoc Networks
    Tragoudas, Spyros
    Stewart, Khadija
    Recent Advances in Computers, Computing and Communications, 2002, : 456 - 458