MIRA: Misleading Routing Attack in Mobile Ad-hoc Networks

被引:0
|
作者
Kandah, Farah [1 ]
Singh, Yashaswi [1 ]
Zhang, Weiyi [2 ]
Wang, Tie [3 ]
机构
[1] N Dakota State Univ, Dept Comp Sci, Fargo, ND 58105 USA
[2] AT&T Labs Res, Middletown, NJ 07748 USA
[3] Microsoft, San Jose, CA 95134 USA
关键词
Mobile ad-hoc networks; adversary; malicious; misleading routing attack;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The growth of laptops, personal digital assistant (PDA) and 802.11/Wi-Fi wireless networking have made mobile ad-hoc network (MANET) a popular research topic recently. Due to the flexible deployment nature and the lack of fixed infrastructure, MANETs suffer from varieties of security attacks. In this paper, we propose the misleading routing attack (MIRA), which is different from the well known gray/black hole attacks, in which a node is relaying the coming packets and not dropping them. MIRA attack aims to delay the packet as much as possible so as to let the source node time out before it receives the acknowledgment. Also it aims to overload the network by increasing the number of unexpected routing packets generated in the network. Our simulation results show that the existence of an adversary in the network launching a misleading routing attack will degrade packet transmissions in the network and increasing the number of lost packets as well as the retransmissions at the sender.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Efficient Routing in Mobile Ad-Hoc Social Networks
    Kunz, Thomas
    Esfandiari, Babak
    Ockenfeld, Frank
    2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, : 216 - 222
  • [22] Partial Multipath Routing for Mobile Ad-hoc Networks
    Lee, Gan-Gun
    Park, Hyung-Kun
    2015 SEVENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2015, : 707 - 709
  • [23] Reliable routing algorithm in mobile Ad-hoc networks
    Guo, SS
    Yang, FC
    INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR ENHANCED INTERNET SERVICES, 2003, 2662 : 723 - 733
  • [24] Routing protocol for mobile ad-hoc wireless networks
    Nogales, Ivris Marcelo Bacarreza
    RADIOENGINEERING, 2007, 16 (03) : 86 - 90
  • [25] Routing with energy considerations in mobile ad-hoc networks
    Tragoudas, S
    Dimitrova, S
    WCNC: 2000 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2000, : 1258 - 1261
  • [26] ENERGY EFFICIENT ROUTING IN MOBILE AD-HOC NETWORKS
    Choudhury, Debaditya
    Kar, Debanjana
    Biswas, Katha Roy
    Saha, Himadri Nath
    2015 INTERNATIONAL CONFERENCE AND WORKSHOP ON COMPUTING AND COMMUNICATION (IEMCON), 2015,
  • [27] The impact of resource consumption attack on mobile ad-hoc network routing
    Abdelhaq, Maha
    Alsaqour, Raed
    Al-Hubaishi, Mohammed
    Alahdal, Tariq
    Uddin, Mueen
    International Journal of Network Security, 2014, 16 (05) : 376 - 381
  • [28] JFDV Attack: Influence on Workability of Mobile Ad-hoc Networks
    Sharma, Avani
    Kaur, Rajbir
    Karmakar, Purnendu
    2014 SIXTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS (CICSYN), 2014, : 170 - 175
  • [29] Towards a Scalable Routing Approach for Mobile Ad-hoc Networks
    Ramrekha, Tipu A.
    Adigun, Olayinka
    Ladas, Alexandros
    Weerasinghe, Nuwan
    Politis, Christos
    2015 IEEE 20TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELLING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2015, : 261 - 266
  • [30] CGM: A multicast routing protocol for mobile ad-hoc networks
    Lin, CR
    Sia, MJ
    Huang, YS
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2003, E86B (12) : 3569 - 3579