MIRA: Misleading Routing Attack in Mobile Ad-hoc Networks

被引:0
|
作者
Kandah, Farah [1 ]
Singh, Yashaswi [1 ]
Zhang, Weiyi [2 ]
Wang, Tie [3 ]
机构
[1] N Dakota State Univ, Dept Comp Sci, Fargo, ND 58105 USA
[2] AT&T Labs Res, Middletown, NJ 07748 USA
[3] Microsoft, San Jose, CA 95134 USA
关键词
Mobile ad-hoc networks; adversary; malicious; misleading routing attack;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The growth of laptops, personal digital assistant (PDA) and 802.11/Wi-Fi wireless networking have made mobile ad-hoc network (MANET) a popular research topic recently. Due to the flexible deployment nature and the lack of fixed infrastructure, MANETs suffer from varieties of security attacks. In this paper, we propose the misleading routing attack (MIRA), which is different from the well known gray/black hole attacks, in which a node is relaying the coming packets and not dropping them. MIRA attack aims to delay the packet as much as possible so as to let the source node time out before it receives the acknowledgment. Also it aims to overload the network by increasing the number of unexpected routing packets generated in the network. Our simulation results show that the existence of an adversary in the network launching a misleading routing attack will degrade packet transmissions in the network and increasing the number of lost packets as well as the retransmissions at the sender.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Bootstrapping security associations for routing in mobile ad-hoc networks
    Bobba, RB
    Eschenauer, L
    Gligor, V
    Arbaugh, W
    GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1511 - 1515
  • [42] PERFORMANCE EVALUATION OF ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORKS
    Nigam, Pratiksha
    Tiwari, Ajay
    ADVANCES AND APPLICATIONS IN MATHEMATICAL SCIENCES, 2021, 20 (07): : 1305 - 1317
  • [43] Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks
    Ali, Masroor
    Ullah, Zahid
    Khan, Meharban
    Hafeez, Abdul
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (04) : 436 - 441
  • [44] Distributed Secure Routing Protocol for Mobile Ad-Hoc Networks
    Khalil, Issa
    Bataineh, Sameer
    Qubajah, Liana
    Khreishah, Abdallah
    2013 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2013, : 106 - 110
  • [45] Research on multicast routing protocols for mobile ad-hoc networks
    Luo Junhai
    Xue Liu
    Ye Danxia
    COMPUTER NETWORKS, 2008, 52 (05) : 988 - 997
  • [46] An energy aware routing protocol for mobile ad-hoc networks
    Chattopadhyay, Alokes
    Thomas, Markose
    Gupta, Arobinda
    ADCOM 2007: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2007, : 262 - +
  • [47] Routing protocol with mobility prediction in mobile ad-hoc networks
    Wang, Qing-Hui
    Sun, Jun-Suo
    Wang, Guang-Xing
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2005, 26 (02): : 114 - 117
  • [48] Trust Enhanced Anonymous Routing in Mobile Ad-Hoc Networks
    Shao, Min-Hua
    Huang, Shin-Jia
    PDCAT 2008: NINTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2008, : 335 - 341
  • [49] Secure routing protocols for mobile ad-hoc wireless networks
    Pirzada, AA
    McDonald, C
    ADVANCED WIRED AND WIRELESS NETWORKS, 2005, 26 : 57 - 80
  • [50] An anonymous distributed routing protocol in mobile ad-hoc networks
    Hwang, Ren-Junn
    Hsiao, Yu-Kai
    JOURNAL OF SUPERCOMPUTING, 2013, 66 (02): : 888 - 906