• Title/Summary/Keyword: Blackhole attack

Search Result 13, Processing Time 0.017 seconds

Lightweight Acknowledgement-Based Method to Detect Misbehavior in MANETs

  • Heydari, Vahid;Yoo, Seong-Moo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5150-5169
    • /
    • 2015
  • Mobile Ad hoc NETworks (MANETs) are the best choice when mobility, scalability, and decentralized network infrastructure are needed. Because of critical mission applications of MANETs, network security is the vital requirement. Most routing protocols in MANETs assume that every node in the network is trustworthy. However, due to the open medium, the wide distribution, and the lack of nodes' physical protection, attackers can easily compromise MANETs by inserting misbehaving nodes into the network that make blackhole attacks. Previous research to detect the misbehaving nodes in MANETs used the overhearing methods, or additional ACKnowledgement (ACK) packets to confirm the reception of data packets. In this paper a special lightweight acknowledgement-based method is developed that, contrary to existing methods, it uses ACK packets of MAC layer instead of adding new ACK packets to the network layer for confirmations. In fact, this novel method, named PIGACK, uses ACK packets of MAC 802.11 to piggyback confirmations from a receiver to a sender in the same transmission duration that the sender sends a data packet to the receiver. Analytical and simulation results show that the proposed method considerably decreases the network overhead and increases the packet delivery ratio compared to the well-known method (2ACK).

Transmission Performance of VoIP Traffic under Blackhole Attacks on MANET (블랙홀 공격이 있는 MANET에서 VoIP 트래픽의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.637-640
    • /
    • 2011
  • Recently, rapid spreading of smart-phone make an expectation for increase of practical application for MANET(Mobile Ad-Hoc Network) which is not used infrastructure like as base-station. One of important application for MANET will be VoIP(Voice over Internet Protocol) known as Internet telephony. On the other hand, information intrusions causing serious problems is not allowed exception of MANET. Especially, there are some dangerous problems of intrusions to MANET, differently to other networks, because of it's usage of military purpose or emergency application of rescue. In this paper, to analyze this intrusion problem on MANET with blackhohe attacks, effect of intrusion to transmission performance is studied. VoIP traffic is assumed as an application service on MANET, computer simulation with NS-2 is used for this analysis.

  • PDF

Transmission Performance of Large Scale MANETs with IDS (IDS가 있는 대규모 MANET의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.642-645
    • /
    • 2012
  • MANET has disadvantage for information intrusion caused from non-infra structure. That is based on mixed problems caused from terminal devices has no capability of various resources using abilities to run intrusion prevention function, and also from difficulty of no easy using infra structural server like as firewall. In this paper, transmission performances, be effected from information intrusion and IDS(Intrusion Detection System), are analyzed for large scale MANET, and weakness from information intrusion of MANET are studied. This study is for large scale MANET which has some large communication area and lots of nodes, voice traffic, based on VoIP protocols, is considered as application services be transmitted over MANETs. Computer simulation using NS-2 is used to measure and show MOS and call connection ratios.

  • PDF