Solution to Prevent Rushing Attack in Wireless Mobile Ad hoc Networks

L. Tamilselvan, V. Sankaranarayanan
{"title":"Solution to Prevent Rushing Attack in Wireless Mobile Ad hoc Networks","authors":"L. Tamilselvan, V. Sankaranarayanan","doi":"10.1109/ISAHUC.2006.4290645","DOIUrl":null,"url":null,"abstract":"An ad hoc network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administration. Due to open medium, dynamic topology, distributed cooperation, constrained capabilities ad hoc networks are vulnerable to many types of security attacks, one such attack is rushing attack. It is a malicious attack that is directed against on demand routing protocols that uses duplicate suppression at each node. The attacker exploits this property in order to prevent communication between the important nodes in the network. To achieve this, it will try to be a part of the route that the source node uses to transmit data to the destination node. By capturing the route successfully, the attacker will disrupt the exchange of packets between the nodes, thus resulting in denial-of-service [1]. This paper focuses on the security of dynamic source routing (DSR) protocol in order to prevent the rushing attack. Based on the simulation study, it is observed that, the new protocol is successful in preventing the rushing attack and provides security even against the strongest rushing attackers with a negligible increase in the end-to-end delay. The new protocol not only enhances the security but also enhances the basic properties of DSR, so that throughput and packet delivery ratio is increased during data transmission.","PeriodicalId":165524,"journal":{"name":"2006 International Symposium on Ad Hoc and Ubiquitous Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"23","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 International Symposium on Ad Hoc and Ubiquitous Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISAHUC.2006.4290645","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 23

Abstract

An ad hoc network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administration. Due to open medium, dynamic topology, distributed cooperation, constrained capabilities ad hoc networks are vulnerable to many types of security attacks, one such attack is rushing attack. It is a malicious attack that is directed against on demand routing protocols that uses duplicate suppression at each node. The attacker exploits this property in order to prevent communication between the important nodes in the network. To achieve this, it will try to be a part of the route that the source node uses to transmit data to the destination node. By capturing the route successfully, the attacker will disrupt the exchange of packets between the nodes, thus resulting in denial-of-service [1]. This paper focuses on the security of dynamic source routing (DSR) protocol in order to prevent the rushing attack. Based on the simulation study, it is observed that, the new protocol is successful in preventing the rushing attack and provides security even against the strongest rushing attackers with a negligible increase in the end-to-end delay. The new protocol not only enhances the security but also enhances the basic properties of DSR, so that throughput and packet delivery ratio is increased during data transmission.
无线移动自组织网络中防止匆忙攻击的解决方案
自组织网络是动态形成临时网络的移动节点的集合,并且能够在不使用网络基础设施或任何集中管理的情况下相互通信。自组织网络由于具有开放介质、动态拓扑、分布式协作、约束能力等特点,容易受到多种类型的安全攻击,其中一种攻击就是快速攻击。这是一种针对按需路由协议的恶意攻击,该协议在每个节点上使用重复抑制。攻击者利用这一属性来阻止网络中重要节点之间的通信。为了实现这一点,它将尝试成为源节点用于将数据传输到目标节点的路由的一部分。通过成功捕获路由,攻击者将破坏节点之间的数据包交换,从而导致拒绝服务[1]。本文主要研究动态源路由(DSR)协议的安全性,以防止报文的匆忙攻击。通过仿真研究可以看出,新协议在端到端延迟的增加可以忽略不计的情况下,成功地防止了rush攻击,即使面对最强的rush攻击者也能提供安全性。新协议不仅提高了安全性,而且提高了DSR的基本性能,从而提高了数据传输过程中的吞吐量和包投递率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信