通过分析影响各种攻击性能的因素,增强了manet中的普遍信任管理模型

Pandiyan Durairajan, T. Sasikala
{"title":"通过分析影响各种攻击性能的因素,增强了manet中的普遍信任管理模型","authors":"Pandiyan Durairajan, T. Sasikala","doi":"10.1109/INTERACT.2010.5706198","DOIUrl":null,"url":null,"abstract":"Mobile Ad Hoc Network (MANET) consists of a collection of wireless mobile hosts without the required intervention of any existing infrastructure or centralized access point such as base station. The dynamic topology of MANET allows nodes to join and leave the network at any point of time. Wireless MANET is particularly vulnerable due to its fundamental characteristics such as open medium, dynamic topology, distributed cooperation and constrained capability. In Mobile Ad Hoc Network (MANET), network traffics are redirected to a specific node or from the malicious node causing serious damage. And also it causes false identification of a good node as a bad one. This increases false alarms and as a result any further communication with that node or via that node is halted. It occurs due to lack of authentication and it grants provision for any node to corrupt other node's legitimate information. In this paper we compare and analysis the performance of various attacks with proposed attacks on different routing protocol in mobile ad hoc networks. Various types of scenarios are generated and each of the attacks is simulated on each of these, then their parameters like throughput, packet delivery ratio and delay will be compared The performance differentials are analyzed using varying pause time, constant nodes and dynamic topology. Based on the observations, we make valuable conclusions about which attacks induce more false alarm and impact on Mobile Ad Hoc Network.","PeriodicalId":201931,"journal":{"name":"INTERACT-2010","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Enhancing the pervasive trust management model in MANETs by analyzing the factors affecting performance of various attacks\",\"authors\":\"Pandiyan Durairajan, T. Sasikala\",\"doi\":\"10.1109/INTERACT.2010.5706198\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile Ad Hoc Network (MANET) consists of a collection of wireless mobile hosts without the required intervention of any existing infrastructure or centralized access point such as base station. The dynamic topology of MANET allows nodes to join and leave the network at any point of time. Wireless MANET is particularly vulnerable due to its fundamental characteristics such as open medium, dynamic topology, distributed cooperation and constrained capability. In Mobile Ad Hoc Network (MANET), network traffics are redirected to a specific node or from the malicious node causing serious damage. And also it causes false identification of a good node as a bad one. This increases false alarms and as a result any further communication with that node or via that node is halted. It occurs due to lack of authentication and it grants provision for any node to corrupt other node's legitimate information. In this paper we compare and analysis the performance of various attacks with proposed attacks on different routing protocol in mobile ad hoc networks. Various types of scenarios are generated and each of the attacks is simulated on each of these, then their parameters like throughput, packet delivery ratio and delay will be compared The performance differentials are analyzed using varying pause time, constant nodes and dynamic topology. Based on the observations, we make valuable conclusions about which attacks induce more false alarm and impact on Mobile Ad Hoc Network.\",\"PeriodicalId\":201931,\"journal\":{\"name\":\"INTERACT-2010\",\"volume\":\"48 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"INTERACT-2010\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INTERACT.2010.5706198\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"INTERACT-2010","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INTERACT.2010.5706198","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

移动自组织网络(MANET)由一组无线移动主机组成,无需任何现有基础设施或集中接入点(如基站)的干预。MANET的动态拓扑结构允许节点在任何时间点加入和离开网络。由于无线MANET具有开放介质、动态拓扑、分布式协作和约束能力等基本特性,因此它极易受到攻击。在移动自组网(MANET)中,网络流量被重定向到特定节点或从造成严重破坏的恶意节点。它还会导致一个好节点和一个坏节点的错误识别。这增加了假警报,因此与该节点或通过该节点的任何进一步通信都将停止。它是由于缺乏身份验证而发生的,它为任何节点提供了破坏其他节点合法信息的准备。在本文中,我们比较和分析了在移动自组织网络中针对不同路由协议提出的各种攻击的性能。生成各种类型的场景,并在每种场景上模拟每种攻击,然后比较它们的参数,如吞吐量,数据包投递率和延迟,并使用不同的暂停时间,恒定节点和动态拓扑分析性能差异。基于观察,我们得出了有价值的结论,哪些攻击会导致更多的虚警和对移动自组网的影响。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Enhancing the pervasive trust management model in MANETs by analyzing the factors affecting performance of various attacks
Mobile Ad Hoc Network (MANET) consists of a collection of wireless mobile hosts without the required intervention of any existing infrastructure or centralized access point such as base station. The dynamic topology of MANET allows nodes to join and leave the network at any point of time. Wireless MANET is particularly vulnerable due to its fundamental characteristics such as open medium, dynamic topology, distributed cooperation and constrained capability. In Mobile Ad Hoc Network (MANET), network traffics are redirected to a specific node or from the malicious node causing serious damage. And also it causes false identification of a good node as a bad one. This increases false alarms and as a result any further communication with that node or via that node is halted. It occurs due to lack of authentication and it grants provision for any node to corrupt other node's legitimate information. In this paper we compare and analysis the performance of various attacks with proposed attacks on different routing protocol in mobile ad hoc networks. Various types of scenarios are generated and each of the attacks is simulated on each of these, then their parameters like throughput, packet delivery ratio and delay will be compared The performance differentials are analyzed using varying pause time, constant nodes and dynamic topology. Based on the observations, we make valuable conclusions about which attacks induce more false alarm and impact on Mobile Ad Hoc Network.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信