新的黑洞攻击下DSR协议的评估

M. Salehi, H. Samavati, M. Dehghan
{"title":"新的黑洞攻击下DSR协议的评估","authors":"M. Salehi, H. Samavati, M. Dehghan","doi":"10.1109/IRANIANCEE.2012.6292433","DOIUrl":null,"url":null,"abstract":"Black hole attack is a well-known attack under which performance and efficiency of mobile ad hoc networks decreases dramatically by malicious nodes. This attack affects functionality of network by dropping data packets. Black hole attack operates based upon two different phases; first, advertising fake routes containing attacker node. Second, dropping received data packets. When it comes to route advertisement phase, operation of this attack in reactive protocols can be classified into two categories. Advertising fake routes in response to route request (RREQ) packets, and advertising according to route reply (RREP) packets. In related works, Black hole attack has been evaluated and analyzed based on creating fake RREPs in response to received RREQ packets. In this paper, however, a novel more destructive attack named Deep Black hole is introduced and evaluated. This attack advertises fake RREPs more strongly than previous ones. Evaluation of network parameters has been performed related to DSR protocol in NS-2. Simulation results represent that Deep Black hole, compared to ordinary Black hole and selfish nodes, is more damaging and leads to network denial of service. This attack results in a decrease in the number of network routing packets and end-to-end delay especially compared to selfish nodes.","PeriodicalId":308726,"journal":{"name":"20th Iranian Conference on Electrical Engineering (ICEE2012)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Evaluation of DSR protocol under a new Black hole attack\",\"authors\":\"M. Salehi, H. Samavati, M. Dehghan\",\"doi\":\"10.1109/IRANIANCEE.2012.6292433\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Black hole attack is a well-known attack under which performance and efficiency of mobile ad hoc networks decreases dramatically by malicious nodes. This attack affects functionality of network by dropping data packets. Black hole attack operates based upon two different phases; first, advertising fake routes containing attacker node. Second, dropping received data packets. When it comes to route advertisement phase, operation of this attack in reactive protocols can be classified into two categories. Advertising fake routes in response to route request (RREQ) packets, and advertising according to route reply (RREP) packets. In related works, Black hole attack has been evaluated and analyzed based on creating fake RREPs in response to received RREQ packets. In this paper, however, a novel more destructive attack named Deep Black hole is introduced and evaluated. This attack advertises fake RREPs more strongly than previous ones. Evaluation of network parameters has been performed related to DSR protocol in NS-2. Simulation results represent that Deep Black hole, compared to ordinary Black hole and selfish nodes, is more damaging and leads to network denial of service. This attack results in a decrease in the number of network routing packets and end-to-end delay especially compared to selfish nodes.\",\"PeriodicalId\":308726,\"journal\":{\"name\":\"20th Iranian Conference on Electrical Engineering (ICEE2012)\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-05-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"20th Iranian Conference on Electrical Engineering (ICEE2012)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IRANIANCEE.2012.6292433\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"20th Iranian Conference on Electrical Engineering (ICEE2012)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IRANIANCEE.2012.6292433","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

摘要

黑洞攻击是一种众所周知的攻击,在这种攻击下,恶意节点会使移动自组网的性能和效率急剧下降。这种攻击通过丢弃数据包来影响网络的功能。黑洞攻击基于两个不同的阶段;首先,发布包含攻击者节点的假路由。第二,丢弃接收到的数据包。在路由发布阶段,这种攻击在响应式协议中的操作可以分为两类。根据RREQ (route request)报文发布假路由,根据RREP (route reply)报文发布。在相关工作中,通过对接收到的RREQ报文产生假rrep,对黑洞攻击进行了评估和分析。然而,本文介绍并评估了一种新的更具破坏性的攻击——深黑洞。这次攻击比以前更强烈地宣传虚假的rrep。在NS-2中进行了与DSR协议相关的网络参数评估。仿真结果表明,与普通黑洞和自私节点相比,深黑洞具有更大的破坏性,会导致网络拒绝服务。这种攻击导致网络路由数据包数量减少,端到端延迟减少,特别是与自私节点相比。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Evaluation of DSR protocol under a new Black hole attack
Black hole attack is a well-known attack under which performance and efficiency of mobile ad hoc networks decreases dramatically by malicious nodes. This attack affects functionality of network by dropping data packets. Black hole attack operates based upon two different phases; first, advertising fake routes containing attacker node. Second, dropping received data packets. When it comes to route advertisement phase, operation of this attack in reactive protocols can be classified into two categories. Advertising fake routes in response to route request (RREQ) packets, and advertising according to route reply (RREP) packets. In related works, Black hole attack has been evaluated and analyzed based on creating fake RREPs in response to received RREQ packets. In this paper, however, a novel more destructive attack named Deep Black hole is introduced and evaluated. This attack advertises fake RREPs more strongly than previous ones. Evaluation of network parameters has been performed related to DSR protocol in NS-2. Simulation results represent that Deep Black hole, compared to ordinary Black hole and selfish nodes, is more damaging and leads to network denial of service. This attack results in a decrease in the number of network routing packets and end-to-end delay especially compared to selfish nodes.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信