Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation

نویسندگان

چکیده

Mobile ad hoc networks (MANETs) are being used more and in a variety of fields, including the environment, energy efficiency, smart transportation, intelligent agriculture, Internet Things (IoT) ecosystems. They also anticipated to play an increasingly significant role future due strong evolution wireless technology recent years. Nevertheless, this inter-node communication is vulnerable various security attacks such as Man–In-The-Middle (MITM) attacks, which considered be main challenge MANETs. This happens when harmful node intercepts data shared by legal nodes. Therefore, goal work investigate impact attackers’ strategies execute MITM assaults MANETs, message-delayed message-dropped assaults. The output shows that these have severe on entities MANETs network experiences high number compromised messages well E2ED PLD. Finally, using symmetry or asymmetry cryptographies, our proposal will avoid intercept between

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

Interlayer Attacks in Mobile Ad Hoc Networks

In this paper, we demonstrate a new class of protocol-compliant exploits that initiates at the MAC layer but targets ad hoc on-demand routing mechanisms. A misbehaved node implementing this type of attacks completely follows the specifications of IEEE802.11 standard and the existing on-demand routing protocols. However, it can cause routing shortcut attacks or detour attacks. We detail the expl...

متن کامل

Routing Attacks in Mobile Ad Hoc Networks

Mobile ad hoc networks (MANETs) are a set of mobile nodes which are self-configuring and connected by wireless links automatically as per the defined routing protocol. These nodes communicate with each other by exchange of packets, which for those nodes not in wireless range goes hop by hop. Unique characteristics, such as dynamic network topology, limited bandwidth, and limited power, nodes ru...

متن کامل

Significance of Mobile AD-HOC Networks (MANETS)

Wireless networks use radio frequencies in air to transmit and receive data instead of using some physical cables. Wireless networks are formed of routers and hosts. In a wireless network, the routers are responsible for forwarding packets in the network and hosts may be sources or sinks of data flows .The fundamental difference between wired and wireless networks is the that the networks compo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Symmetry

سال: 2022

ISSN: ['0865-4824', '2226-1877']

DOI: https://doi.org/10.3390/sym14081543