Inherent Robustness of Reactive Routing Protocols against Selfish Attacks

نویسندگان

  • Asad Amir Pirzada
  • Chris McDonald
چکیده

Mobile ad-hoc wireless networks generally comprise nodes having meagre computation and communication resources. To perform multi-hop communication in a dynamic topology, these nodes execute special routing protocols. Each node performs the function of a a mobile router and directs packets to other nodes in the network. For accurate functioning of the network it is imperative that all nodes execute these routing protocols in a benevolent manner. However, as ad-hoc networks are usually established in a physically insecure wireless environment, the network memberships are violated allowing malicious nodes to also participate in the network. These nodes can launch an array of attacks against different network services including the routing process. In this paper, we evaluate the performance of three well known reactive routing protocols, in a network with varying numbers of malicious nodes. With the help of exhaustive simulations, we demonstrate that the performance of the three protocols varies significantly even under similar attack, traffic and mobility conditions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

AODV & SAODV under Attack: Performance Comparison

AODV is a reactive MANET routing protocol that does not support security of routing messages. SAODV is an extension of the AODV routing protocol that is designed to fulfil security features of the routing messages. In this paper, we study the performance of both AODV and SAODV routing protocols under the presence of blackhole, grayhole, selfish and flooding attacks. We conclude that the perform...

متن کامل

AODV Routing Protocol Performance Analysis under MANET Attacks

AODV is a well-known reactive protocol designed for MANET routing. All MANET routing protocols are designed based on the assumption that all nodes cooperate without maliciously disrupting the operation of the routing protocol. In this paper, we study the performance of AODV routing protocol in the presence of some of the well-defined attacks in MANET. We use NS-2 network simulator to analyse th...

متن کامل

Effect of Selfish Attack and Prevention Scheme on TCP and UDP in MANET

Mobile Ad-hoc networks are a collection of mobile hosts that communicate with each other without any infrastructure and centralized administration. Due to security vulnerabilities of the routing protocols, Mobile ad hoc networks may be unprotected against attacks by the malicious nodes. One of these attacks is the Selfish Attack against network integrity absorbing all routing packets as well as...

متن کامل

Simple Techniques for Enhancing the Robustness of DSR

The Dynamic Source Routing protocol for ad hoc networks is one of the leading candidates for adoption by the IETF amongst the class of reactive routing protocols. The currently defined protocol assumes total node cooperation, which allows attacks by failed or malicious nodes whose behaviour violates the protocol rules. Failed nodes will typically fail to forward information; badly failed nodes ...

متن کامل

Routing Security in Mobile Ad-hoc Networks

The role of infrastructure-less mobile ad hoc networks (MANETs) in ubiquitous networks is outlined. In a MANET there are no dedicated routers and all network nodes must contribute to routing. Classification of routing protocols for MANET is based on how routing information is acquired and maintained by mobile nodes and/or on roles of network nodes in a routing. According to the first classifica...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005