Impact of Security Attacks on a New Security Protocol for Mobile Ad Hoc Networks

نویسندگان

  • Kuncha Sahadevaiah
  • P. V. G. D. Prasad Reddy
چکیده

A mobile ad hoc network (MANET) is a self-organized wireless short-lived network consisting of mobile nodes. The mobile nodes communicate with one another by wireless radio links without the use of any pre-established fixed communication network infrastructure. The mobile nodes are vulnerable to different types of security attacks that allow interception, injection, and interference of communication among nodes. Possible damages include leaking secret information, message contamination and node impersonation. MANETs need secure routing protocols to prevent possible security attacks. In this paper, we evaluate the performance of a new security protocol against various known and unknown malicious node attacks. Simulation results have shown that the proposed security protocol resists against malicious nodes with low implementation complexity.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Security in Wireless Ad Hoc Networks

An ad hoc network is a collection of wireless nodes that dynamically form a temporary network and operates without the use of existing network infrastructure. In the near future, many personal electronic devices will be able to communicate with each other over a short-range wireless channel. We investigate the principal security issues for such an environment. The traditional way of protecting ...

متن کامل

Security Enhancements of AODV Protocol: A Comparative Study

Ad hoc networks are a new-fangled wireless networking paradigm for mobile nodes. Unlike traditional wireless networks, ad-hoc networks do not rely on any fixed infrastructure. Instead, the mobile nodes rely on each other to share the information. The main dispute in designing these networks is their susceptibility to security attacks. The increase in number of applications of ad-hoc networks de...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Network Protocols & Algorithms

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2011