Attacks and Defenses Utilizing Cross-Layer Interactions in MANET

نویسندگان

  • John S. Baras
  • Svetlana Radosavac
چکیده

Cross-layer protocol design is one of the prevailing methodologies that have recently been adopted in networking research and leads to significant performance benefits. In this study, we assess the performance of cross-layer interaction and investigate its effects with regard to security and information assurance of mobile ad hoc wireless networks. Using attacks in realistic wireless networks as a prototype, we find that natural cross-layer interactions between physical, MAC and network layer protocols in MANET can turn out to be a weak point, causing various attacks and intrusions. However, by allowing a controlled synergy between layers affected by attacks, we facilitate timely detection of such attacks that are otherwise difficult to detect and may have devastating effects on network functionality and operation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cluster Based Cross Layer Intelligent Service Discovery for Mobile Ad-Hoc Networks

The ability to discover services in Mobile Ad hoc Network (MANET) is a major prerequisite. Cluster basedcross layer intelligent service discovery for MANET (CBISD) is cluster based architecture, caching ofsemantic details of services and intelligent forwarding using network layer mechanisms. The cluster basedarchitecture using semantic knowledge provides scalability and accuracy. Also, the mini...

متن کامل

A Taxonomy of Physical Layer Attacks in MANET

In recent days, Mobile Adhoc Networks have emerged as a major next generation wireless network technology. The wireless and distributed nature of MANETs paves way for the intruder to degrade the functionality of MANET. MANETs are vulnerable to numerous attacks at all layers, because the design of most MANET routing protocols assumes as if there is no malicious intruder node in the network. MANE...

متن کامل

A secure cross-layer AODV routing method to detect and isolate (SCLARDI) black hole attacks for MANET

In this paper, a secure cross-layer–based routing technique (SCLARDI) for a mobile ad hoc network (MANET) is proposed. This technique makes use of ad hoc on-demand routing protocol (AODV) algorithms and honeypot technology to detect and isolate black hole attacks from MANETs. This novel system is compared with the single-layer design techniques and existing cross-layer detection techniques. Out...

متن کامل

Machine Learning Cross Layer Technique to Detect Sink Hole Attacks in MANET

Adhoc networks uses mobile nodes to communicate among itself in which it does not have any fixed infrastructure like access point or base station. Due to dynamic network topology MANET security is a challenging task. Most of the routing protocols in MANET assumes a cooperative environment for communication. But, in the presence of malicious nodes, providing security to MANET is critical issue. ...

متن کامل

Protocol Architecture for Mobile Ad-Hoc Networks using Directional Antennas

Recently in Mobile Ad Hoc Networks, there has been increased interest in protocols for wireless networks that rely on significant interactions between various layers (Cross Layer Design) of the network stack. In this paper we study on various Cross Layer Design Approaches and their significance in MANET with an insight into the problems of Cross Layer design mode. Furthermore we propose a proto...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005