Attacks and Defenses Utilizing Cross-Layer Interactions in MANET
نویسندگان
چکیده
Cross-layer protocol design is one of the prevailing methodologies that have recently been adopted in networking research and leads to significant performance benefits. In this study, we assess the performance of cross-layer interaction and investigate its effects with regard to security and information assurance of mobile ad hoc wireless networks. Using attacks in realistic wireless networks as a prototype, we find that natural cross-layer interactions between physical, MAC and network layer protocols in MANET can turn out to be a weak point, causing various attacks and intrusions. However, by allowing a controlled synergy between layers affected by attacks, we facilitate timely detection of such attacks that are otherwise difficult to detect and may have devastating effects on network functionality and operation.
منابع مشابه
Cluster Based Cross Layer Intelligent Service Discovery for Mobile Ad-Hoc Networks
The ability to discover services in Mobile Ad hoc Network (MANET) is a major prerequisite. Cluster basedcross layer intelligent service discovery for MANET (CBISD) is cluster based architecture, caching ofsemantic details of services and intelligent forwarding using network layer mechanisms. The cluster basedarchitecture using semantic knowledge provides scalability and accuracy. Also, the mini...
متن کاملA Taxonomy of Physical Layer Attacks in MANET
In recent days, Mobile Adhoc Networks have emerged as a major next generation wireless network technology. The wireless and distributed nature of MANETs paves way for the intruder to degrade the functionality of MANET. MANETs are vulnerable to numerous attacks at all layers, because the design of most MANET routing protocols assumes as if there is no malicious intruder node in the network. MANE...
متن کاملA secure cross-layer AODV routing method to detect and isolate (SCLARDI) black hole attacks for MANET
In this paper, a secure cross-layer–based routing technique (SCLARDI) for a mobile ad hoc network (MANET) is proposed. This technique makes use of ad hoc on-demand routing protocol (AODV) algorithms and honeypot technology to detect and isolate black hole attacks from MANETs. This novel system is compared with the single-layer design techniques and existing cross-layer detection techniques. Out...
متن کاملMachine Learning Cross Layer Technique to Detect Sink Hole Attacks in MANET
Adhoc networks uses mobile nodes to communicate among itself in which it does not have any fixed infrastructure like access point or base station. Due to dynamic network topology MANET security is a challenging task. Most of the routing protocols in MANET assumes a cooperative environment for communication. But, in the presence of malicious nodes, providing security to MANET is critical issue. ...
متن کاملProtocol Architecture for Mobile Ad-Hoc Networks using Directional Antennas
Recently in Mobile Ad Hoc Networks, there has been increased interest in protocols for wireless networks that rely on significant interactions between various layers (Cross Layer Design) of the network stack. In this paper we study on various Cross Layer Design Approaches and their significance in MANET with an insight into the problems of Cross Layer design mode. Furthermore we propose a proto...
متن کامل