A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

نویسندگان

  • Abolfazl Toroghi Haghighat Faculty of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University, Qazvin, Iran
  • Maryam Fathi Ahmadsaraei Faculty of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University, Qazvin, Iran
چکیده مقاله:

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand distance vector routing protocol with NS-2 simulation. Then we review all kinds of intrusion detection systems (IDS) in large and small mobile ad hoc networks. We simulate these networks when they are under single black hole attack and with the existence of IDS byNS-2 simulator software. Finally, we compared the results according to throughput, packet loss ratio and packet delivery rate with each other.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

a survey of solutions to protect against all types of attacks in mobile ad hoc networks

in recent years mobile networks have expanded dramatically, compared with other wireless networks. routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. in this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

a new intrusion detection system to deal with black hole attacks in mobile ad hoc networks

by extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. security is a serious challenge for actual implementation in wireless networks. due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

Defending against wormhole attacks in mobile ad hoc networks

In ad hoc networks, malicious nodes can carry wormhole attacks to fabricate a false scenario on neighbor relations among mobile nodes. The attacks threaten the safety of ad hoc routing protocols and some security enhancements. We propose a classification of the attacks according to the format of the wormholes. It establishes a basis on which the detection capability of the approaches can be ide...

متن کامل

Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks

We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disruption Denial-of-Service (DoS) attacks. Unlike many existing solutions, TUF does not focus on a particular type of attack, but instead takes an approach that is fundamentally more general. TUF is a cross-layer technique tha...

متن کامل

Attacks against Mobile Ad Hoc Networks Routing Protocols

This paper outlines some important issues that relate to security attacks against mobile ad hoc networks from research carried out at Network Research Group, University of Plymouth, on designing intrusion detection system for mobile ad hoc network. In designing security mechanisms for mobile ad hoc networks, one must consider the attacks variations as well as the characteristics of the attacks ...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ذخیره در منابع من قبلا به منابع من ذحیره شده

{@ msg_add @}


عنوان ژورنال

دوره 8  شماره 2

صفحات  25- 32

تاریخ انتشار 2015-03-01

با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023