期刊文献+

Effects of Denial of Service Attack in Mobile Ad Hoc Networks 被引量:1

Effects of Denial of Service Attack in Mobile Ad Hoc Networks
原文传递
导出
摘要 Mobile ad hoc networks are often deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised aodes or intruders. In this paper, we investigated the effects of flooding attacks in network simulation 2 (NS-2) and measured the packet delivery ratio and packet delay under different flooding frequencies and different numbers of attack nodes. Simulation results show that with the increase the flooding frequencies and the numbers of attack nodes, network performance drops. But when the frequency of flooding attacks is greater than a value, the performance decrease gets smooth. Meanwhile the packet delay firstly increases and then declines to a value of stability at the end. Mobile ad hoc networks are often deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering.The nodes of mobile ad hoc networks are thus susceptible to compromise.The networks are particularly vulnerable to denial of service(DoS) attacks launched through compromised nodes or intruders.In this paper,we investigated the effects of flooding attacks in network simulation 2(NS-2) and measured the packet delivery ratio and packet delay under different flooding frequencies and different numbers of attack nodes.Simulation results show that with the increase the flooding frequencies and the numbers of attack nodes,network performance drops.But when the frequency of flooding attacks is greater than a value,the performance decrease gets smooth.Meanwhile the packet delay firstly increases and then declines to a value of stability at the end.
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第5期580-583,共4页 上海交通大学学报(英文版)
基金 the Shanghai Municipal Natural Science Foundation (No.09ZR1414900) the National High Technology Research and Development Program (863) of China (Nos.2006AA01Z436,2007AA01Z452 and 2009AA01Z118)
关键词 mobile ad hoc networks SECURITY routing protocol denial-of-service attack 拒绝服务攻击 Hoc网络 移动Ad hoc网络 网络节点 洪水频率 移动ad 网络性能
  • 相关文献

参考文献7

  • 1Yi Ping,Zou Futai,Jiang Xinghao,Li Jianhua.Multi-agent cooperative intrusion response in mobile adhoc networks[J].Journal of Systems Engineering and Electronics,2007,18(4):785-794. 被引量:6
  • 2Yi Ping,,Dai Zhou-lin,Zhong Yi-ping,et al.Resisting flooding attacks in ad hoc networks[].Proceedings of International Conference on Information Technol-ogy:Coding and Computing(ITCC).2005
  • 3Guo Ying-hua,Perreau S.Trace flooding attack in mobile ad hoc networks[].Proceedings ofrd In-ternational Conference on Intelligent SensorsSensor Networks and Information(ISSNIP).2007
  • 4Guo Ying-hua,Gordon S,Perreau S.A flow based detection mechanism against flooding attacks in mo-bile ad hoc networks[].Proceedings ofIEEE Wireless Communications and Networking Conference(WCNC).2007
  • 5Xia Zheng-you,Wang Lang.DIMH:A novel model to detect and isolate malicious hosts for mobile ad hoc network[].Computers and Standards.2006
  • 6.Mobile Ad hoc networking(MANET):routing protocol performance issues and evaluation considerations[].RFC.
  • 7S. Desilva,R.V. Boppana.Mitigating Malicious Control Packet Floods in Ad Hoc Networks[].Proceedings of IEEE Wireless Communications and Networking Conference(WCNC).2005

二级参考文献3

共引文献5

同被引文献10

  • 1袁培燕,李腊元,袁秋林.NS2错误模型的改进[J].计算机工程与设计,2007,28(3):569-571. 被引量:2
  • 2尤曾录.战术互联网[M].北京:解放军出版社,2010.
  • 3SATRIA M,KOMMINENI J. Quantifying the severity ofblackhole attack in wireless mobile adhoc networks[C]//Second International Symposium(SSCC). Berlin Heidelberg:Springer-Verlag,2014,467:57-67.
  • 4GUNHEE L,WONIL K,KANGSEOK K,et al. An approachto mitigate DoS a ttack based on routing misbehavior inwireless ad hoc networks[J].Peer-to-Peer Networking andApplications,2013(8):684-693.
  • 5MOHANAPRIYA M,KRISHNAMURTHI I. Trust basedDSR routing protocol for mitigating cooperative black holeattacks in ad hoc networks[J].Arabian Journal for Scienceand Engineering,2013,39(3):1825-1833.
  • 6NOUBIR G. On connectivity in ad hoc networks under jammingusing directional antennas and mobility[C]// InternationalConference on Wired/Wireless Internet Communications.LNCS 2957,Berlin,Heidelberg: Springer-Verlag,2004.521-532.
  • 7XU S G,SAADAWI T. Dose IEEE 802.11 MAC protocolwork well in multihop wireless ad hoc networks [J]. IEEECommunications Magazine,2001,39(6):130-137.
  • 8PAUL S. Communications networks for the Force XXI digitizedbattlefield [J]. Mobile Networks and Applications,1999(4):139-155.
  • 9SHU J,GAO M,SUN L M. A study of group mobility modelin tactical ad hoc network based on normal cloud model[C]//2012 Second International Conference on Instrumentation &Measurement,Computer,Communication and Control(IMCCC),IEEE Computer Society,2012:751-756.
  • 10阎瑾.美军战术互联网体系架构研究[J].通信技术,2011,44(9):105-107. 被引量:37

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部