Abstract
Security and vulnerabilities in wireless ad hoc networks have been considered at different layers, and many attack strategies have been proposed, including denial of service (DoS) through the intelligent jamming of the most critical packet types of flows in a network. This paper investigates the effectiveness of intelligent jamming in wireless ad hoc networks using the Dynamic Source Routing (DSR) and TCP protocols and introduces an intelligent classifier to facilitate the jamming of such networks. Assuming encrypted packet headers and contents, our classifier is based solely on the observable characteristics of size, inter-arrival timing, and direction and classifies packets with up to 99.4% accuracy in our experiments. Furthermore, we investigate active analysis, which is the combination of a classifier and intelligent jammer to invoke specific responses from a victim network.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Brown, T.X., James, J.E., Sethi, A.: Jamming and sensing of encrypted wireless ad hoc networks. In: MobiHoc 2006: Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing, pp. 120–130. ACM, New York (2006)
Dempsey, T., Sahin, G., Jade Morton, Y.T.: Intelligent sensing and classification in DSR-Based ad hoc networks. IEICE Transactions on Information and Systems, special section on Information and Communication System Security E92-D(5), 818–825 (2009)
James, J.E.: Intelligent sensing of encrypted packets in wireless networks. Master’s thesis, University of Colorado (2005)
Johnson, D.B., Maltz, D.A.: Dynamic source routing in ad hoc wireless networks. In: Mobile Computing, pp. 153–181. Kluwer Academic Publishers, Dordrecht (1996)
Lomb, N.R.: Least-squares frequency analysis of unequally spaced data. Astrophysics and Space Science, 447–462 (1976)
The Network Simulator ns-2 (October 2001), http://www.isi.edu/nsnam/ns/
Partridge, C., Cousins, D., Jackson, A.W., Krishnan, R., Saxena, T., Timothy Strayer, W.: Using signal processing to analyze wireless data traffic. In: WiSE 2002: Proceedings of the 1st ACM workshop on Wireless security, pp. 67–76. ACM, New York (2002)
Wright, C., Monrose, F., Masson, G.M.: Hmm profiles for network traffic classification. In: VizSEC/DMSEC 2004: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, pp. 9–15. ACM, New York (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Dempsey, T., Sahin, G., Morton, Y.T.(. (2010). Passive and Active Analysis in DSR-Based Ad Hoc Networks. In: Zheng, J., Mao, S., Midkiff, S.F., Zhu, H. (eds) Ad Hoc Networks. ADHOCNETS 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 28. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11723-7_42
Download citation
DOI: https://doi.org/10.1007/978-3-642-11723-7_42
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11722-0
Online ISBN: 978-3-642-11723-7
eBook Packages: Computer ScienceComputer Science (R0)