Skip to main content

Passive and Active Analysis in DSR-Based Ad Hoc Networks

  • Conference paper
  • 971 Accesses

Abstract

Security and vulnerabilities in wireless ad hoc networks have been considered at different layers, and many attack strategies have been proposed, including denial of service (DoS) through the intelligent jamming of the most critical packet types of flows in a network. This paper investigates the effectiveness of intelligent jamming in wireless ad hoc networks using the Dynamic Source Routing (DSR) and TCP protocols and introduces an intelligent classifier to facilitate the jamming of such networks. Assuming encrypted packet headers and contents, our classifier is based solely on the observable characteristics of size, inter-arrival timing, and direction and classifies packets with up to 99.4% accuracy in our experiments. Furthermore, we investigate active analysis, which is the combination of a classifier and intelligent jammer to invoke specific responses from a victim network.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brown, T.X., James, J.E., Sethi, A.: Jamming and sensing of encrypted wireless ad hoc networks. In: MobiHoc 2006: Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing, pp. 120–130. ACM, New York (2006)

    Google Scholar 

  2. Dempsey, T., Sahin, G., Jade Morton, Y.T.: Intelligent sensing and classification in DSR-Based ad hoc networks. IEICE Transactions on Information and Systems, special section on Information and Communication System Security E92-D(5), 818–825 (2009)

    Article  Google Scholar 

  3. James, J.E.: Intelligent sensing of encrypted packets in wireless networks. Master’s thesis, University of Colorado (2005)

    Google Scholar 

  4. Johnson, D.B., Maltz, D.A.: Dynamic source routing in ad hoc wireless networks. In: Mobile Computing, pp. 153–181. Kluwer Academic Publishers, Dordrecht (1996)

    Chapter  Google Scholar 

  5. Lomb, N.R.: Least-squares frequency analysis of unequally spaced data. Astrophysics and Space Science, 447–462 (1976)

    Google Scholar 

  6. The Network Simulator ns-2 (October 2001), http://www.isi.edu/nsnam/ns/

  7. Partridge, C., Cousins, D., Jackson, A.W., Krishnan, R., Saxena, T., Timothy Strayer, W.: Using signal processing to analyze wireless data traffic. In: WiSE 2002: Proceedings of the 1st ACM workshop on Wireless security, pp. 67–76. ACM, New York (2002)

    Google Scholar 

  8. Wright, C., Monrose, F., Masson, G.M.: Hmm profiles for network traffic classification. In: VizSEC/DMSEC 2004: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, pp. 9–15. ACM, New York (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Dempsey, T., Sahin, G., Morton, Y.T.(. (2010). Passive and Active Analysis in DSR-Based Ad Hoc Networks. In: Zheng, J., Mao, S., Midkiff, S.F., Zhu, H. (eds) Ad Hoc Networks. ADHOCNETS 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 28. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11723-7_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11723-7_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11722-0

  • Online ISBN: 978-3-642-11723-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics