ABSTRACT
In Mobile Ad-Hoc Networks (MANETs) source and destination generally needs multihops to transfer data packets. Hence the number of nodes from source to destination increases. This property has render it vulnerable to attacks. We use the identity forging property of Sybil attack to propose an attack named "Identity Forging". In this attack, an attacker impersonates fake identity to affect the performance of network by sending the control packets through the identity of fabricated node and itself remaining silent. This makes it immune to the basic detection techniques of Sybil attack where both the attacker and its fake identity work simultaneously and thus can be detected if heard together for long period. The attacker also keeps changing the fabricated identity every time the link fails. Two different variations of this attack has been presented with their analysis and their impact on the performance of MANETs. In the end a possible detection algorithm for the attack has been proposed.
- M. Abdelhaq, R. Hassan, M. Ismail, R. Alsaqour, and D. Israf. Detecting sleep deprivation attack over manet using a danger theory-based algorithm. International Journal of New Computer Architectures and their Applications (IJNCAA), 1(3):534--541, 2011.Google Scholar
- S. Ci, M. Guizani, H.-H. Chen, and H. Sharif. Self-regulating network utilization in mobile ad hoc wireless networks. Vehicular Technology, IEEE Transactions on, 55(4):1302--1310, 2006.Google Scholar
- J. R. Douceur. The sybil attack. In Peer-to-peer Systems, pages 251--260. Springer, 2002. Google ScholarCross Ref
- S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking, pages 255--265. ACM, 2000. Google ScholarDigital Library
- J. Newsome, E. Shi, D. Song, and A. Perrig. The sybil attack in sensor networks: analysis & defenses. In Proceedings of the 3rd international symposium on Information processing in sensor networks, pages 259--268. ACM, 2004. Google ScholarDigital Library
- H. L. Nguyen and U. T. Nguyen. A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks, 6(1):32--46, 2008. Google ScholarDigital Library
- C. E. Perkins and E. M. Royer. Ad-hoc on-demand distance vector routing. In Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA'99. Second IEEE Workshop on, pages 90--100. IEEE, 1999. Google ScholarDigital Library
- SCALABLE NETWORK TECHNOLOGIES. http://www.scalable-networks.com/content/products/exata.Google Scholar
- H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang. Security in mobile ad hoc networks: challenges and solutions. Wireless Communications, IEEE, 11(1):38--47, 2004. Google ScholarDigital Library
- Y. Zhang, W. Lee, and Y.-A. Huang. Intrusion detection techniques for mobile wireless networks. Wireless Networks, 9(5):545--556, 2003. Google ScholarDigital Library
Index Terms
- Analysis of Identity Forging Attack in MANETs
Recommendations
Exploring optimised route selection strategy in tree- and mesh-based multicast routing in MANETs
Mobile ad hoc networks are collections of mobile nodes with dynamism forming a momentary network, with no pre-existing network infrastructure or centralised administration. Disaster relief, education and armed forces are widespread situations where ...
Research on Improved Route Repair Algorithm of AODV Protocol
ICEICE '12: Proceedings of the 2012 Second International Conference on Electric Information and Control Engineering - Volume 01An improved route repair algorithm based on AODV protocol is presented in this paper. By means of improving the overhearing mechanisms of Route Reply (RREP) messages and data packets, a node can adaptively create or update its forward routes to the ...
Simulation Based Comparative Study of Routing Protocols Under Wormhole Attack in Manet
A Mobile Ad hoc network (manet) has emerged as an autonomous, multi-hop, wireless and temporary type of network which works within the constraints like bandwidth, power and energy. Manet can be observed as an open type of network where nodes become a ...
Comments