skip to main content
10.1145/2659651.2659694acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

Analysis of Identity Forging Attack in MANETs

Authors Info & Claims
Published:09 September 2014Publication History

ABSTRACT

In Mobile Ad-Hoc Networks (MANETs) source and destination generally needs multihops to transfer data packets. Hence the number of nodes from source to destination increases. This property has render it vulnerable to attacks. We use the identity forging property of Sybil attack to propose an attack named "Identity Forging". In this attack, an attacker impersonates fake identity to affect the performance of network by sending the control packets through the identity of fabricated node and itself remaining silent. This makes it immune to the basic detection techniques of Sybil attack where both the attacker and its fake identity work simultaneously and thus can be detected if heard together for long period. The attacker also keeps changing the fabricated identity every time the link fails. Two different variations of this attack has been presented with their analysis and their impact on the performance of MANETs. In the end a possible detection algorithm for the attack has been proposed.

References

  1. M. Abdelhaq, R. Hassan, M. Ismail, R. Alsaqour, and D. Israf. Detecting sleep deprivation attack over manet using a danger theory-based algorithm. International Journal of New Computer Architectures and their Applications (IJNCAA), 1(3):534--541, 2011.Google ScholarGoogle Scholar
  2. S. Ci, M. Guizani, H.-H. Chen, and H. Sharif. Self-regulating network utilization in mobile ad hoc wireless networks. Vehicular Technology, IEEE Transactions on, 55(4):1302--1310, 2006.Google ScholarGoogle Scholar
  3. J. R. Douceur. The sybil attack. In Peer-to-peer Systems, pages 251--260. Springer, 2002. Google ScholarGoogle ScholarCross RefCross Ref
  4. S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking, pages 255--265. ACM, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Newsome, E. Shi, D. Song, and A. Perrig. The sybil attack in sensor networks: analysis & defenses. In Proceedings of the 3rd international symposium on Information processing in sensor networks, pages 259--268. ACM, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. H. L. Nguyen and U. T. Nguyen. A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks, 6(1):32--46, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. E. Perkins and E. M. Royer. Ad-hoc on-demand distance vector routing. In Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA'99. Second IEEE Workshop on, pages 90--100. IEEE, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. SCALABLE NETWORK TECHNOLOGIES. http://www.scalable-networks.com/content/products/exata.Google ScholarGoogle Scholar
  9. H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang. Security in mobile ad hoc networks: challenges and solutions. Wireless Communications, IEEE, 11(1):38--47, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Y. Zhang, W. Lee, and Y.-A. Huang. Intrusion detection techniques for mobile wireless networks. Wireless Networks, 9(5):545--556, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Analysis of Identity Forging Attack in MANETs

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        SIN '14: Proceedings of the 7th International Conference on Security of Information and Networks
        September 2014
        518 pages
        ISBN:9781450330336
        DOI:10.1145/2659651

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 9 September 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        SIN '14 Paper Acceptance Rate32of109submissions,29%Overall Acceptance Rate102of289submissions,35%
      • Article Metrics

        • Downloads (Last 12 months)2
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader