A study of different types of attacks on multicast in mobile ad hoc networks

被引:42
作者
Nguyen, Hoang Lan [1 ]
Nguyen, Uyen Trang [1 ]
机构
[1] York Univ, Dept Comp Sci & Engn, Toronto, ON M3J 1P3, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Multicast; Attack strategies; Security threats; Vulnerability analysis; Performance analysis;
D O I
10.1016/j.adhoc.2006.07.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a simulation-based study of the impacts of different types of attacks on mesh-based multicast in mobile ad hoc networks (MANETs). We consider the most common types of attacks, namely rushing attack, blackhole attack, neighbor attack and jellyfish attack. Specifically, we study how the number of attackers and their positions affect the performance metrics of a multicast session such as packet delivery ratio, throughput, end-to-end delay, and delay jitter. We also examine rushing attackers' success rates of invading into the routing mesh when the number of attackers and their positions vary. The results enable us to suggest measures to minimize the impacts of the above types of attacks on multicast in MANETs. (C) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:32 / 46
页数:15
相关论文
共 25 条
[1]  
AAD I, 2004, P ACM MOBICOM 2004 P
[2]  
[Anonymous], QUALNET SIMULATOR
[3]  
AWERBUCH B, 2002, P ACM WISE 2002 ATL
[4]  
Awerbuch B., 2004, Mitigating byzantine attacks in adhoc wireless networks
[5]  
CHIANG CC, 1998, CLUSTER COMPUT, V1, P187, DOI DOI 10.1023/A:1019037500012
[6]  
DAS SK, 2002, P 3 ACM INT S MOB AD, P24
[7]   The core-assisted mesh protocol [J].
Garcia-Luna-Aceves, JJ ;
Madruga, EL .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1999, 17 (08) :1380-1394
[8]  
GUPTA V, P IEEE MILCOM 02
[9]  
HU YC, 2002, P ACM MOBICOM 2002 A
[10]  
HU YC, 2002, P IEEE WMCSA 02 JUN