A study of different types of attacks on multicast in mobile ad hoc networks

被引:42
作者
Nguyen, Hoang Lan [1 ]
Nguyen, Uyen Trang [1 ]
机构
[1] York Univ, Dept Comp Sci & Engn, Toronto, ON M3J 1P3, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Multicast; Attack strategies; Security threats; Vulnerability analysis; Performance analysis;
D O I
10.1016/j.adhoc.2006.07.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a simulation-based study of the impacts of different types of attacks on mesh-based multicast in mobile ad hoc networks (MANETs). We consider the most common types of attacks, namely rushing attack, blackhole attack, neighbor attack and jellyfish attack. Specifically, we study how the number of attackers and their positions affect the performance metrics of a multicast session such as packet delivery ratio, throughput, end-to-end delay, and delay jitter. We also examine rushing attackers' success rates of invading into the routing mesh when the number of attackers and their positions vary. The results enable us to suggest measures to minimize the impacts of the above types of attacks on multicast in MANETs. (C) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:32 / 46
页数:15
相关论文
共 25 条
[11]  
HU YC, 2003, P ACM WISE 2003 SAN
[12]  
JETCHEVA JG, 2001, P ACM MOBIHOC 01 LON
[13]  
Johnson D. B., 1996, Mobile Comput., P153
[14]  
Lee S, 2000, MOBIHOC: 2000 FIRST ANNUAL WORKSHOP ON MOBILE AND AD HOC NETWORKING AND COMPUTING, P37, DOI 10.1109/MOBHOC.2000.869211
[15]   On-demand multicast routing protocol in multihop wireless mobile networks [J].
Lee, SJ ;
Su, W ;
Gerla, M .
MOBILE NETWORKS & APPLICATIONS, 2002, 7 (06) :441-453
[16]  
NING P, 2003, P 4 ANN IEEE INF ASS
[17]  
Ozaki T., 1999, Proceedings Eight International Conference on Computer Communications and Networks (Cat. No.99EX370), P10, DOI 10.1109/ICCCN.1999.805489
[18]  
PAPADIMITRATOS P, 2002, P CNDS 02 SAN ANT TX
[19]  
PERKINS CE, 1994, P ACM SIGCOMM 94 AUG
[20]  
PERKINS CE, 1999, P IEEE WMCA 99 NEW O