MIRA: Misleading Routing Attack in Mobile Ad-hoc Networks

被引:0
作者
Kandah, Farah [1 ]
Singh, Yashaswi [1 ]
Zhang, Weiyi [2 ]
Wang, Tie [3 ]
机构
[1] N Dakota State Univ, Dept Comp Sci, Fargo, ND 58105 USA
[2] AT&T Labs Res, Middletown, NJ 07748 USA
[3] Microsoft, San Jose, CA 95134 USA
来源
2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011) | 2011年
关键词
Mobile ad-hoc networks; adversary; malicious; misleading routing attack;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The growth of laptops, personal digital assistant (PDA) and 802.11/Wi-Fi wireless networking have made mobile ad-hoc network (MANET) a popular research topic recently. Due to the flexible deployment nature and the lack of fixed infrastructure, MANETs suffer from varieties of security attacks. In this paper, we propose the misleading routing attack (MIRA), which is different from the well known gray/black hole attacks, in which a node is relaying the coming packets and not dropping them. MIRA attack aims to delay the packet as much as possible so as to let the source node time out before it receives the acknowledgment. Also it aims to overload the network by increasing the number of unexpected routing packets generated in the network. Our simulation results show that the existence of an adversary in the network launching a misleading routing attack will degrade packet transmissions in the network and increasing the number of lost packets as well as the retransmissions at the sender.
引用
收藏
页数:5
相关论文
共 10 条
[1]  
Cagalj M., ACM MOBICOM 02 ATL G
[2]  
Cai J., AINA 2010, P775
[3]  
Gligor V., ESNS 2007
[4]  
Hai T. H., NCA 2008, P325
[5]  
Karlof C., SENSOR NETWORK PROTO, P113
[6]  
Khalil I., IEEE GLOBECOM 2010 M
[7]  
Lu S., CIS 2009, V2, P421
[8]  
Shila D.M., EIT 2008, P96
[9]  
Xiao S., INFOCOM 2010, P1
[10]  
Yu B., IPDPS 2006, P25