Dynamic Source Routing under Attacks

被引:0
作者
Abdelshafy, Mohamed A. [1 ]
King, Peter J. B. [1 ]
机构
[1] Heriot Watt Univ, Sch Math & Comp Sci, Edinburgh, Midlothian, Scotland
来源
2015 7TH INTERNATIONAL WORKSHOP ON RELIABLE NETWORKS DESIGN AND MODELING (RNDM) PROCE4EDINGS | 2015年
关键词
MANET; Routing; DSR; Flow-state; Security; Attack; Flooding; Grayhole; Blackhole; Selfish; PROTOCOLS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
MANET routing protocols are designed based on the assumption that all nodes cooperate without maliciously disrupting the operation of the routing protocol. A large number of attack types of varying severity are threatening MANET. Dynamic Source Routing (DSR) is a well-known reactive MANET routing protocol that does not support security of routing messages. In this paper, we study the performance of both DSR and its flow-state extension routing protocols in the presence of blackhole, grayhole, selfish and flooding attacks. We conclude that the performance of flow-state DSR is better than DSR in the presence of all attacks. Flooding attacks are found to dramatically impact all the standard performance metrics. Blackhole attacks significantly worse the packet delivery ratio in a static network using unmodified DSR. All the attacks greatly increase the end-to-end delay; an effect particularly marked in a static network.
引用
收藏
页码:174 / 180
页数:7
相关论文
共 22 条
  • [1] Abdelshafy M. A., 2014, 8 INT C EM SEC INF S, P14
  • [2] Abdelshafy MA, 2013, INT CONF INTERNET, P290, DOI 10.1109/ICIST.2013.6747558
  • [3] Abdelshafy MA, 2014, LECT NOTES COMPUT SC, V8487, P318
  • [4] [Anonymous], 2002, ACM SIGMOBILE Mob. Comput. Commun. Rev, DOI DOI 10.1145/581291.581312
  • [5] [Anonymous], J AD HOC NETWORKING
  • [6] [Anonymous], 1996, Mobile Computing
  • [7] Bandyopadhyay LK, 2010, WIRELESS COMMUNICATION IN UNDERGROUND MINES: RFID-BASED SENSOR NETWORKING, P1, DOI 10.1007/978-0-387-98165-9_1
  • [8] Routing protocols in ad hoc networks: A survey
    Boukerche, Azzedine
    Turgut, Begumhan
    Aydin, Nevin
    Ahmad, Mohammad Z.
    Boeloeni, Ladislau
    Turgut, Damla
    [J]. COMPUTER NETWORKS, 2011, 55 (13) : 3032 - 3080
  • [9] Goyal P., 2010, INT J COMPUTER APPL, V9, P11
  • [10] Hu Y.-C., 2001, P 2 ACM INT S MOB AD