Local cover image
Local cover image
Image from Google Jackets

TCP/IP layerwise taxonomy of attacks and defence mechanisms in mobile ad Hoc networks

By: Contributor(s): Publication details: New York Springer 2022Edition: Vol.103(1), FebDescription: 273-291pSubject(s): Online resources: In: Journal of the institution of engineers (India): Series BSummary: Mobile Ad hoc NETwork (MANET) is a distributed architecture-less network having mobile nodes dynamically building up routes among themselves for transmission of packets. Security is the most crucial interest for its essential working. Due to its distinctive features including active network topology, lack of fixed/centralized authority, slower data transfer rate, a limited number of resources, bandwidth, and battery power, it is often attackable by malevolent nodes. Various types of attacks can affect network operations and make trans-reception untrustworthy. In order to obtain a more robust MANET operation through innovative design and development strategies, the study of severity of various attacks and their respective counter measures is necessary. This paper presents a detailed survey of TCP/IP layerwise attacks on MANET and the corresponding defence mechanisms. Further, a MANET scenario using a standard dynamic routing protocol Ad Hoc On-demand Distance Vector (AODV) is framed and tested under the routing disruption attacks viz. grayhole, blackhole, and cooperative blackhole. The attacks are simulated in the EXata environment to determine their prevalence over others in varying network scenarios. The comparative performance analysis is also carried out based on the measurements of the state-of-the-art evaluation metrics like Packet Delivery Ratio (PDR), end-to-end delay, throughput, jitter, and the number of data packets dropped by malicious nodes. The presented work brings uniqueness where it covers a wide variety of attacks, respective defence mechanisms, and a successful practical demonstration to validate the severity of selective dominant attacks all at one place which is not found in earlier literature.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Status Barcode
Articles Abstract Database Articles Abstract Database School of Engineering & Technology Archieval Section Not for loan 2022-1595
Total holds: 0

Mobile Ad hoc NETwork (MANET) is a distributed architecture-less network having mobile nodes dynamically building up routes among themselves for transmission of packets. Security is the most crucial interest for its essential working. Due to its distinctive features including active network topology, lack of fixed/centralized authority, slower data transfer rate, a limited number of resources, bandwidth, and battery power, it is often attackable by malevolent nodes. Various types of attacks can affect network operations and make trans-reception untrustworthy. In order to obtain a more robust MANET operation through innovative design and development strategies, the study of severity of various attacks and their respective counter measures is necessary. This paper presents a detailed survey of TCP/IP layerwise attacks on MANET and the corresponding defence mechanisms. Further, a MANET scenario using a standard dynamic routing protocol Ad Hoc On-demand Distance Vector (AODV) is framed and tested under the routing disruption attacks viz. grayhole, blackhole, and cooperative blackhole. The attacks are simulated in the EXata environment to determine their prevalence over others in varying network scenarios. The comparative performance analysis is also carried out based on the measurements of the state-of-the-art evaluation metrics like Packet Delivery Ratio (PDR), end-to-end delay, throughput, jitter, and the number of data packets dropped by malicious nodes. The presented work brings uniqueness where it covers a wide variety of attacks, respective defence mechanisms, and a successful practical demonstration to validate the severity of selective dominant attacks all at one place which is not found in earlier literature.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image
Share
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.