Evaluation der Auswirkungen verschiedener Angriffstypen in mobilen Ad-hoc-Netzen

Abstract

The Bachelor thesis "Evaluation of impact of different types of attack in mobile Ad-hoc-Networks" evaluates the impact of different types of attack on the performance of mobile ad hoc networks (MANETs). Additionally an optimization of the performed impact caused by the different types of attack is to be achieved. On one hand this means increasing the performed damage and on the other hand achieving a more efficient usage as well as trying to attract as little attention as possible from an Intrusion Detection System (IDS) directed towards the attacker. The thesis is divided into several parts. The first part deals with the necessary basics of MANETs, routing protocols and the introduction of the different types of attack (used strategies and important implementation details). The used simulation platform is JiST/MobNet which currently supports the black hole, dropping, flooding, disruption, replay, rushing, and wormhole attacks. In the second part metrics for measuring the performance of MANETs are chosen. These metrics are suitable for use in MANETs, are capable of measuring the impact caused by attackers and can be used with JiST/MobNet. The following metrics were chosen for this thesis: Routing Overhead, Route Length per Packet, One-Way-Delay, Packet Delivery Ratio, Packet Loss Ratio, Queue Length and Application Layer Achievable Bandwidth. The third part deals with the optimization of parameters for the different types of attack. The primary goal is to increase the performed damage. The secondary goal is to increase the efficiency as well as trying to avoid detection by an IDS. The results of this thesis show that an optimization of the performed impact as well as an increased efficiency and a far better chance of avoiding detection by an IDS were achieved. Especially the black hole attack reduces the amount of correctly sent data packages (application layer of the ISO-OSI model) by approximately 60 percent. The results obtained can be used by attackers as well as by people running a MANET. These can decide if the worst case damage is high enough to justify the cost of implementing counteractive measures

Similar works

Full text

thumbnail-image

Fraunhofer-ePrints

Full text is not available
oai:fraunhofer.de:N-88472Last time updated on 11/15/2016

This paper was published in Fraunhofer-ePrints.

Having an issue?

Is data on this page outdated, violates copyrights or anything else? Report the problem now and we will take corresponding actions after reviewing your request.