13 research outputs found

    Impact Analysis of Wormhole and Blackhole attacks over Mobile Ad Hoc Networks

    Get PDF
    In this paper, we will implement two attacks over mobile ad hoc networks known as Wormhole attack and Blackhole attack. We will also analyze the impact of these attacks on data communication when using a reactive routing protocol for data communication. The reactive routing protocol used is well known Ad-hoc On- demand Distance Vector (AODV) protocol. In the Wormhole attack, at least two malicious nodes i.e., attackers disseminates wrong network information to its neighbors during the routing table formation due to which these attacks become the intermediate nodes on the selected route and drop data packets during the communication process. These two attackers form a tunnel through which they can sent the control packets to each other and if one of them are is placed near the destination then they can make sure that they are being selected on the discovered path. Due to the wrong information spread by the malicious nodes the routing tables of its nearby nodes contains untrue information about routes to various or specific destinations. When this wrong information is used for data communication during the communication process the all the data packets will go to wrong nodes and eventually dropped by attacker nodes. This decreases the network throughput and packet delivery ratio while wastes the scarce network bandwidth. On the other hand, in blackhole attack the attacker node comes on the discovered route and drop all the packets received for destination. To implement the proposed attacks, we used a network simulator called Exata simulator. The simulation results are collected for performance analysis of the underlying network. Various metrics such as packet delivery ratio and network throughput are used to show the effect of the proposed attack over a wide range of network scenarios

    Routing Attacks in Wireless Sensor Networks: A Survey

    Full text link
    Wireless Sensor Networks (WSN) is an emerging technology now-a-days and has a wide range of applications such as battlefield surveillance, traffic surveillance, forest fire detection, flood detection etc. But wireless sensor networks are susceptible to a variety of potential attacks which obstructs the normal operation of the network. The security of a wireless sensor network is compromised because of the random deployment of sensor nodes in open environment, memory limitations, power limitations and unattended nature. This paper focuses on various attacks that manifest in the network and provides a tabular representation of the attacks, their effects and severity. The paper depicts a comparison of attacks basis packet loss and packet corruption. Also, the paper discusses the known defence mechanisms and countermeasures against the attacks.Comment: IJCSIT April 201

    An Analysis on Security Threats of Black-Hole and Jellyfish Attacks in Mobile Ad-Hoc Network using HTTP Traffic

    Get PDF
    Mobile ad-hoc network (MANET) is an infrastructure less network. This network is a collection of randomly moving mobile nodes. As MANET does not have any centralized management, this network can form anywhere with the participation of randomly moving nodes. Because of such vulnerable behavior of MANET, this network has to face many security problems. There are so many security threats of MANET, which does not have any solution. Even detection of those problems is not easy. Some of the security threats are very severe. Those threats can even destroy the whole network. Researchers are working to find out the solution of those threats. Among those threats, we have worked with two security threats, which are Black-hole attack and Jellyfish attack. Here, we have found out the threats using HTTP traffic. We use OPNET modeler 14.5 as simulator AODV routing protocol. The aim of this paper is to find out the impact of security threats on MANET using HTTP traffic. We decide the impact using number of events and average number of events utilizing throughput of the OPNET modeler

    Spectrum sharing security and attacks in CRNs: a review

    Get PDF
    Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges

    Intelligent detection of black hole attacks for secure communication in autonomous and connected vehicles

    Get PDF
    Detection of Black Hole attacks is one of the most challenging and critical routing security issues in vehicular ad hoc networks (VANETs) and autonomous and connected vehicles (ACVs). Malicious vehicles or nodes may exist in the cyber-physical path on which the data and control packets have to be routed converting a secure and reliable route into a compromised one. However, instead of passing packets to a neighbouring node, malicious nodes bypass them and drop any data packets that could contain emergency alarms. We introduce an intelligent black hole attack detection scheme (IDBA) tailored to ACV. We consider four key parameters in the design of the scheme, namely, Hop Count, Destination Sequence Number, Packet Delivery Ratio (PDR), and End-to-End delay (E2E). We tested the performance of our IDBA against AODV with Black Hole (BAODV), Intrusion Detection System (IdsAODV), and EAODV algorithms. Extensive simulation results show that our IDBA outperforms existing approaches in terms of PDR, E2E, Routing Overhead, Packet Loss Rate, and Throughput

    Performance evaluation of VANET QoS in presence of timing attack and sinkhole attack using OMNeT++

    Get PDF
    The growth in research advancement of vehicular Adhoc Network (VANET) has seen a significant rise in the security attack.In this paper we gives the simulation for quantitative investigate of VANET in presence of Timing attack and Sinkhole attack. We described the performance metrics and discover the effect and harm caused by Timing attack and Sinkhole attack, which directly affect the network Quality of Service (QoS).Our assessment results shows that the impact on VANET under Timing attack and Sinkhole attack varies potentially depending on number of vehicles, number of attacker vehicles.The impact of a Timing attack and Sinkhole attack increased significantly by increasing the number of attacker vehicles in several of the situations. While the number of attacks impact level continually effect on network performance with varying the number of vehicles. It has been perceived that in presence of Timing attack delay is increased approximately 80%. On the other hand, in presence of Sinkhole attack delay is increased approximately 72%. It implied that these attacks are harmful for network life and stand against safety application in VANET

    Analyze the VANET performance in presence of timing attack and sinkhole attack using OMNeT++

    Get PDF
    The growth in research advancement of vehicular Adhoc Network (VANET) has seen a significant rise in the security attack.In this paper, we give the simulation for quantitative investigate of VANET in the presence of Timing attack and Sinkhole attack.We described the performance metrics and discover the effect and harm caused by Timing attack and Sinkhole attack, which directly affect the network Quality of Service (QoS).Our assessment results show that the impact on VANET under Timing attack and Sinkhole attack varies potentially depending on a number of vehicles, the number of attacker vehicles.The impact of a Timing attack and Sinkhole attack increased significantly by increasing the number of attacker vehicles in several of the situations.While the number of attacks impact level continually effect on network performance with varying the number of vehicles.The contribution in this paper has used the OMNeT++ simulators to quantify analysis of the VANET performance in the presence of attacks by comparison with a non-malicious network and a network which enclosed malicious behavior.It has been investigated in two types of attacks, namely 1. Sinkhole attack 2. Timing attack

    Recommendation based trust model with an effective defence scheme for MANETs

    Get PDF
    YesThe reliability of delivering packets through multi-hop intermediate nodes is a significant issue in the mobile ad hoc networks (MANETs). The distributed mobile nodes establish connections to form the MANET, which may include selfish and misbehaving nodes. Recommendation based trust management has been proposed in the literature as a mechanism to filter out the misbehaving nodes while searching for a packet delivery route. However, building a trust model that relies on the recommendations from other nodes in the network is vulnerable to the possible dishonest behaviour, such as bad-mouthing, ballot-stuffing, and collusion, of the recommending nodes. . This paper investigates the problems of attacks posed by misbehaving nodes while propagating recommendations in the existing trust models. We propose a recommendation based trust model with a defence scheme that utilises clustering technique to dynamically filter attacks related to dishonest recommendations within certain time based on number of interactions, compatibility of information and node closeness. The model is empirically tested in several mobile and disconnected topologies in which nodes experience changes in their neighbourhoods and consequently face frequent route changes. The empirical analysis demonstrates robustness and accuracy of the trust model in a dynamic MANET environment

    An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network

    No full text
    corecore