Abstract

Black hole or packet drop attack is a denial of ser vice attack on routing protocols in which malicious nodes fabricate routing information, attract packets rout ed through them and then deliberately drop these pa ckets. Most of the black hole attack simulations are perfo rmed by constantly fabricating routing information and thus consistently attracting packets to them, which can be easily detected by the intrusion detection system. In this study, a complicated and difficult to detec t black hole attack is proposed. The malicious node s only perform packet drop when they are in the advantageous positions or locations in the networks. This stu dy investigates the impact of the proposed black hole attack performed by random as well as critical node s, to the network performance. Critical nodes are nodes t hat reside along the most active traffic paths and results show that the attacks performed by these nodes caus e significant damage to the networks or substantial reduction in packet delivery ratio in comparison to that of random nodes.

Highlights

  • Particular, the networks can be crippled by the Denial of Service (DoS) attacks, such as the infamous

  • Most of the black hole attack simulations are performed by constantly fabricating routing information and consistently attracting packets to them, which can be detected by the intrusion detection system

  • This study investigates the impact of the proposed black hole attack performed by random as well as critical nodes, to the network performance

Read more

Summary

Introduction

Particular, the networks can be crippled by the Denial of Service (DoS) attacks, such as the infamous. The black hole attacks simulations have been carried out MANET consists of mobile, tiny, low-powered by randomly assigned some nodes as the attackers. Being an ad hoc network, MANET is an addition, the attackers consistently fabricate routing information and attract all packets to them. Such infrastructure-less network whereby the communication among the nodes is done through multi-hop that is the behavior can be detected by the Intrusion Detection System (IDS). Each mobile node in the networks acts as within the networks With such intermittent attacks, both a router and a host.

Objectives
Methods
Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call