Abstract

In this paper we are providing a implementation details about simulated solution of stealthy packet drop attack. Stealthy packet drop attack is a suite of four attack types, includes colluding collision, packet misrouting, identity delegation and power control. Stealthy packet drop attacks disrupts the packet from reaching to it’s destination through malicious behaviour. These attacks can be easily breakdown the multi-hop wireless ad-hoc networks. Most widely preferred method for detecting attacks in wireless network is behaviour based detection method. In this method a normal network overhears communication from its neighbourhood. Here we are implementing a SADEC protocol which is proposed solution of stealthy packet drop attacks. SADEC overlaid the base line local monitoring. In base line local monitoring each neighbour maintains additional information about routing path also it adds some checking responsibility to all its neighbours. SADEC proves more efficient than baseline local monitoring to mitigate successfully all the stealthy attack types.

Highlights

  • A day’s wireless networks are becoming more preferable platforms in many domains but security in wireless is very less as compare to wired network

  • It is suite of four attack types which includes: 1. Misrouting: malicious node misroutes the packet to wrong hop

  • SADEC improves the efficiency of the wireless ad-hoc network over the base line local monitoring [1]

Read more

Summary

INTRODUCTION

A day’s wireless networks are becoming more preferable platforms in many domains but security in wireless is very less as compare to wired (traditional) network. They are becoming important platform for command and control of civilian critical infrastructure and military warfare. Stealthy packet drop attack is a latest threat to wireless ad-hoc networks. Malicious node evades detection and legitimate node treated as malicious node. It is suite of four attack types which includes: 1. Misrouting: malicious node misroutes the packet to wrong hop It is suite of four attack types which includes: 1. Misrouting: malicious node misroutes the packet to wrong hop

Colluding collision
Identity delegation
RELATED WORK
Misrouting
Power control
TECHNOLOGY AND FEATURES
CONCLUSIONS
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.