{"title":"Experimental Evaluation of Flooding Attacks in Mobile Ad Hoc Networks","authors":"P. Yi, Y. Wu, J. Ma","doi":"10.1109/ICCW.2009.5208014","DOIUrl":null,"url":null,"abstract":"Mobile ad hoc networks will often be deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to denial of service (DoS) attacks launched through compromised nodes or intruders. In this paper, we investigated the effects of flooding attacks in Network Simulation 2 (ns-2) and measured the packet delivery ratio and packet delay under different flooding frequency and different number of attack nodes. Simulation results show that with the increase the flooding frequency and the number of attack nodes, network performance drops. Meanwhile the packet delay firstly increases and then decline to a value of stability in the end.","PeriodicalId":271067,"journal":{"name":"2009 IEEE International Conference on Communications Workshops","volume":"105 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE International Conference on Communications Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCW.2009.5208014","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Mobile ad hoc networks will often be deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to denial of service (DoS) attacks launched through compromised nodes or intruders. In this paper, we investigated the effects of flooding attacks in Network Simulation 2 (ns-2) and measured the packet delivery ratio and packet delay under different flooding frequency and different number of attack nodes. Simulation results show that with the increase the flooding frequency and the number of attack nodes, network performance drops. Meanwhile the packet delay firstly increases and then decline to a value of stability in the end.