A Fuzzy Knowledge-Based Approach for End-2-End Behavioural Analysis of Wormhole Attacks on Mobile Ad-Hoc Networks

Pub Date : 2022-01-22 DOI:10.47747/ijisi.v2i4.581
Imeh J. Umoren, Ekemini Okpongkpong, Ifreke Udoeka
{"title":"A Fuzzy Knowledge-Based Approach for End-2-End Behavioural Analysis of Wormhole Attacks on Mobile Ad-Hoc Networks","authors":"Imeh J. Umoren, Ekemini Okpongkpong, Ifreke Udoeka","doi":"10.47747/ijisi.v2i4.581","DOIUrl":null,"url":null,"abstract":"Mobile Ad hoc Networks (MANETs) involves series of travelling nodes communicating with each other without a fixed Set-up. Certainly, MANETs are networks that utilize communication peripatetic nodes such as; Personal Digital Assistants (PDAs), mobile phones, laptops which enable wireless transmission across an area and forwarding data packets to the other nodes resulting in frequent change in topology. MANETs are exposed to several communication assaults such as active attack and passive attack. The active attack disrupts network operations while the passive attack obtains information without upsetting normal networks operation. Wormhole is a typical case of active attack. Indeed, an attacker receives packets at one end of the network, tunnels them to another end of the network, and then replays them into the networks from that point resulting in a collapse in communication across wireless setups. This research work simulates and models a typical wormhole attack in MANET using Network Simulator (NS-2.35) and Fuzzy Inference System (FIS). The End-2-End behavioural analysis of wormhole attacks on the transmitting networks layer of MANET was realized. To detect the level of wormhole attack in the network several parameters such as Packet Delivery Ratio, Packet Forwarding Probability and Packet Dropping Probability were considered by determining the degree of severity of wormhole attack which may upset the Quality of Service (QOS) delivery. The aim of this research paper is in the direction of Network security optimization.","PeriodicalId":0,"journal":{"name":"","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47747/ijisi.v2i4.581","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Mobile Ad hoc Networks (MANETs) involves series of travelling nodes communicating with each other without a fixed Set-up. Certainly, MANETs are networks that utilize communication peripatetic nodes such as; Personal Digital Assistants (PDAs), mobile phones, laptops which enable wireless transmission across an area and forwarding data packets to the other nodes resulting in frequent change in topology. MANETs are exposed to several communication assaults such as active attack and passive attack. The active attack disrupts network operations while the passive attack obtains information without upsetting normal networks operation. Wormhole is a typical case of active attack. Indeed, an attacker receives packets at one end of the network, tunnels them to another end of the network, and then replays them into the networks from that point resulting in a collapse in communication across wireless setups. This research work simulates and models a typical wormhole attack in MANET using Network Simulator (NS-2.35) and Fuzzy Inference System (FIS). The End-2-End behavioural analysis of wormhole attacks on the transmitting networks layer of MANET was realized. To detect the level of wormhole attack in the network several parameters such as Packet Delivery Ratio, Packet Forwarding Probability and Packet Dropping Probability were considered by determining the degree of severity of wormhole attack which may upset the Quality of Service (QOS) delivery. The aim of this research paper is in the direction of Network security optimization.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
基于模糊知识的移动自组织网络虫洞攻击端到端行为分析方法
移动自组织网络(manet)是由一系列移动节点组成的网络,在没有固定设置的情况下相互通信。当然,manet是利用通信外围节点的网络,例如;个人数字助理(pda)、移动电话、笔记本电脑,它们可以实现跨区域的无线传输,并将数据包转发到其他节点,从而导致拓扑结构的频繁变化。manet面临多种通信攻击,如主动攻击和被动攻击。主动攻击是指中断网络的正常运行,而被动攻击是指在不影响网络正常运行的情况下获取信息。虫洞是主动攻击的典型案例。实际上,攻击者在网络的一端接收数据包,通过隧道将其传输到网络的另一端,然后从该点将其重放到网络中,从而导致无线设置之间的通信崩溃。本研究利用网络模拟器(NS-2.35)和模糊推理系统(FIS)对MANET中典型的虫洞攻击进行了仿真和建模。实现了MANET传输网络层虫洞攻击的端到端行为分析。为了检测网络中虫洞攻击的程度,通过确定可能影响服务质量(QOS)交付的虫洞攻击的严重程度,考虑了报文投递率、报文转发概率和丢包概率等参数。本文的研究方向是网络安全优化。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1