基于NS-3的MANET洪水攻击仿真分析

A. Bandyopadhyay, Satyanarayana Vuppala, Prasenjit Choudhury
{"title":"基于NS-3的MANET洪水攻击仿真分析","authors":"A. Bandyopadhyay, Satyanarayana Vuppala, Prasenjit Choudhury","doi":"10.1109/WIRELESSVITAE.2011.5940916","DOIUrl":null,"url":null,"abstract":"Mobile Ad hoc Network (MANET) is set up with a group of mobile wireless nodes and is devoid of any dedicated routers or base stations. The wireless nodes move around freely and mutually cooperate with each other in routing and forwarding packets without the support of any fixed infrastructure or centralized administration. The topology is highly dynamic, making the routing procedure more difficult and insecure. The wireless nodes of MANET are thus susceptible to compromise and are particularly vulnerable to denial of service (DoS) attacks launched by malicious nodes or intruders. Flooding attack is one such type of DoS attack, in which a compromised node floods the entire network by sending a large number of fake RREQs to nonexistent nodes in the network, thus resulting in network congestion. In this paper, the security of MANET AODV routing protocol is investigated by identifying the impact of flooding attack on it. A simulation study of the effects of flooding attack on the performance of the AODV routing protocol is presented. The simulation environment is implemented by using the NS-3 network simulator. It is observed that due to the presence of such malicious nodes, average percentage of packet loss in the network, average routing overhead and average bandwidth requirement — all increases, thus degrading the performance of MANET significantly.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"50","resultStr":"{\"title\":\"A simulation analysis of flooding attack in MANET using NS-3\",\"authors\":\"A. Bandyopadhyay, Satyanarayana Vuppala, Prasenjit Choudhury\",\"doi\":\"10.1109/WIRELESSVITAE.2011.5940916\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile Ad hoc Network (MANET) is set up with a group of mobile wireless nodes and is devoid of any dedicated routers or base stations. The wireless nodes move around freely and mutually cooperate with each other in routing and forwarding packets without the support of any fixed infrastructure or centralized administration. The topology is highly dynamic, making the routing procedure more difficult and insecure. The wireless nodes of MANET are thus susceptible to compromise and are particularly vulnerable to denial of service (DoS) attacks launched by malicious nodes or intruders. Flooding attack is one such type of DoS attack, in which a compromised node floods the entire network by sending a large number of fake RREQs to nonexistent nodes in the network, thus resulting in network congestion. In this paper, the security of MANET AODV routing protocol is investigated by identifying the impact of flooding attack on it. A simulation study of the effects of flooding attack on the performance of the AODV routing protocol is presented. The simulation environment is implemented by using the NS-3 network simulator. It is observed that due to the presence of such malicious nodes, average percentage of packet loss in the network, average routing overhead and average bandwidth requirement — all increases, thus degrading the performance of MANET significantly.\",\"PeriodicalId\":68078,\"journal\":{\"name\":\"无线互联科技\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-07-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"50\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"无线互联科技\",\"FirstCategoryId\":\"1093\",\"ListUrlMain\":\"https://doi.org/10.1109/WIRELESSVITAE.2011.5940916\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"无线互联科技","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940916","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 50

摘要

移动自组网(MANET)由一组移动无线节点组成,不需要任何专用路由器或基站。无线节点可以自由移动,并且在路由和转发数据包时相互合作,而不需要任何固定的基础设施或集中管理的支持。拓扑结构是高度动态的,使得路由过程更加困难和不安全。因此,MANET的无线节点容易受到损害,特别容易受到恶意节点或入侵者发起的拒绝服务(DoS)攻击。泛洪攻击就是这样一种DoS攻击,被攻破的节点通过向网络中不存在的节点发送大量虚假的rreq,使整个网络泛滥,从而导致网络拥塞。本文通过识别洪水攻击对路由协议的影响,研究了MANET AODV路由协议的安全性。仿真研究了洪水攻击对AODV路由协议性能的影响。仿真环境采用NS-3网络模拟器实现。可以观察到,由于这些恶意节点的存在,网络中平均丢包百分比、平均路由开销和平均带宽需求都会增加,从而显著降低了MANET的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A simulation analysis of flooding attack in MANET using NS-3
Mobile Ad hoc Network (MANET) is set up with a group of mobile wireless nodes and is devoid of any dedicated routers or base stations. The wireless nodes move around freely and mutually cooperate with each other in routing and forwarding packets without the support of any fixed infrastructure or centralized administration. The topology is highly dynamic, making the routing procedure more difficult and insecure. The wireless nodes of MANET are thus susceptible to compromise and are particularly vulnerable to denial of service (DoS) attacks launched by malicious nodes or intruders. Flooding attack is one such type of DoS attack, in which a compromised node floods the entire network by sending a large number of fake RREQs to nonexistent nodes in the network, thus resulting in network congestion. In this paper, the security of MANET AODV routing protocol is investigated by identifying the impact of flooding attack on it. A simulation study of the effects of flooding attack on the performance of the AODV routing protocol is presented. The simulation environment is implemented by using the NS-3 network simulator. It is observed that due to the presence of such malicious nodes, average percentage of packet loss in the network, average routing overhead and average bandwidth requirement — all increases, thus degrading the performance of MANET significantly.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
19945
期刊最新文献
Cognitive Radio Oriented Wireless Networks and Wireless Internet: 16th EAI International Conference, CROWNCOM 2021, Virtual Event, December 11, 2021, and 14th EAI International Conference, WiCON 2021, Virtual Event, November 9, 2021, Proceedings Performance of super-orthogonal space-time trellis codes over Nakagami fading channels Defending against worm hole attacks in multicast routing protocols for mobile ad hoc networks How to find an optimal threshold for SSB algorithm A novel intrusion detection algorithm for wireless sensor networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1