Imeh J. Umoren, Ekemini Okpongkpong, Ifreke Udoeka
{"title":"基于模糊知识的移动自组织网络虫洞攻击端到端行为分析方法","authors":"Imeh J. Umoren, Ekemini Okpongkpong, Ifreke Udoeka","doi":"10.47747/ijisi.v2i4.581","DOIUrl":null,"url":null,"abstract":"Mobile Ad hoc Networks (MANETs) involves series of travelling nodes communicating with each other without a fixed Set-up. Certainly, MANETs are networks that utilize communication peripatetic nodes such as; Personal Digital Assistants (PDAs), mobile phones, laptops which enable wireless transmission across an area and forwarding data packets to the other nodes resulting in frequent change in topology. MANETs are exposed to several communication assaults such as active attack and passive attack. The active attack disrupts network operations while the passive attack obtains information without upsetting normal networks operation. Wormhole is a typical case of active attack. Indeed, an attacker receives packets at one end of the network, tunnels them to another end of the network, and then replays them into the networks from that point resulting in a collapse in communication across wireless setups. This research work simulates and models a typical wormhole attack in MANET using Network Simulator (NS-2.35) and Fuzzy Inference System (FIS). The End-2-End behavioural analysis of wormhole attacks on the transmitting networks layer of MANET was realized. To detect the level of wormhole attack in the network several parameters such as Packet Delivery Ratio, Packet Forwarding Probability and Packet Dropping Probability were considered by determining the degree of severity of wormhole attack which may upset the Quality of Service (QOS) delivery. The aim of this research paper is in the direction of Network security optimization.","PeriodicalId":0,"journal":{"name":"","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Fuzzy Knowledge-Based Approach for End-2-End Behavioural Analysis of Wormhole Attacks on Mobile Ad-Hoc Networks\",\"authors\":\"Imeh J. Umoren, Ekemini Okpongkpong, Ifreke Udoeka\",\"doi\":\"10.47747/ijisi.v2i4.581\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile Ad hoc Networks (MANETs) involves series of travelling nodes communicating with each other without a fixed Set-up. Certainly, MANETs are networks that utilize communication peripatetic nodes such as; Personal Digital Assistants (PDAs), mobile phones, laptops which enable wireless transmission across an area and forwarding data packets to the other nodes resulting in frequent change in topology. MANETs are exposed to several communication assaults such as active attack and passive attack. The active attack disrupts network operations while the passive attack obtains information without upsetting normal networks operation. Wormhole is a typical case of active attack. Indeed, an attacker receives packets at one end of the network, tunnels them to another end of the network, and then replays them into the networks from that point resulting in a collapse in communication across wireless setups. This research work simulates and models a typical wormhole attack in MANET using Network Simulator (NS-2.35) and Fuzzy Inference System (FIS). The End-2-End behavioural analysis of wormhole attacks on the transmitting networks layer of MANET was realized. To detect the level of wormhole attack in the network several parameters such as Packet Delivery Ratio, Packet Forwarding Probability and Packet Dropping Probability were considered by determining the degree of severity of wormhole attack which may upset the Quality of Service (QOS) delivery. The aim of this research paper is in the direction of Network security optimization.\",\"PeriodicalId\":0,\"journal\":{\"name\":\"\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0,\"publicationDate\":\"2022-01-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47747/ijisi.v2i4.581\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47747/ijisi.v2i4.581","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Fuzzy Knowledge-Based Approach for End-2-End Behavioural Analysis of Wormhole Attacks on Mobile Ad-Hoc Networks
Mobile Ad hoc Networks (MANETs) involves series of travelling nodes communicating with each other without a fixed Set-up. Certainly, MANETs are networks that utilize communication peripatetic nodes such as; Personal Digital Assistants (PDAs), mobile phones, laptops which enable wireless transmission across an area and forwarding data packets to the other nodes resulting in frequent change in topology. MANETs are exposed to several communication assaults such as active attack and passive attack. The active attack disrupts network operations while the passive attack obtains information without upsetting normal networks operation. Wormhole is a typical case of active attack. Indeed, an attacker receives packets at one end of the network, tunnels them to another end of the network, and then replays them into the networks from that point resulting in a collapse in communication across wireless setups. This research work simulates and models a typical wormhole attack in MANET using Network Simulator (NS-2.35) and Fuzzy Inference System (FIS). The End-2-End behavioural analysis of wormhole attacks on the transmitting networks layer of MANET was realized. To detect the level of wormhole attack in the network several parameters such as Packet Delivery Ratio, Packet Forwarding Probability and Packet Dropping Probability were considered by determining the degree of severity of wormhole attack which may upset the Quality of Service (QOS) delivery. The aim of this research paper is in the direction of Network security optimization.