【24h】

Resisting blackhole attacks on MANETs

机译:抵制对MANET的黑洞攻击

获取原文

摘要

MANET routing protocols are designed based on the assumption that all nodes cooperate without maliciously disrupting the operation of the routing protocol. AODV is a reactive MANET routing protocol that is vulnerable to a dramatic collapse of network performance in the presence of blackhole attack. The paper introduces a new concept of Self-Protocol Trustiness (SPT) in which detecting a malicious intruder is accomplished by complying with the normal protocol behavior and lures the malicious node to give an implicit avowal of its malicious behavior. We present a Blackhole Resisting Mechanism (BRM) to resist such attacks that can be incorporated into any reactive routing protocol. It does not require expensive cryptography or authentication mechanisms, but relies on locally applied timers and thresholds to classify nodes as malicious. No modifications to the packet formats are needed, so the overhead is a small amount of calculation at nodes, and no extra communication. Using NS2 simulation, we compare the performance of networks using AODV under blackhole attacks with and without our mechanism to SAODV, showing that it significantly reduces the effect of a blackhole attack.
机译:MANET路由协议是基于以下假设设计的:所有节点都在不恶意破坏路由协议运行的情况下进行协作。 AODV是一种反应式MANET路由协议,在存在黑洞攻击的情况下,很容易受到网络性能急剧下降的影响。本文介绍了一种新的自我协议信任(SPT)概念,其中通过遵循正常的协议行为来完成对恶意入侵者的检测,并诱使该恶意节点隐式声明其恶意行为。我们提出了一种黑洞抵抗机制(BRM),以抵抗可以合并到任何反应式路由协议中的此类攻击。它不需要昂贵的加密或认证机制,而是依靠本地应用的计时器和阈值将节点分类为恶意。无需修改数据包格式,因此开销是节点上的少量计算,并且不需要额外的通信。使用NS2仿真,我们比较了在有和没有我们的机制的情况下,使用AODV的黑洞攻击在SAODV下的网络性能,表明它显着降低了黑洞攻击的影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号