Performance evaluation of ad hoc network under location-based attacks

In a practical ad hoc network scene where routing attacks are deployed, attackers are likely to be located in specific geographical region, which is likely to cause different influence on network performance. Though many simulations works has been done on sorting out different kinds of attacks, little work has been focused on the potential link between the severity of attack and the deployment of attackers. In this paper, we pay specific attention to two common attacks in ad hoc network - flooding and active black-hole attack. We established several network scenery to illustrate possible unbalanced network in realistic occasions. And through extensive simulation work on those scenes, we study the connection between the locations of the malicious attackers and influence on network performance. We evaluate both long-term influence and transient impact of flooding attack. We also study active black hole's victim range in both random scene and internet-connected gateway node scene. By comparing attack severity of differently located attackers, we propose theories for attackers to achieve maximized performance influence by strategically placing the malicious nodes. We also provide guidelines for defenders to figure out key zones of defensive importance as well as possible locations of attackers.

[1]  Mohsen Guizani,et al.  Self-regulating network utilization in mobile ad hoc wireless networks , 2006, IEEE Transactions on Vehicular Technology.

[2]  N. Asokan,et al.  Securing ad hoc routing protocols , 2002, WiSE '02.

[3]  D. Jhonson The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007 .

[4]  Rajendra V. Boppana,et al.  Mitigating malicious control packet floods in ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[5]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[6]  Edward W. Knightly,et al.  Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.

[7]  Nei Kato,et al.  Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..

[8]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[9]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[10]  Wenye Wang,et al.  On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures , 2010, IEEE Transactions on Dependable and Secure Computing.

[11]  N. Bhalaji,et al.  Association between nodes to combat blackhole attack in DSR based MANET , 2009, 2009 IFIP International Conference on Wireless and Optical Communications Networks.

[12]  Shiyong Zhang,et al.  A New Routing Attack in Mobile Ad Hoc Networks , 2005 .