Security attacks in mobile ad hoc networks

The broadcasting nature, absence of infrastructure, and dynamic topology of ad hoc network makes it vulnerable to several security threats. Communication establishment in open environment exposes ad hoc networks to security threats as anyone can join the network and launch attacks. The security in ad hoc networks can be broadly classified into passive and active. A passive attack does not interrupt the protocol operation, but just listens to the communication medium to discover valuable information. In contrast, an active attack inserts or modifies the information in the network. Impersonation, Denial of Service, Disclosure attacks are the active attacks that can be easily launched in the ad hoc networks.
In the impersonation attack, nodes join the network and send false routing information, or masquerade as some other genuine node. The black-hole attack is a kind of impersonation attack impersonation attack in which the adversary exploits the routing protocol to advertise itself as having the shortest path to the destination. The adversary drops all the packets it received from the source instead of forwarding. Wormhole attack is the advanced form of black hole attack in which the adversaries form a tunnel in the network between them and disrupt the routing process.
The routing table overflow and the sleep deprivation attack are denial of service. In the routing table overflow attack, the adversary creates a route to the non-existing nodes to overwhelm the routing-protocol processing. The adversary attempts to consume the energy level of other nodes by adding the useless packets in the sleep deprivation attack. In the location disclosure attack, the adversaries reveal some valuable information regarding the physical location of nodes.

Attack model in NS2

  • In Blackhole attack, attacker involving communication model is configured to drop the packet. Hence, data are dropped by the attacker.

  • In grayhole attack, attacker involving communication model is configured with adjusted interval to selectively forward the packet. Hence reduced amount of data is forwarded by the attacker.

  • In wormhole attack, packet is tunneled between the link between two attackers. Attacker involving communication model is configured with adjusted interval to selectively forward the packet. Hence reduced amount of data is forwarded by the attacker.

  • In selfish behavior, attacker node can be modeled with sufficient energy. Even though attacker is having sufficient energy, it will not involve in packet forwarding while performing routing, or it will not accept the responsibility of leader while executingIntrusion Detection Service (IDS) or it will not cooperate in replica allocation.

Related Project Titles:

  • Jae-Ho Choi, Kyu-Sun Shim, SangKeun Lee, and Kun-Lung Wu “Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network” IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 2, FEBRUARY 2012.