DocumentCode :
2484545
Title :
Performance evaluation of ad hoc network under location-based attacks
Author :
Tianye, Chen ; Ning, Liu ; Ping, Yi ; Yue, Wu ; Qiang, Zhai
Author_Institution :
Sch. of Inf. Security Eng., Shanghai Jiao Tong Univ., Shanghai, China
fYear :
2010
fDate :
Nov. 30 2010-Dec. 2 2010
Firstpage :
1015
Lastpage :
1019
Abstract :
In a practical ad hoc network scene where routing attacks are deployed, attackers are likely to be located in specific geographical region, which is likely to cause different influence on network performance. Though many simulations works has been done on sorting out different kinds of attacks, little work has been focused on the potential link between the severity of attack and the deployment of attackers. In this paper, we pay specific attention to two common attacks in ad hoc network - flooding and active black-hole attack. We established several network scenery to illustrate possible unbalanced network in realistic occasions. And through extensive simulation work on those scenes, we study the connection between the locations of the malicious attackers and influence on network performance. We evaluate both long-term influence and transient impact of flooding attack. We also study active black hole´s victim range in both random scene and internet-connected gateway node scene. By comparing attack severity of differently located attackers, we propose theories for attackers to achieve maximized performance influence by strategically placing the malicious nodes. We also provide guidelines for defenders to figure out key zones of defensive importance as well as possible locations of attackers.
Keywords :
Internet; ad hoc networks; internetworking; telecommunication network routing; telecommunication security; Internet-connected gateway node scene; active black-hole attack; ad hoc network; flooding attack; location-based attack; network scenery; performance evaluation; routing attack; Broadcasting; Floods; Logic gates; Mobile ad hoc networks; Routing; Transient analysis; ad hoc; attack; location;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Sciences and Convergence Information Technology (ICCIT), 2010 5th International Conference on
Conference_Location :
Seoul
Print_ISBN :
978-1-4244-8567-3
Electronic_ISBN :
978-89-88678-30-5
Type :
conf
DOI :
10.1109/ICCIT.2010.5711210
Filename :
5711210
Link To Document :
بازگشت