Font Size: a A A

Simulation Of Two Attacking Methods For AODV Routing Protocol

Posted on:2009-02-19Degree:MasterType:Thesis
Country:ChinaCandidate:Z H JiangFull Text:PDF
GTID:2178360245969825Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
As mobile communications technology continues to progress, and mobile communications network has developed rapidly. Being one of the mobile communications networks, Ad Hoc network received significant attention in recent years because it can be used to provide a supporting environment of communication in the absence of network infrastructure.The current mobile Ad hoc network routing protocols can support dynamic topology changes well, But mobile Ad hoc network self-organization and network topology changes at the inherent characteristics makes it vulnerable to all kinds of attacks. This paper focus on studying systematically the vulnerability of Ad Hoc networks typical routing protocol AODV, and completes two methods to attack the AODV routing protocol:1. This paper completes RREQ flooding attacking method using RREQ frames, which was broadcasted in the network. The attacking node sends a quantity of RREQ frames, other nodes broadcast the frames, These frames can exhausted the bandwidth of the Ad Hoc network, the memory and the power of the nodes, so the nodes will not work normally and deny of service. The network will be damaged.2. This paper completes RREP modifying attacking method using RREP frames. The attacking node sends RREP frame for every RREQ frame. The RREQ source node will build the wrong route which contends the attacking node when the RREQ source node receives the RREP frame which was sent by attacking node. So the wrong route was built and communications were damaged.The two attacking methods were simulated by NS2, the result of the simulation was analyzed and the two variable of packets delivery rate and network delay was computed to measure the damage of the network. The simulation result proved that the two attacking method can damage the network effectively.
Keywords/Search Tags:Ad Hoc network, routing protocol, NS2, RREQ flooding attack, RREP modifying attack, packet delivery rate, network delay
PDF Full Text Request
Related items