Font Size: a A A

Counter attack as a defense mechanism in ad hoc mobile wireless networks

Posted on:2012-07-13Degree:M.SType:Thesis
University:Oklahoma State UniversityCandidate:Chandra, BipulFull Text:PDF
GTID:2468390011461583Subject:Information Technology
Abstract/Summary:
Scope and Method of Study: Ad-Hoc Mobile Wireless Network (MANETs) have emerged and evolved in many forms. MANETs are rapidly gaining popularity because they do not rely on a pre infrastructure and can be deployed spontaneously. However, compared to wired networks, MANETs are more vulnerable to security attacks due to their unique features, such as stringent power consumption, error prone communication media and highly dynamic network topology. Most of the work done for improving security are focused on defensive mechanism like firewalls, gateways etc. Little research has been done on more offensive mechanisms to provide security. We propose three counter attack models, namely, Round Robin attack, Self-Whisper and flooding. The goal of all these attacks is to use up the intruder's critical resources like energy, communications bandwidth and force the intruder to eventually enter into DoS status.;Findings and Conclusions: Simulation results shows that proposed counter attack models are an effective tool to counterattack. Simulation shows that a single model may not perform well in all situations. The choice of counter attack model is highly governed by the objective of counterattack. The Self-Whisper attack is the best if the objective is to have minimum energy consumption rate and minimum packet drop rate for agent nodes. On the other hand, if the protocol used is UDP, and the objective is to consume maximum amount of intruder energy, self- whisper performs better but if the objective is to have maximum packet drop rate at the intruder in the minimum time period, Round Robin is perhaps a best choice. Simulation shows that once counter attack begins, any traffic that is through intruder is disrupted. This disruption causes the ordinary nodes that have been tricked by the intruder advertizing false route information, to seek an alternate path to the destination. Hence, counter attack helps in improving security of the network as a whole.
Keywords/Search Tags:Counter attack, Network, Security
Related items