Attacks Detected by Discovery and Distance Vector Protocols in Ad-hoc Networks
International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC).
Download this PDF format
The research aims for detection and provide the counter measure for attacks such as misrouting, identity delegation, colluding collision, colluding injected attack and power control in the wireless adhoc networks. The above mentioned attacks easily encountered in wireless adhoc networks. Due to these attacks many packets are dropped in the intermediate path before reaching the destination. The research introduce the protocol called SNDP (Secure Neighbor Discovery Protocol) that can detect these attacks and isolate packet dropping attack efficiently and use reactive routing protocol such as AODV(Ad-Hoc On-demand Distance Vector) technique to provide the counter measure for preventing the packet loss against misrouting.
 Issa Khalil and Saurabh Bagchi,” Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure” IEEE transactions on mobile computing.
 May Zin Oo and Mazliza Othman “The Effect of Packet Losses and Delay on TCP Traffic over Wireless Ad Hoc Networks”.
 DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks, David B. Johnson David A.Maltz Josh Broch.
 Khalil and S. Bagchi, “MISPAR: Mitigating Stealthy
 Packet Dropping in Locally-Monitored Multi-Hop Wireless Ad Hoc Networks,” Proc. ACM Int’l Conf. Security and Privacy in Comm. Networks (Secure Comm ’08).
 D. Johnson, D. Maltz, and J. Broch,“The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks,” Ad Hoc Networking, AddisonWesley, 2001.
 Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei, “A Survey on Attacks and Counter measures in Mobile Ad hoc Networks,” Wireless/Mobile Network Security pg 1-38.
 C. Perkins, Ad hoc Networks, Addison-Wesley, 2001. “Mcia-Mitigating Colluding Injected Attacks in Mobile Ad Hoc Networks"
 Y. C. Hu, A. Perrig, and D. Johnson, “Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols,” ACM Workshop on Wireless Security (WiSe’03), pp. 30-40, 2003.
S. Hariharan, N. Shroff, and S. Bagchi, “Secure Neighbor Discovery in Wireless Sensor Networks,” Purdue Technical Report, TR ECE 07-19, 2007.
Misrouting, Identity Delegation, Colluding Collision,Power Control, Colluding Injected Attack, SNDP Protocol, AODV protocol and Guard node.