Behavior Analysis of Flooding Attacks in Sparse Mobile Ad-Hoc Networks

被引:0
|
作者
Idezuka, Takuya [1 ]
Kimura, Tomotaka [1 ]
Muraguchi, Masahiro [1 ]
机构
[1] Tokyo Univ Sci, Fac Engn, Tokyo, Japan
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, many store-carry-forward routing schemes have been proposed for sparse mobile ad-hoc networks, which are the most representative networks in delay/disconnected tolerant network environments. In general, store-carry-forward routing schemes are designed under the assumption that all nodes in the network are good and cooperative. Therefore, they are highly vulnerable to malicious attacks. To eliminate these vulnerabilities, we need to clarify the characteristics of such malicious attacks. In this paper, we focus on analyzing the behavior of flooding attacks in which malicious nodes generate unnecessary messages to exhaust network resources. Through simulation experiments, we reveal how flooding attacks affect the system performance.
引用
收藏
页数:2
相关论文
共 50 条
  • [1] Defending Against Flooding Attacks in Mobile Ad-Hoc Networks Based on Statistical Analysis
    Mohammadi, Payam
    Ghaffari, Ali
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (02) : 365 - 376
  • [2] Defending Against Flooding Attacks in Mobile Ad-Hoc Networks Based on Statistical Analysis
    Payam Mohammadi
    Ali Ghaffari
    [J]. Wireless Personal Communications, 2019, 106 : 365 - 376
  • [3] Performance analysis of mobile ad hoc networks under flooding attacks
    Ping Yi1
    2. The State Key Laboratory of Integrated Services Networks
    [J]. Journal of Systems Engineering and Electronics, 2011, 22 (02) : 334 - 339
  • [4] Performance analysis of mobile ad hoc networks under flooding attacks
    Yi, Ping
    Zou, Futai
    Zou, Yan
    Wang, Zhiyang
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2011, 22 (02) : 334 - 339
  • [5] A RELIABLE FLOODING MECHANISM FOR MOBILE AD-HOC NETWORKS
    Narasimhan, B.
    Vadivel, R.
    [J]. 2014 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING APPLICATIONS (ICICA 2014), 2014, : 301 - +
  • [6] Detection Method Against Fake Message Attacks in Sparse Mobile Ad-Hoc Networks
    Shimizu, Yuki
    Kimura, Tomotaka
    Cheng, Jun
    [J]. 2019 IEEE 30TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2019, : 495 - 501
  • [7] Effects of Malicious Attacks in Mobile Ad-hoc Networks
    Kanthe, Ashok M.
    Simunic, Dina
    Prasad, Ramjee
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 1 - 5
  • [8] Robust Control in Sparse Mobile Ad-Hoc Networks
    Altman, Eitan
    Aram, Alireza
    Basar, Tamer
    Touati, Corinne
    Sarkar, Saswati
    [J]. DECISION AND GAME THEORY FOR SECURITY, 2010, 6442 : 123 - +
  • [9] Experimental Evaluation of flooding attacks in mobile ad hoc networks
    Yi, Ping
    Wu, Yue
    Ma, Jianqing
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOPS, VOLS 1 AND 2, 2009, : 608 - 611
  • [10] Detect DDoS flooding attacks in mobile ad hoc networks
    Guo, Yinghua
    Perreau, Sylvie
    [J]. International Journal of Security and Networks, 2010, 5 (04) : 259 - 269