A temporal packet marking detection scheme against MIRA attack in MANET
Title | A temporal packet marking detection scheme against MIRA attack in MANET |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Desai, N.N., Diwanji, H., Shah, J.S. |
Conference Name | Engineering and Computational Sciences (RAECS), 2014 Recent Advances in |
Date Published | March |
Keywords | clustering, delay packet, delays, dynamic topology, energy constraint operations, IP networks, malicious nodes detection, MANET, MIRA attack, misleading routing attack, Misleading routing attack (MIRA), mobile ad hoc networks, mobile ad-hoc network, packet marking, packet marking detection scheme, packet radio networks, packet transmission, physical security, resource constraint, Routing, security, telecommunication network routing, telecommunication network topology, telecommunication security, Throughput, time behavior, Topology |
Abstract | Mobile Ad-hoc Network is highly susceptible towards the security attacks due to its dynamic topology, resource constraint, energy constraint operations, limited physical security and lack of infrastructure. Misleading routing attack (MIRA) in MANET intend to delay packet to its fullest in order to generate time outs at the source as packets will not reach in time. Its main objective is to generate delay and increase network overhead. It is a variation to the sinkhole attack. In this paper, we have proposed a detection scheme to detect the malicious nodes at route discovery as well as at packet transmissions. The simulation results of MIRA attack indicate that though delay is increased by 91.30% but throughput is not affected which indicates that misleading routing attack is difficult to detect. The proposed detection scheme when applied to misleading routing attack suggests a significant decrease in delay. |
URL | https://ieeexplore.ieee.org/document/6799560/ |
DOI | 10.1109/RAECS.2014.6799560 |
Citation Key | 6799560 |
- packet marking
- Topology
- time behavior
- Throughput
- telecommunication security
- telecommunication network topology
- telecommunication network routing
- security
- Routing
- resource constraint
- physical security
- packet transmission
- packet radio networks
- packet marking detection scheme
- clustering
- mobile ad-hoc network
- mobile ad hoc networks
- Misleading routing attack (MIRA)
- misleading routing attack
- MIRA attack
- MANET
- malicious nodes detection
- IP networks
- energy constraint operations
- dynamic topology
- delays
- delay packet