Defending packet dropping attacks based on dynamic trust model in wireless ad hoc networks
Title | Defending packet dropping attacks based on dynamic trust model in wireless ad hoc networks |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Soleimani, M.T., Kahvand, M. |
Conference Name | Mediterranean Electrotechnical Conference (MELECON), 2014 17th IEEE |
Date Published | April |
Keywords | Ad hoc networks, AODV, Black hole attack, computer network security, Computers, Conferences, denial of service attack, DoS attack, dynamic trust model, low false positive probability, malicious node, malicious packet dropping, mobile ad hoc networks, network traffic, NS-2 simulation, Packet dropping, packet dropping attacks, partial received packets, reactive routing protocol, Routing, Routing protocols, security, security threats, telecommunication traffic, Trust management, trust value, Vectors, Wireless ad hoc network, wireless ad hoc networks |
Abstract | Rapid advances in wireless ad hoc networks lead to increase their applications in real life. Since wireless ad hoc networks have no centralized infrastructure and management, they are vulnerable to several security threats. Malicious packet dropping is a serious attack against these networks. In this attack, an adversary node tries to drop all or partial received packets instead of forwarding them to the next hop through the path. A dangerous type of this attack is called black hole. In this attack, after absorbing network traffic by the malicious node, it drops all received packets to form a denial of service (DOS) attack. In this paper, a dynamic trust model to defend network against this attack is proposed. In this approach, a node trusts all immediate neighbors initially. Getting feedback from neighbors' behaviors, a node updates the corresponding trust value. The simulation results by NS-2 show that the attack is detected successfully with low false positive probability. |
DOI | 10.1109/MELCON.2014.6820561 |
Citation Key | 6820561 |
- NS-2 simulation
- wireless ad hoc networks
- Wireless ad hoc network
- Vectors
- trust value
- Trust management
- telecommunication traffic
- security threats
- security
- Routing protocols
- Routing
- reactive routing protocol
- partial received packets
- packet dropping attacks
- Packet dropping
- Ad hoc networks
- network traffic
- mobile ad hoc networks
- malicious packet dropping
- malicious node
- low false positive probability
- dynamic trust model
- DoS attack
- denial of service attack
- Conferences
- Computers
- computer network security
- Black hole attack
- AODV