Visible to the public Malicious insider threats in tactical MANET: The performance analysis of DSR routing protocol

TitleMalicious insider threats in tactical MANET: The performance analysis of DSR routing protocol
Publication TypeConference Paper
Year of Publication2017
AuthorsShabut, A. M., Dahal, K., Kaiser, M. S., Hossain, M. A.
Conference Name2017 IEEE Region 10 Humanitarian Technology Conference (R10-HTC)
ISBN Number978-1-5386-2175-2
KeywordsAd-Hoc Network, attack model, black hole, compositionality, DSR routing protocol, energy consumption rate, gray hole, high dynamic network architecture, insider threat model, insider threats, malicious insider threats, MANET, Measurement, Metrics, mobile ad hoc network, mobile ad hoc networks, network flow, Network Simulator 2, network throughput, nodes cooperation, nodes misbehavior, nodes unreliability, nods defection, open wireless medium, packet drop rate, packet dropping attack, packet forwarding, pubcrawl, reactive routing protocols, resilience, Resiliency, Routing, Routing protocols, routing rules, security, self-configuring automatic vehicles, selfish behaviours, Selfish nodes, T-MANET, Tactical MANET, Tactical Mobile Ad-hoc NETworks, telecommunication security, Wireless communication
Abstract

Tactical Mobile Ad-hoc NETworks (T-MANETs) are mainly used in self-configuring automatic vehicles and robots (also called nodes) for the rescue and military operations. A high dynamic network architecture, nodes unreliability, nodes misbehavior as well as an open wireless medium make it very difficult to assume the nodes cooperation in the `ad-hoc network or comply with routing rules. The routing protocols in the T-MANET are unprotected and subsequently result in various kinds of nodes misbehavior's (such as selfishness and denial of service). This paper introduces a comprehensive analysis of the packet dropping attack includes three types of misbehavior conducted by insiders in the T-MANETs namely black hole, gray hole, and selfish behaviours. An insider threat model is appended to a state-of-the-art routing protocol (such as DSR) and analyze the effect of packet dropping attack on the performance evaluation of DSR in the T-MANET. This paper contributes to the existing knowledge in a way it allows further security research to understand the behaviours of the main threats in MANETs which depends on nods defection in the packet forwarding. The simulation of the packet dropping attack is conducted using the Network Simulator 2 (NS2). It has been found that the network throughput has dropped considerably for black and gray hole attacks whereas the selfish nodes delay the network flow. Moreover, the packet drop rate and energy consumption rate are higher for black and gray hole attacks.

URLhttps://ieeexplore.ieee.org/document/8288935/
DOI10.1109/R10-HTC.2017.8288935
Citation Keyshabut_malicious_2017