Download presentation
Presentation is loading. Please wait.
Published byPoppy Todd Modified over 8 years ago
1
Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Reporter : Claudia 12011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE
2
Outline Basic knowledge Mobile Ad Hoc Networks (MANET) Ad hoc On Demand Distance Vector (AODV) protocol MANET Rushing attack Blackhole attack Neighbor attack Jellyfish attack Summary Reference 22011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE
3
Mobile Ad Hoc Networks (MANET) Def. A self-configuring infrastructureless network of mobile devices connected by wireless links. Characteristic Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each device must forward traffic unrelated to its own use, and therefore be a router. 32011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE
4
Ad hoc On Demand Distance Vector (AODV) protocol On Demand routing. Distance Vector. Hello messages. Route discovery. Sequence number. 2011/12/740-7695-2552-0/06 $20.00 © 2006 IEEE
5
Ad hoc On Demand Distance Vector (AODV) protocol (cont.) Route discovery(Example from reference [5].) 2011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE5
6
Ad hoc On Demand Distance Vector (AODV) protocol (cont.) Route discovery(Example from reference [5].) 2011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE6
7
Ad hoc On Demand Distance Vector (AODV) protocol (cont.) Route discovery(Example from reference [5].) 2011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE7
8
Ad hoc On Demand Distance Vector (AODV) protocol (cont.) Route discovery(Example from reference [5].) 2011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE8
9
Ad hoc On Demand Distance Vector (AODV) protocol (cont.) Route discovery(Example from reference [5].) 2011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE9
10
Rushing attack By skipping some of the routing processes, can quickly forward these packets and make other router discard the normally-process packets. Cause the attacker is able to gain access to the forwarding group. 2011/12/7100-7695-2552-0/06 $20.00 © 2006 IEEE
11
Rushing attack (cont.) Picture from reference [1]. 2011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE11
12
Blackhole attack Using rushing attack at first. Drops all of data packets it receives. Cause very low packet delivery ratio. 2011/12/7120-7695-2552-0/06 $20.00 © 2006 IEEE
13
Blackhole attack(cont.) Picture from reference [1]. 2011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE13
14
Jellyfish attack Using rushing attack at first. Delays data packets unnecessarily for some amount of time before forwarding them. Results in significantly high end-to-end delay and delay jitter. 2011/12/7140-7695-2552-0/06 $20.00 © 2006 IEEE
15
Jellyfish attack(cont.) Picture from reference [1]. 2011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE15
16
Jellyfish attack(cont.) Picture from reference [1]. 2011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE16
17
Neighbor attack Using rushing attack at first. Attacker simply forwards the packet without recording its ID in the packet. Resulting in a disrupted route. 2011/12/7170-7695-2552-0/06 $20.00 © 2006 IEEE
18
Summary Protocols that use the duplicate suppression mechanism such as ODMRP, ADMR are very vulnerable to rushing attacks. Jellyfish attacks do not affect the packet delivery ratio or the throughput of a multicast group, but they severely increase the packet end-to-end delay and delay jitter. The operations of blackhole attacks and neighbor attacks are different, they both cause the same degree of damage to the performance of a multicast group in terms of packer loss rate. 2011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE18
19
Reference [1]http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber =1628395 [1]http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber =1628395 [2]http://en.wikipedia.org/wiki/Mobile_ad_hoc_network [2]http://en.wikipedia.org/wiki/Mobile_ad_hoc_network [3]http://en.wikipedia.org/wiki/List_of_ad_hoc_routing_p rotocols [3]http://en.wikipedia.org/wiki/List_of_ad_hoc_routing_p rotocols [4]http://users.crhc.illinois.edu/yihchun/pubs/wise03.pdf [4]http://users.crhc.illinois.edu/yihchun/pubs/wise03.pdf [5]http://www.cs.jhu.edu/~cs647/aodv.pdf [5]http://www.cs.jhu.edu/~cs647/aodv.pdf 192011/12/70-7695-2552-0/06 $20.00 © 2006 IEEE
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.