首页> 外文会议>Conference on Mobile Multimedia/Image Processing, Security, and Applications >IDMA: Improving the Defense Against Malicious Attack for MobileAd Hoc Networks Based on the ARIP Protocol
【24h】

IDMA: Improving the Defense Against Malicious Attack for MobileAd Hoc Networks Based on the ARIP Protocol

机译:idma:根据ARIP协议,改善对Mobilead Hoc网络的恶意攻击的防御

获取原文

摘要

Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks(MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes.However, the defense against malicious attack can be improved when a new layer of network architecture can bedeveloped to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithmto improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment RouterIdentify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIParchitecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that isembedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitorgateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We namethis new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. ThroughIDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when itunusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery byimpersonating the destination, or by responding with state of corrupted routing information, or by disseminating forgedcontrol traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoSattack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data;or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at thatdestination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated itsperformance under a variety of operational conditions.
机译:恶意节点在移动临时网络(MANET)上安装了越来越复杂的攻击操作。这主要是因为基于IP的疯狂攻击是由各种恶意节点的攻击。然而,当一个新的网络架构可以被简单地将真正的IP地址分开到恶意节点时,可以改善防范恶意攻击。在本文中,我们提出了一种新的算法来改善基于最近开发的分配RouterIentify协议(ARIP)的恶意攻击(IDMA)的防御,用于基于群集的MANET管理。在ARIP协议中,我们根据新标识而不是易受侦听的IP地址设计ARIPARCHEITERE,以提供无缝均匀的安全性进入整体网络架构的安全性。我们充分利用ARIP的特殊属性来通过回复请求路由数据包(RREP)来监控转发数据包,而无需额外的入侵检测层。我们是新的算法IDMA,因为它具有改善防御恶意攻击的固有能力。通过MA,可以建立一个观看算法,以便在itunusigal丢弃数据包时对路由路径中的恶意节点进行反击。我们为idma提供对防御的idma对恶意节点的分析示例,这些恶意节点通过损坏目的地的路由发现,或通过响应损坏的路由信息​​的状态,或通过传播伪造的配置流量。当通过广播大量路由请求的节点午餐DOSATTACK时,IDMA算法能够在案件中对抗恶意节点,或者通过提供大量数据山的目标流量拥塞;或者欺骗IP地址并使用a发送伪造数据包虚假身份证到同一目标,导致该目标的交通拥堵。我们使用Glomosim模拟器实现了IDMA算法,并在各种操作条件下证明了ITSPLEATION。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号