首页> 外文期刊>International Journal of Computer Trends and Technology >A Review on Impersonation Attack in Mobile Ad-Hoc Network
【24h】

A Review on Impersonation Attack in Mobile Ad-Hoc Network

机译:移动自组织网络中的模拟攻击研究述评

获取原文
       

摘要

An ad hoc network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administration. Due to Open medium, dynamic topology, Distributed Cooperation, Constrained Capabilities ad hoc networks are vulnerable to many types of security attacks. Impersonation attack is special case of integrity attacks where by a compromise node impersonates a legitimate node one due to the lack of authentication in current ad hoc routing protocol. In this paper, we are describing the causes of impersonation attack and their vulnerable effects which give chance to a malicious node for doing other attacks too. We confirm with simple risk analysis that impersonation attacks offer attractive incentives to malicious criminals and should therefore be given highest priority in research studies. Our approach is to detecting and eliminating impersonation attack using secure routing protocols.
机译:自组织网络是移动节点的集合,这些节点动态形成临时网络,并且能够在不使用网络基础结构或任何集中管理的情况下彼此通信。由于开放介质,动态拓扑,分布式合作,受限功能特设网络容易受到多种类型的安全攻击。模拟攻击是完整性攻击的一种特殊情况,在这种情况下,由于当前自组织路由协议中缺少身份验证,因此折衷节点可以模拟一个合法节点。在本文中,我们描述了模拟攻击的原因及其易受攻击的影响,这些攻击也使恶意节点也有机会进行其他攻击。我们通过简单的风险分析确认,冒名顶替攻击可为恶意犯罪分子提供诱人诱因,因此应在研究中给予最高优先级。我们的方法是使用安全路由协议检测和消除模拟攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号