...
首页> 外文期刊>Indian Journal of Science and Technology >Exploration of Security Threat Analysis in Wireless Mobile Adhoc Network
【24h】

Exploration of Security Threat Analysis in Wireless Mobile Adhoc Network

机译:无线移动自组网中安全威胁分析的探索

获取原文
   

获取外文期刊封面封底 >>

       

摘要

Objective: Mobile Adhoc Networks (MANETs) due to its principle characteristics of network infrastructure, limited resources and transmission range are more vulnerable to multitude of attacks. The objective is to classify the attacks and its counter measures to detect and eliminate malicious nodes. Methods/Analysis: Each attack has been analyzed briefly based on its own characteristics and behavior. Also, the defeating methodologies against network attacks have been described and evaluated as a part of the measurements. We have also proposed an Algorithm to study and analyze networks on affected conditions. We presented analytics and classification of the attacks on the different layers of the network. Findings: On attacked situation in network there will be no data available as the characteristics of the network are unknown. We need to simulate such types of conditions in the network. The performance of the network gets degraded at the time of attack. It was observed that the impact of attack depends on the proximity of the attacker to the source node, it is severe when close and least when far from the source. Each malicious node uses network feature (Distributed Network, Non-centralized, Hop-by-Hop communications, Open network boundary or Wireless media) to break the security. The goal is to violate security service (Availability, Data Confidentiality and Integrity). In our algorithm, we showcased the normalization of the data set such that we get the maximum and minimum values for the classification of the network. The primary groups of data types for classification are: Delay, bandwidth utilization, and drop rate and packet type). There are some secondary classification like conjunction, status of process, running services and utilization of processor. The condition of system was presented as a vector by storing the normalized values in an array. We arrived at simulating a network in attacked situations. Applications/Improvements: The work can be extended to find ways to calculate the threshold effectively. Group attacks can be studied and derive the relationship between the average detection delay and the mobility of the nodes.
机译:目的:移动自组织网络(MANET)由于其网络基础结构的基本特性,有限的资源和传输范围更容易受到多种攻击。目的是对攻击及其对策进行分类,以检测和消除恶意节点。方法/分析:每种攻击都根据其自身的特征和行为进行了简要分析。而且,已经描述了针对网络攻击的失败方法,并将其作为测量的一部分进行了评估。我们还提出了一种算法来研究和分析受影响条件下的网络。我们介绍了网络不同层上攻击的分析和分类。结果:在网络遭受攻击的情况下,由于网络的特性未知,因此将没有可用的数据。我们需要在网络中模拟这种类型的条件。攻击时网络性能会下降。据观察,攻击的影响取决于攻击者与源节点的接近程度,当靠近源节点时最严重,而远离源节点时最严重。每个恶意节点都使用网络功能(分布式网络,非集中式,逐跳通信,开放网络边界或无线媒体)来破坏安全性。目的是违反安全服务(可用性,数据机密性和完整性)。在我们的算法中,我们展示了数据集的归一化,以便获得网络分类的最大值和最小值。用于分类的主要数据类型为:延迟,带宽利用率以及丢包率和数据包类型)。有一些二级分类,例如合取,进程状态,运行服务和处理器利用率。通过将归一化的值存储在数组中,将系统的条件表示为向量。我们开始在受攻击的情况下模拟网络。应用程序/改进:可以扩展工作以找到有效计算阈值的方法。可以研究组攻击,并得出平均检测延迟与节点移动性之间的关系。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号