Abstract — In this paper, we propose an attack model against DSR ad hoc network routing protocol and analyze the effects of this attack model on DSR route discovery mechanism. The analysis of the attack model includes a probabilistic formulation to estimate route discovery failure. Simulations are performed to complement the analytic model. Results show that this attack can be kept in control with minimal harm on the network, provided that there is a detection mechanism; otherwise, with the increasing rate of compromised nodes, the harm on network tends to increase. As an interesting side result, our analysis also shows that our attack model can also be used to improve the performance DSR route discovery mechanism
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allow...
The Mobile Ad-hoc Network is a network in which the nodes can communicate with other nodes without i...
Abstract: Problem statement: Ad hoc networks are formed dynamically by group of mobile devices co op...
In this paper, we investigate the impact of Route REQuest (RREQ) flooding attack on mobile ad hoc ne...
Ad-hoc networks are frequently used to establish communication in improvised environments without re...
There can be several sophisticated attacks motivated by selfish, resource saving nature of nodes in ...
Abstract-In this paper, we investigate the impact of hacker attacks by malicious nodes on the overal...
Study towards wireless adhoc network dates two decades back with various researchers evolving up wit...
AbstractSecure routing protocols for mobile ad hoc networks provide the required functionality for p...
The importance of security has been recognized in ad hoc networks for many years. Consequently many ...
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, ...
Security is one of the most challenging issues in Mobile ad-hoc networks (MANETs). Most of the routi...
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there ...
DSR is an on-demand routing protocol. This means routes are not pre-established routes and routes ar...
Abstract. A mobile ad hoc network is set up with a group of mobile wireless nodes without the use of...
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allow...
The Mobile Ad-hoc Network is a network in which the nodes can communicate with other nodes without i...
Abstract: Problem statement: Ad hoc networks are formed dynamically by group of mobile devices co op...
In this paper, we investigate the impact of Route REQuest (RREQ) flooding attack on mobile ad hoc ne...
Ad-hoc networks are frequently used to establish communication in improvised environments without re...
There can be several sophisticated attacks motivated by selfish, resource saving nature of nodes in ...
Abstract-In this paper, we investigate the impact of hacker attacks by malicious nodes on the overal...
Study towards wireless adhoc network dates two decades back with various researchers evolving up wit...
AbstractSecure routing protocols for mobile ad hoc networks provide the required functionality for p...
The importance of security has been recognized in ad hoc networks for many years. Consequently many ...
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, ...
Security is one of the most challenging issues in Mobile ad-hoc networks (MANETs). Most of the routi...
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there ...
DSR is an on-demand routing protocol. This means routes are not pre-established routes and routes ar...
Abstract. A mobile ad hoc network is set up with a group of mobile wireless nodes without the use of...
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allow...
The Mobile Ad-hoc Network is a network in which the nodes can communicate with other nodes without i...
Abstract: Problem statement: Ad hoc networks are formed dynamically by group of mobile devices co op...