期刊名称:International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
印刷版ISSN:2278-1323
出版年度:2013
卷号:2
期号:2
页码:679-683
出版社:Shri Pannalal Research Institute of Technolgy
摘要:The colluding collision and identity delegation attack comes under the new class of attacks of wireless ad hoc networks namely stealthy attacks that diminish the expense and sight of the invader. The nodes which are compromised by these attacks provide the impression to their neighbors as if they are doing the correct forwarding action. The normal nodes will be accused of showing malicious behavior. In the colluding collision attack, the adversary injects malicious nodes at the opportune time so that collision will occur and hence, the packet will not reach the destination. In case of identity delegation attack, the malicious nodes relay their identities to some other compromised node in the network so as to make the packet which it receives to be delivered to a wrong next hop by making use of that delegated identity. Observation of the behavior of the neighborhood which is performed by the normal network nodes is one of the common methods for detecting attacks in wireless networks. Local monitoring also does the same but these cannot detect stealthy attacks efficiently as they isolate legitimate nodes mistakenly. This drawback can be rectified using a protocol called SADEC. It makes use of the local monitoring technique by increasing the number of nodes that can do the monitoring function and they maintain additional information about the routing path so that it can check whether each node is doing its legitimate action.
关键词:Ad Hoc networks; local monitoring; Stealthy ; packet dropping; Colluding collision; Identity delegation