Article

Article title ANALYSIS OF ATTACKS IN MOBILE AD HOC NETWORKS USING VULNERABILTIES IN NETWORK PROTOCOLS
Authors T.A. Grishechkina
Section SECTION II. PROTECTION OF COMPUTER SYSTEMS
Month, Year 12, 2012 @en
Index UDC 004.056.53 (004.733)
DOI
Abstract The paper is intended to analyze attacks in mobile ad hoc networks using vulnerabilities in network protocols with the use of different models and methods. Structure and characteristics of Ad-Hoc networks as information security objects and targets of attack are analyzed. Based on the results of that analysis, different discovered vulnerabilities and methods of attack on network protocols used in such networks are given. In sight of discovered vulnerabilities, further possible behavior of attacker and prospective objects of attacks are considered. Role of information security requirements for ensuring security of wireless Ad-Hoc networks are shown. In the end, conclusions about the need for development of new information security methods for these networks are provided.

Download PDF

Keywords Mobile ad hoc networks; wireless networks; MANET; information security; attack type.
References 1. Миночкин А.И., Романюк В.А. Методология оперативного управления мобильными радиосетями // Зв‘язок. – 2005. – № 2. – С. 53-58.
2. Аманжолова С.Т., Медведев С.А. Протоколы маршрутизации в беcпроводных meshсетях // Журнал студенческих научных работ КазНТУ. – 2011. Электронный ресурс. URL: http://portal.kazntu.kz/files/publicate/2012-04-27-1899_0.pdf (дата обращения 23.10.2012).
3. Gupte S., Singhal M. Secure routing in mobile wireless ad-hoc networks, Ad Hoc Netw. – 2003. – № 1. – P. 151-174.
4. Priyanka Goyal, Vinti Parmar, Rahul Rishi. MANET: Vulnerabilities, Challenges, Attacks, Application, IJCEM International Journal of Computational Engineering & Management.
– 2011. – Vol. 11. – P. 32-37.
5. Иващук И.Ю. Предотвращение wormhole атак в беспроводных сетях с помощью пакетных меток // Научно-технический вестник СПбГУ ИТМО. – 2008. – № 52. – С. 188-194.
6. Perkins C.E., Royer E.M. Ad-hoc on-demand vector routing, in: Proceedings of Second IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, February
1999, – P. 90-100.
7. Johnson D.B., Maltz D.A. Dynamic source routing in ad hoc wireless networks, in: Mobile Computing, Kluwer Academic Publishers, 1996. – P. 153-181.
8. Весельская О.М. Обеспечение безопасности в самоорганизующихся беспроводных сетях // Материалы X Международной научно-технической конференции «Авиа-2011». – Киев, 2011. – С. 80-83.

Comments are closed.