Ad hoc networking has received considerable attention in the research community for seamless communications without an existing infrastructure network. However, such networks are not designed with security protection in mind and they are prone to several security attacks. One such simple attack is the packet dropping attack, where a malicious node drops all data packets, while participating normally in routing information exchange. This attack is easy to deploy and can significantly reduce the throughput in ad hoc networks.
In this dissertation, we study this problem through analysis and simulation. The packet dropping attack can be a result of the behavior of a selfish node or pernicious nodes that launch blackhole or a wormhole attacks. We are only interested in detecting this attack but not the causes of the attack. In this dissertation, for simple static ad hoc networks, analysis of the throughput drop due to this attack along with its improvement when mitigated are presented. A watchdog and a newly proposed "cop" detection mechanisms are studied for mitigating the throughput degradation after detection of the attack. The watchdog mechanism is a detection mechanism that has to be typically implemented in every node in the network. The cop detection mechanism is similar to the watchdog mechanism but only a few nodes opportunistically detect malicious nodes instead of all nodes performing this function. For multiple flows in static and mobile ad hoc networks, simulations are used to study and compare both mechanisms. The study shows that the cop mechanism can improve the throughput of the network while reducing the detection load and complexity for other nodes.
Identifer | oai:union.ndltd.org:PITT/oai:PITTETD:etd-08282008-130308 |
Date | 11 September 2008 |
Creators | Anusas-amornkul, Tanapat |
Contributors | Dr.Richard Thompson, Dr.James Joshi, Dr.David Tipper, Dr.Prashant Krishnamurthy, Dr.Daniel Mosse |
Publisher | University of Pittsburgh |
Source Sets | University of Pittsburgh |
Language | English |
Detected Language | English |
Type | text |
Format | application/pdf |
Source | http://etd.library.pitt.edu/ETD/available/etd-08282008-130308/ |
Rights | unrestricted, I hereby certify that, if appropriate, I have obtained and attached hereto a written permission statement from the owner(s) of each third party copyrighted matter to be included in my thesis, dissertation, or project report, allowing distribution as specified below. I certify that the version I submitted is the same as that approved by my advisory committee. I hereby grant to University of Pittsburgh or its agents the non-exclusive license to archive and make accessible, under the conditions specified below, my thesis, dissertation, or project report in whole or in part in all forms of media, now or hereafter known. I retain all other ownership rights to the copyright of the thesis, dissertation or project report. I also retain the right to use in future works (such as articles or books) all or part of this thesis, dissertation, or project report. |
Page generated in 0.0019 seconds