Browse > Article
http://dx.doi.org/10.6109/JKIICE.2009.13.3.482

Detecting Jamming Attacks in MANET  

Shrestha, Rakesh (조선대학교 정보통신공학과)
Lee, Sang-Duk (조선대학교 정보통신공학과)
Choi, Dong-You (조선대학교 정보통신공학과)
Han, Seung-Jo (조선대학교 정보통신공학과)
Abstract
Mobile Ad-hoc Networks provide communication without a centralized infrastructure, which makes them suitable for communication in disaster areas or when quick deployment is needed. On the other hand, they are susceptible to malicious exploitation and have to face different challenges at different layers due to its open Ad-hoc network structure which lacks previous security measures. Denial of service (DoS) attack is one that interferes with the radio transmission channel causing a jamming attack. In this kind of attack, an attacker emits a signal that interrupts the energy of the packets causing many errors in the packet currently being transmitted. In harsh environments where there is constant traffic, a jamming attack causes serious problems; therefore measures to prevent these types of attacks are required. The objective of this paper is to carry out the simulation of the jamming attack on the nodes and determine the DoS attacks in OPNET so as to obtain better results. We have used effective anomaly detection system to detect the malicious behaviour of the jammer node and analyzed the results that deny channel access by jamming in the mobile Ad-hoc networks.
Keywords
Denial of Service; Mobile Ad-hoc Networks; IDS; Wireless Jamming;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Vikram Gupta, Srikanth Krishnamurthy, and Michalis Faloutsos Denial of Service Attacks at the MAC Layer in Wireless Ad-hoc Networks, In Proceedings of Milcom, 2002
2 Agustin Zaballos, Alex Vallejo, Guiomar orral, Jaume Abella. Ad-hoc routing performance study using OPNET Modeler University Ramon Llull (URL-La Salle Engineering) Barcelona (Spain)- 2006
3 OPNET Documentation, http://www.opnet.com
4 Mithun Acharya, Tanu Sharma, David Thuente, David Sizemore. Intelligent Jamming in 802.11b Wireless Networks. In Proceedings of the OPNETWORK-2004 Conference Washington DC, USA, August 2004
5 L. Zhou and Z. Haas. Securing Ad-hoc networks. IEEE Network,13(6):24--30, November/December 1999   DOI   ScienceOn
6 Y. Zhang and W. Lee, "Intrusion detection in wireless Ad ocnetworks," ACM MOBICOM, 2000