SPIRO THE TECH GURU

Back

What is malicious node?

By Admin on

MALICIOUS NODE


Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANETs) are required to develop a strong security scheme it is therefore necessary to understand how malicious nodes can attack the MANETs. Focusing on the Optimized Link State Routing (OLSR) protocol, an IDS mechanism to accurately detect and isolate misbehavior node(s) in OLSR protocol based on End-to-End (E2E) communication between the source and the destination is proposed. The collaboration of a group of neighbor nodes is used to make accurate decisions. Creating and broadcasting attackers list to neighbor nodes enables other node to isolate misbehavior nodes by eliminating them from the routing table. Eliminating misbehavior node allows the source to select another trusted path to its destination.


ROUTING PROTOCOLS 

                         The routing protocols implemented in MANETs are globally classified into two categories: proactive or table driven protocols and reactive or on-demand protocols. Table driven protocols rely on a table, which maintains consistent up-to-date information concerning routes to all possible destinations, whereas on-demand routing protocols implement source-initiated route organization, where a route is created when desired by the node.

ATTACKS USING MODIFICATION

                           Modification is a type of attack when an authorized party not only gains access to but tampers with an asset. For example a malicious node can redirect the network traffic and conduct DOS attacks by modifying message fields or by forwarding routing message with false values.

ATTACKS USING IMPERSONATION

                         As there is no authentication of data packets in current ad-hoc network, a malicious node can launch many attacks in a network by masquerading as another node i.e. spoofing. Spoofing is occurred when a malicious node misrepresents its identity in the network (such as altering itsMAC or IP address in outgoing packets) and alters the target of thenetworktopology that a benign node can either.

ATTACKS THROUGH FABRICATION

                        Fabrication is an attack in which an authorizedparty not only gains the access but also inserts counterfeit objects into the system. InMANET, fabrication is used to refer the attacks performed by generating false routing messages Gray hole attack We now describe the grayhole attack on MANETS.


SPIRO Google Plus