CFP last date
22 April 2024
Reseach Article

Simulating Broken Link Fraud in DSDV

Published on December 2011 by H. Meena Sharma, Rajbir Kaur, M. S. Gaur
International Conference on Electronics, Information and Communication Engineering
Foundation of Computer Science USA
ICEICE - Number 4
December 2011
Authors: H. Meena Sharma, Rajbir Kaur, M. S. Gaur
68d966d2-5b8b-4993-a1dc-623b817acd24

H. Meena Sharma, Rajbir Kaur, M. S. Gaur . Simulating Broken Link Fraud in DSDV. International Conference on Electronics, Information and Communication Engineering. ICEICE, 4 (December 2011), 28-31.

@article{
author = { H. Meena Sharma, Rajbir Kaur, M. S. Gaur },
title = { Simulating Broken Link Fraud in DSDV },
journal = { International Conference on Electronics, Information and Communication Engineering },
issue_date = { December 2011 },
volume = { ICEICE },
number = { 4 },
month = { December },
year = { 2011 },
issn = 0975-8887,
pages = { 28-31 },
numpages = 4,
url = { /specialissues/iceice/number4/4277-iceice031/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 International Conference on Electronics, Information and Communication Engineering
%A H. Meena Sharma
%A Rajbir Kaur
%A M. S. Gaur
%T Simulating Broken Link Fraud in DSDV
%J International Conference on Electronics, Information and Communication Engineering
%@ 0975-8887
%V ICEICE
%N 4
%P 28-31
%D 2011
%I International Journal of Computer Applications
Abstract

A mobile ad hoc network (MANET) is a collection of mobile nodes forming an instant network with dynamic topology. Each mobile node acts as both router and host simultaneously. Routing protocols address the primary challenge of equipping each device to properly maintain information required to route traffic. Destination Sequence Distance Vector (DSDV) is one of the network layers routing protocol. Security is not addressed in DSDV making it vulnerable to various attacks. In this paper we discuss Byzantine and Broken Link Fraud in DSDV. We simulate Broken Link Fraud in ns-3 and show the effect of the attack on Packet Delivery Ratio (PDR). We show that PDR drops after the onset of the attack.

References
  1. Network simulator 3. http://www.nsnam.org.
  2. MANETs http://en.wikipedia.org/wiki/Mobile_ad_hoc_network
  3. Mobile Ad hoc Networking (MANET): Routing protocol Performance Issues and Evaluation Considerations. http://www.ietf.org/rfc/rfc2501.txt
  4. Charles E.Perkins and Pravin Bhagwat. “Highly Dynamic Destination Sequenced Distance Vector Routing (DSDV) for Mobile Computers” SIGCOMM Comput. Commun. Rev. , pp 234-244, 1994
  5. Richard Bellman, “On a Routing Problem”, Quarterly of Applied Mathematics, pp. 87–90, 1958.
  6. C.Hedrick. “Routing Information Protocol”. RFC 1058. Technical report, IETF, June 1988.
  7. Wang Weichao, Yi Lu, and B Bhargava. “On Security Study of Two Distance Vector Routing Protocols for Mobile Ad Hoc Networks”. In proceedings of the first IEEE International Conference on Pervasive Computing and Communications, pp. 179-186, March 2003
  8. Brijesh Kumar. “Integration of Security in Network Routing Protocol” SIGSAC Rev. pp 18-25, 1993
  9. Baruch Awerbuch, Reza Curtmola, David Holmer, Cristina Nita Rotaru, and Herbert Rubens, “ Mitigating Byzantine Attacks in AdHoc Wireless Networks”. Technical report, Department of Computer Science, Johns Hopkins University, Tech, 2004.
  10. Rajbir Kaur, Manoj Singh Gaur, and Vijay Laxmi. “A Novel Attack Model Simulation in DSDV Routing”. In Proceedings of the 4th IFIP International Conference on New Technologies, Mobility and Security
  11. Communicated and Accepted, volume IEEE Xplore, February 2011.
Index Terms

Computer Science
Information Sciences

Keywords

MANETs Byzantine attack Broken Link Fraud Denial of Services (DoS)