Sie sind auf Seite 1von 5

Abstract:

In tactical (i.e. used by military or civil protection) communication systems, sensitive data (e.g. information on soldier positions) is transmitted over a wireless network with a potentially high probability of enemies being around. Therefore, a secure and reliable communication is essential. Black Hole ttacks are a serious threat to communication in tactical ! "#Ts. In this work we

present T$%B & a new centralised approach, using topology graphs to identify nodes attempting to create a black hole. 'e use well(established techni)ues to gain knowledge about the network topology and use this knowledge to perform plausibility checks of the routing information propagated by the nodes in the network. 'e consider a node generating fake routing information as malicious. Therefore, we trigger an alarm if the plausibility check fails.

Introduction
There are currently two variations of mobile wireless networks infrastructured and Infrastructureless networks. The infrastructured networks, also known as cellular network, have fi*ed and wired gateways. They have fi*ed base stations that are connected to other base stations through wires. The transmission range of a base station constitutes a cell. ll the mobile nodes lying within this hand off occurs as cell connects to and communicates with the nearest bridge (base station).

mobile host travels out of range of one Base +tation and into the range of another and thus, mobile host is able to continue communication seamlessly throughout the network. #*ample of this type includes office wireless local area networks (', "s) shown in fig(a).. The other type of network, Infrastructureless network, is known as !obile "etwork (! "#T). These networks have no fi*ed routers. d(hoc ll nodes are capable of movement

and can be connected dynamically in arbitrary manner. The responsibilities for organi-ing and controlling the network are distributed among the terminals themselves. The entire network is mobile, and the individual terminals are allowed to move at will relative to each other. In this type of network, some pairs of terminals may not be able to communicate directly to with each other and relaying of some messages is re)uired so that they are delivered to their destinations. The nodes of these networks also function as routers, which discover and maintain routes to other nodes in the networks. The nodes may be located in or on airplanes, ships, trucks, cars, perhaps even on people or very small devices shown in fig(b).

(a). Infrastructure

(b). Infrastructureless network

Fig Infrastructure and Infrastructureless network The chief difference between ad hoc networks is the apparent lack of a centrali-ed entity within an ad hoc network. There are no base stations or mobile switching centers in an ad hoc network. d(hoc networks were mainly used for military applications. +ince then, they have become increasingly more popular within the computing industry. pplications include emergency search and rescue operations, deployment of sensors, conferences, e*hibitions, virtual classrooms and operations in environments where construction of infrastructure is difficult or e*pensive. d(hoc networks can be rapidly deployed because of the lack of infrastructure. 1 Characteristics of MANET !obile ad(hoc network nodes are furnished with wireless transmitters and receivers using antennas, which may be highly directional (point(to(point), omnidirectional (broadcast), probably steerable, or some combination thereof them. t a given point in time, depending on positions of nodes, their transmitter and receiver coverage patterns, communication power levels and co(channel interference levels, a wireless connectivity in the form of a random, multihop graph or .ad(hoc. network e*ists among the nodes. This ad(hoc topology may modify with time as the nodes move or ad/ust their transmission and reception parameters. The characteristics of these networks are summari-ed as follows0 Dynamic Topolo ies: +ince nodes are free to move arbitrarily, the network topology may change randomly and rapidly at unpredictable times. The links may be unidirectional bidirectional. !and"idth constrained, #ariable capacity lin$s: 'ireless links have significantly lower capacity than their hardwired counterparts. lso, due to multiple access, fading, noise, and interference conditions etc. the wireless links have low throughput. Ener y constrained operation: +ome or all of the nodes in a ! "#T may rely on batteries. In this scenario, the most important system design criteria for optimi-ation may be energy conservation. %imited physical security: !obile wireless networks are generally more prone to physical security threats than are fi*ed(cable nets. The increased possibility of
3

eavesdropping, spoofing, and denial(of(service attacks should be carefully considered. #*isting link security techni)ues are often applied within wireless networks to reduce security threats. approaches. Autonomous terminal: In ! "#T, each mobile terminal is an autonomous node (!obile hosts0 !Hs) which may function as both a host and a router. The mobile nodes have the basic processing ability as a host and can also perform switching functions as a router. +o usually endpoints and switches are indistinguishable in ! "#T. & Typical applications of MANETs +ome of the applications of ! "#Ts are as follows0 !ilitary communications 1ommunications in conferences 1ontent distribution 1ontent synchroni-ation 2ersonal area networking ' %imitations of MANET +ome of the limitations of ! "#Ts are as follows0 3uality of service is difficult to be guaranteed &elay caused by multi(hopping +calability problem 2rone to security threat ( Ad#anta es of MANET The following are the advantages of ! "#T0 They provide access to information and services regardless of geographic 2osition. These networks can be set up at any place and time. ) !lac$ hole s a benefit, the decentrali-ed nature of network control in ! "#T provides additional robustness against the single points of failure of more centrali-ed

In networking, blac$ holes refer to places in the network where incoming or outgoing traffic is silently discarded (or .dropped.), without informing the source that the data did not reach its intended recipient. 'hen e*amining the topology of the network, the black holes themselves are invisible, and can only be detected by monitoring the lost traffic4 hence the name. *. Net"or$ topolo y Net"or$ topolo y is the arrangement of the various elements (links, nodes, etc.) of a computer or biological network. #ssentially, it is the topological structure of a network, and may be depicted physically or logically. Physical topology refers to the placement of the network5s various components, including device location and cable installation, while logical topology shows how data flows within a network, regardless of its physical design. &istances between nodes, physical interconnections, transmission rates, and6or signal types may differ between two networks, yet their topologies may be identical.

+E,E+ENCE- AND !I!%I./+A012


789 :;ieee conference on local area networks( detecting black hole attacks in tactical manets using topology graphs) 7;9 http066en.wikipedia.org6wiki6Blackhole<attack 7:9http066en.wikipedia.org6wiki6!obile<ad<hoc<network
7

7=9http066www.bth.se6fou6cuppsats.nsf6all6==>8?=ba@:f:>;fdc8;ABBA8CC@;;@b>6Dfile6Einal<

Thesis<Feport<iruaC><resaC>G;C nalysisG;CofG;CBlackholeG;C ttack.pdf 7A9 http066citeseer*.ist.psu.edu6viewdoc6downloadHdoiI8C.8.8.>>.BA@JrepIrep8JtypeIpdf 7@9 Kohn 'iley and +ons Handbook of Wireless Networks and Mobile Computing #dited by Ivan +to/menovicL 1opyright M ;CC; Kohn 'iley J +ons, Inc

Das könnte Ihnen auch gefallen