Download now Free registration required
Ad hoc networks exploit the processing, storage and wireless communication capabilities of mobile devices to create spontaneous and low-cost self-configuring networks. Despite the promises offered by such networks, their industrial exploitation claims for methodologies to assess the level of security provided by resulting solutions. A first step towards that ambitious goal is to study how central elements of ad hoc networks, their routing protocols, behave in absence, but also in presence, of malicious faults (attacks). Black holes are simple but effective denial of service attacks in today's ad hoc networks. This paper describes how to inject such attacks in ad hoc networks relying on proactive routing protocols. A VoIP ad hoc solution is used as case study.
- Format: PDF
- Size: 365.6 KB