A Black Hole Attack Model for Reactive Ad-Hoc Protocols
Net-Centric Warfare places the network in the center of all operations, making it a critical resource to attack and defend during wartime. This thesis examines one particular network attack, the Black Hole attack, to determine if an analytical model can be used to predict the impact of this attack o...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Report |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Badenhop, Christopher W |
description | Net-Centric Warfare places the network in the center of all operations, making it a critical resource to attack and defend during wartime. This thesis examines one particular network attack, the Black Hole attack, to determine if an analytical model can be used to predict the impact of this attack on ad-hoc networks. An analytical Black Hole attack model is developed for reactive ad-hoc network protocols DSR and AODV. To simplify topology analysis, a hypercube topology is used to approximate ad-hoc topologies that have the same average node degree. An experiment is conducted to compare the predicted results of the analytical model against simulated Black Hole attacks on a variety of ad-hoc networks. The results show that the model describes the general order of growth in Black Hole attacks as a function of the number of Black Holes in a given network. The model accuracy maximizes when both the hypercube approximation matches the average degree and number of nodes of the ad-hoc topology. For this case, the model falls within the 95% confidence intervals of the estimated network performance loss for 17 out of 20 measured scenarios for AODV and 7 out of 20 for DSR.
The original document contains color images. |
format | Report |
fullrecord | <record><control><sourceid>dtic_1RU</sourceid><recordid>TN_cdi_dtic_stinet_ADA557337</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>ADA557337</sourcerecordid><originalsourceid>FETCH-dtic_stinet_ADA5573373</originalsourceid><addsrcrecordid>eNrjZDB3VHDKSUzOVvDIz0lVcCwpAbF981NScxTS8osUglITk0syy4AyKboe-ckKAUX5JfnJ-TnFPAysaYk5xam8UJqbQcbNNcTZQzelJDM5vrgkMy-1JN7RxdHU1NzY2NyYgDQASNMpcA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>report</recordtype></control><display><type>report</type><title>A Black Hole Attack Model for Reactive Ad-Hoc Protocols</title><source>DTIC Technical Reports</source><creator>Badenhop, Christopher W</creator><creatorcontrib>Badenhop, Christopher W ; AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH GRADUATE SCHOOL OF ENGINEERING AND MANAGEMENT</creatorcontrib><description>Net-Centric Warfare places the network in the center of all operations, making it a critical resource to attack and defend during wartime. This thesis examines one particular network attack, the Black Hole attack, to determine if an analytical model can be used to predict the impact of this attack on ad-hoc networks. An analytical Black Hole attack model is developed for reactive ad-hoc network protocols DSR and AODV. To simplify topology analysis, a hypercube topology is used to approximate ad-hoc topologies that have the same average node degree. An experiment is conducted to compare the predicted results of the analytical model against simulated Black Hole attacks on a variety of ad-hoc networks. The results show that the model describes the general order of growth in Black Hole attacks as a function of the number of Black Holes in a given network. The model accuracy maximizes when both the hypercube approximation matches the average degree and number of nodes of the ad-hoc topology. For this case, the model falls within the 95% confidence intervals of the estimated network performance loss for 17 out of 20 measured scenarios for AODV and 7 out of 20 for DSR.
The original document contains color images.</description><language>eng</language><subject>AD HOC NETWORKS ; ATTACK MODELS ; BLACK HOLE ATTACKS ; Command, Control and Communications Systems ; Computer Systems ; Computer Systems Management and Standards ; CYBER SECURITY ; DATA TRANSMISSION SECURITY ; HOP DISTANCE DENSITY FUNCTION ; NETWORK AVAILABILITY ; NETWORK CENTRIC WARFARE ; NETWORK TOPOLOGY ; THESES</subject><creationdate>2012</creationdate><rights>Approved for public release; distribution is unlimited.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,780,885,27567,27568</link.rule.ids><linktorsrc>$$Uhttps://apps.dtic.mil/sti/citations/ADA557337$$EView_record_in_DTIC$$FView_record_in_$$GDTIC$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Badenhop, Christopher W</creatorcontrib><creatorcontrib>AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH GRADUATE SCHOOL OF ENGINEERING AND MANAGEMENT</creatorcontrib><title>A Black Hole Attack Model for Reactive Ad-Hoc Protocols</title><description>Net-Centric Warfare places the network in the center of all operations, making it a critical resource to attack and defend during wartime. This thesis examines one particular network attack, the Black Hole attack, to determine if an analytical model can be used to predict the impact of this attack on ad-hoc networks. An analytical Black Hole attack model is developed for reactive ad-hoc network protocols DSR and AODV. To simplify topology analysis, a hypercube topology is used to approximate ad-hoc topologies that have the same average node degree. An experiment is conducted to compare the predicted results of the analytical model against simulated Black Hole attacks on a variety of ad-hoc networks. The results show that the model describes the general order of growth in Black Hole attacks as a function of the number of Black Holes in a given network. The model accuracy maximizes when both the hypercube approximation matches the average degree and number of nodes of the ad-hoc topology. For this case, the model falls within the 95% confidence intervals of the estimated network performance loss for 17 out of 20 measured scenarios for AODV and 7 out of 20 for DSR.
The original document contains color images.</description><subject>AD HOC NETWORKS</subject><subject>ATTACK MODELS</subject><subject>BLACK HOLE ATTACKS</subject><subject>Command, Control and Communications Systems</subject><subject>Computer Systems</subject><subject>Computer Systems Management and Standards</subject><subject>CYBER SECURITY</subject><subject>DATA TRANSMISSION SECURITY</subject><subject>HOP DISTANCE DENSITY FUNCTION</subject><subject>NETWORK AVAILABILITY</subject><subject>NETWORK CENTRIC WARFARE</subject><subject>NETWORK TOPOLOGY</subject><subject>THESES</subject><fulltext>true</fulltext><rsrctype>report</rsrctype><creationdate>2012</creationdate><recordtype>report</recordtype><sourceid>1RU</sourceid><recordid>eNrjZDB3VHDKSUzOVvDIz0lVcCwpAbF981NScxTS8osUglITk0syy4AyKboe-ckKAUX5JfnJ-TnFPAysaYk5xam8UJqbQcbNNcTZQzelJDM5vrgkMy-1JN7RxdHU1NzY2NyYgDQASNMpcA</recordid><startdate>201203</startdate><enddate>201203</enddate><creator>Badenhop, Christopher W</creator><scope>1RU</scope><scope>BHM</scope></search><sort><creationdate>201203</creationdate><title>A Black Hole Attack Model for Reactive Ad-Hoc Protocols</title><author>Badenhop, Christopher W</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-dtic_stinet_ADA5573373</frbrgroupid><rsrctype>reports</rsrctype><prefilter>reports</prefilter><language>eng</language><creationdate>2012</creationdate><topic>AD HOC NETWORKS</topic><topic>ATTACK MODELS</topic><topic>BLACK HOLE ATTACKS</topic><topic>Command, Control and Communications Systems</topic><topic>Computer Systems</topic><topic>Computer Systems Management and Standards</topic><topic>CYBER SECURITY</topic><topic>DATA TRANSMISSION SECURITY</topic><topic>HOP DISTANCE DENSITY FUNCTION</topic><topic>NETWORK AVAILABILITY</topic><topic>NETWORK CENTRIC WARFARE</topic><topic>NETWORK TOPOLOGY</topic><topic>THESES</topic><toplevel>online_resources</toplevel><creatorcontrib>Badenhop, Christopher W</creatorcontrib><creatorcontrib>AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH GRADUATE SCHOOL OF ENGINEERING AND MANAGEMENT</creatorcontrib><collection>DTIC Technical Reports</collection><collection>DTIC STINET</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Badenhop, Christopher W</au><aucorp>AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH GRADUATE SCHOOL OF ENGINEERING AND MANAGEMENT</aucorp><format>book</format><genre>unknown</genre><ristype>RPRT</ristype><btitle>A Black Hole Attack Model for Reactive Ad-Hoc Protocols</btitle><date>2012-03</date><risdate>2012</risdate><abstract>Net-Centric Warfare places the network in the center of all operations, making it a critical resource to attack and defend during wartime. This thesis examines one particular network attack, the Black Hole attack, to determine if an analytical model can be used to predict the impact of this attack on ad-hoc networks. An analytical Black Hole attack model is developed for reactive ad-hoc network protocols DSR and AODV. To simplify topology analysis, a hypercube topology is used to approximate ad-hoc topologies that have the same average node degree. An experiment is conducted to compare the predicted results of the analytical model against simulated Black Hole attacks on a variety of ad-hoc networks. The results show that the model describes the general order of growth in Black Hole attacks as a function of the number of Black Holes in a given network. The model accuracy maximizes when both the hypercube approximation matches the average degree and number of nodes of the ad-hoc topology. For this case, the model falls within the 95% confidence intervals of the estimated network performance loss for 17 out of 20 measured scenarios for AODV and 7 out of 20 for DSR.
The original document contains color images.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_dtic_stinet_ADA557337 |
source | DTIC Technical Reports |
subjects | AD HOC NETWORKS ATTACK MODELS BLACK HOLE ATTACKS Command, Control and Communications Systems Computer Systems Computer Systems Management and Standards CYBER SECURITY DATA TRANSMISSION SECURITY HOP DISTANCE DENSITY FUNCTION NETWORK AVAILABILITY NETWORK CENTRIC WARFARE NETWORK TOPOLOGY THESES |
title | A Black Hole Attack Model for Reactive Ad-Hoc Protocols |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T02%3A15%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-dtic_1RU&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.btitle=A%20Black%20Hole%20Attack%20Model%20for%20Reactive%20Ad-Hoc%20Protocols&rft.au=Badenhop,%20Christopher%20W&rft.aucorp=AIR%20FORCE%20INST%20OF%20TECH%20WRIGHT-PATTERSON%20AFB%20OH%20GRADUATE%20SCHOOL%20OF%20ENGINEERING%20AND%20MANAGEMENT&rft.date=2012-03&rft_id=info:doi/&rft_dat=%3Cdtic_1RU%3EADA557337%3C/dtic_1RU%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |