tailieunhanh - Mobile Ad Hoc Networks Applications Part 11

Tham khảo tài liệu 'mobile ad hoc networks applications part 11', kỹ thuật - công nghệ, cơ khí - chế tạo máy phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả | MANET Mining Mining Association Rules 341 This swap is equivalent to dropping one of the two similar bit-vectors in the bit-matrix. Since there is utterly no difference between the source and the destination matrices the same MFSs key are obtained. Wormhole attacks do not affect KDTM. Wormhole leaks routed packets at a node to the outside world. Still the MFSs built from the leaked packets is not the same as that of the end nodes because not all traffic from the source to the destination pass through the same route. KDTM is immune to Man-in-Middle MIM attacks. In passive MIM attack the malicious node just builds and mines its bit-matrix however the resultant MFS obtained is different from that of the end nodes. Still in this situation the MFS obtained at the end nodes is not affected because MIM does not alter the bit-vector of both passing data packets and passing ACK. Two scenarios are observed in active MIM attacks. The first scenario the malicious node forges modifies the bit-vector of the passing data packets. This means the same alteration is reflected in both the bit-matrices of the end nodes. In the second scenario the MIM alters the bit-vector of the passing ACK. This means the same change is induced in the source bit-matrix but not in the destination bit-matrix. The difference induced between source and destination bit-matrices is insufficient because a small number of ACK pass through the same route and therefore the same MFS obtained at the end nodes. Notably active MIM can be identified through checking of bit-vector by routing nodes before sending it to the next node and if any node discover that its bit or the bits of her neighbors who have not received the packet is changed then this node should send a warning message to the other nodes in the MANET that there is an active MIM in the network. Simulation results show that KDTM is tolerant in that adding deleting bit-vectors randomly to from bit matrix up to 30 does not change the resultant MFS. .

TỪ KHÓA LIÊN QUAN