Modeling data transmission in mobile ad-hoc networks for characterizing black-hole attacks

Mnar Saeed Alnaghes, Hong Shen

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The vulnerability of mobile ad-hoc networks (MANETs) to various kinds of attacks such as active route interfering and denial of service has brought increasing concerns in the deployment of MANETs. The black-hole Attack is a notorious attack that absorbs data packets by the malicious node and results in denial of service in the network. This paper proposes a Markov chain based stochastic model to simulate data transmission in MANETs using the RTS/CTS handshaking mechanism for characterizing the effect of black-hole attacks. Through simulation evaluation, we analyze the effect of black-hole attacks on major network performance metrics for the multi-hop routing protocol applying the proposed data transmission model.

Original languageEnglish
Title of host publicationProceedings - 2019 20th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2019
EditorsHui Tian, Hong Shen, Wee Lum Tan
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages78-83
Number of pages6
ISBN (Electronic)9781728126166
DOIs
Publication statusPublished - Dec 2019
Externally publishedYes
Event20th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2019 - Gold Coast, Australia
Duration: 5 Dec 20197 Dec 2019

Publication series

NameProceedings - 2019 20th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2019

Conference

Conference20th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2019
Country/TerritoryAustralia
CityGold Coast
Period5/12/197/12/19

Keywords

  • Black hole attack
  • Mobile ad hoc network
  • Reliable communication
  • Security

Fingerprint

Dive into the research topics of 'Modeling data transmission in mobile ad-hoc networks for characterizing black-hole attacks'. Together they form a unique fingerprint.

Cite this