期刊名称:International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
印刷版ISSN:2278-1323
出版年度:2015
卷号:4
期号:6
页码:2797-2801
出版社:Shri Pannalal Research Institute of Technolgy
摘要:Wireless mesh network is a wireless communication among various nodes which are self-configured and self- organized in a dynamic manner. The nodes in the network mechanically demonstrating an ad-hoc network and holding the mesh connectivity, nodes interact with each other by propagating data packets to other network nodes. But in comparison of wired networks, WMNs are greatly prone to various security attacks because of its distributed architecture, open medium nature, and dynamic configuration. DoS attacks are most general attacks in networks which link to internet and since WMNs are primarily designed for long and fast distance internet access. We primarily focus our study on gray hole attacks in our work. Wireless mesh networks are composed of both mesh clients and mesh routers. We limit our studies to static mesh routers. We carry out gray hole attack in mesh routers and study the network delivery ratio without and with the existence of attack routers. By modeling the scenario with AODV protocol we analyzed the delay and throughput of packets and determine how it is influencing the network in the existence of an attacker router. After analyzing the results we suggest a new detection and prevention algorithm depending on overhearing the adjacent node to which the packet is propagating. By holding the past knowledge of number of packets routed and the number of packets overheard the algorithm finds out the number of packets lost and find the possibility of attack. This probability is examined with the threshold value of probability and finds out whether a router is behaving badly or not. We also taken into account the possibility of false positives and considered essential measures in the algorithm to minimize it. If a router is detected behaving badly it is discarded from the network and barred from further propagating the packets. We examine our algorithm in the existence of an attack router and determine the attack router and study the enhancement in the delivery ratio. By simulation we measure and enhance the WMN performance by considering our algorithm utilizing delay and throughput as an performance metrics.