Term
What are the 3 modification attacks? |
|
Definition
Packet misrouting Impersonation attack Sybil attack |
|
|
Term
Describe a packet misrouting attack |
|
Definition
Malicious nodes rereoute traffic from their original paht to make them reach the wrong destinations |
|
|
Term
What is an impersonation attack? |
|
Definition
Malicious node assumes the identity of another node in the network. That way they are able to received routing messages that are directed to the nodes they faked. |
|
|
Term
|
Definition
A refined version of an impersonation attack but the attacker masquerades as multiple nodes |
|
|
Term
What are the three iterception attacks? |
|
Definition
Wormhole Blackhole attacks Routing packet analysis attack |
|
|
Term
What is a wormhole attack? |
|
Definition
Comrpomised node in the ad hoc network colludes with external attacker to create a shortcut in the networks |
|
|
Term
What is a black hole attack? |
|
Definition
A malicious node tricks all their neighbour nodes to attract all the routing packets to them. They do this by advertising that they are the most optimal route to the dest |
|
|
Term
What is a routing packet analysis attack? |
|
Definition
Exploits the promiscious mode of MANETs to eavesdrop |
|
|
Term
What are the two fabrication attacks? |
|
Definition
Sleep deprivation Route salvaging attacks |
|
|
Term
What is a sleep deprivation attack? |
|
Definition
Drain off limited resources by constantly making them busy processing unnecessary packets |
|
|
Term
What is a route salvaging attack? |
|
Definition
Lanched by greedy internal nodes, there is no guarantee that each trasnmitted packet will successfully reach the desired destinnation. Misbehaving nodes will duplicate and retransmit packets even though they havn't received error messages (so they hog bandwidth) |
|
|
Term
What are the three interruption attacks? |
|
Definition
Packet dropping Flooding Lack of co-operation |
|
|
Term
What is a packet dropping attack? |
|
Definition
Adversary collaborates as usual in the route discovery process and lanunches the a constant packet dropping attack |
|
|
Term
What is a flooding attack? |
|
Definition
Adversaries interupt normal ops in the packet forwarding process by flooding the targetted destination nodes with huge unnecessary packets |
|
|
Term
|
Definition
A misbehaving internal node not forwarding packets |
|
|