Term
| What are the 3 modification attacks? |
|
Definition
Packet misrouting Impersonation attack Sybil attack |
|
|
Term
| Describe a packet misrouting attack |
|
Definition
| Malicious nodes rereoute traffic from their original paht to make them reach the wrong destinations |
|
|
Term
| What is an impersonation attack? |
|
Definition
| Malicious node assumes the identity of another node in the network. That way they are able to received routing messages that are directed to the nodes they faked. |
|
|
Term
|
Definition
| A refined version of an impersonation attack but the attacker masquerades as multiple nodes |
|
|
Term
| What are the three iterception attacks? |
|
Definition
Wormhole Blackhole attacks Routing packet analysis attack |
|
|
Term
| What is a wormhole attack? |
|
Definition
| Comrpomised node in the ad hoc network colludes with external attacker to create a shortcut in the networks |
|
|
Term
| What is a black hole attack? |
|
Definition
| A malicious node tricks all their neighbour nodes to attract all the routing packets to them. They do this by advertising that they are the most optimal route to the dest |
|
|
Term
| What is a routing packet analysis attack? |
|
Definition
| Exploits the promiscious mode of MANETs to eavesdrop |
|
|
Term
| What are the two fabrication attacks? |
|
Definition
Sleep deprivation Route salvaging attacks |
|
|
Term
| What is a sleep deprivation attack? |
|
Definition
| Drain off limited resources by constantly making them busy processing unnecessary packets |
|
|
Term
| What is a route salvaging attack? |
|
Definition
| Lanched by greedy internal nodes, there is no guarantee that each trasnmitted packet will successfully reach the desired destinnation. Misbehaving nodes will duplicate and retransmit packets even though they havn't received error messages (so they hog bandwidth) |
|
|
Term
| What are the three interruption attacks? |
|
Definition
Packet dropping Flooding Lack of co-operation |
|
|
Term
| What is a packet dropping attack? |
|
Definition
| Adversary collaborates as usual in the route discovery process and lanunches the a constant packet dropping attack |
|
|
Term
| What is a flooding attack? |
|
Definition
| Adversaries interupt normal ops in the packet forwarding process by flooding the targetted destination nodes with huge unnecessary packets |
|
|
Term
|
Definition
| A misbehaving internal node not forwarding packets |
|
|