Professional Documents
Culture Documents
Tracing of Dos Attackers in Wireless Network
Tracing of Dos Attackers in Wireless Network
Tracing of Dos Attackers in Wireless Network
Algorithm
Engender 1: Zone
a random number x sampling process. Algorithm 2: Path reconstruction
from (0,1) process
Step 3. Path reconstruction. In
the path reconstruction process, the If the chain is constructed successfully,
victim reconstructs the zone path from the victim can then find out all the
Is
the attacker to itself using the zone zones that the packet has been passed
x<p? w.zoneID=n.zoneID
information in each packet. through. Then the attack response
w.distance=1
The detailed steps are as the following. methods can be used. There are some
(a) Insert the value of zone ID in routing protocols in the MANET that
the received packet into the chain use multiple paths to transmit packets.
w.zoneID!=null and Forword
according to the value of distance. If using this kind of routing protocols,
w.zoneID! packet w the
(b)
=n.ZoneID If the value of zone ID in only one path is constructed because
packet is equal to the value of zone ID the victim can launch certa
Figure 3: Flowchart for the algorithm
w.distance++
n.distance
<w.distan
ce
Is node
n Replace node n
victims with packet w
?
Stop
packet header. Thus, zone sampling process
is executed in the node b. The node b maps
its coordinate into the zone map and gets its
zone ID 2.
victim through the nodes b->c->d->e->f->g- The radio range of nodes is the
>h->i->j->victim. function of the radio transmission power.
Under the above circumstance, each node Under the same transmission power, different
firstly constructs a chain and lets itself be the propagation models will produce different
head. When receiving a packet, node b can
decide that it is not the destination from the
radio ranges. Let be the transmission ln( D )
<
power and l the radio range, then. x
2
+ y
2
D −1
2
Let n be the number of nodes that will [1 −(1−P) f ( tx ) ] x 2 +y
forward the packet when a packet passes [(1−P) f (tx ) ]
through some zone. Based on (2), n can be
(8)
approximately computed as
From (8), we can discover that the value of
χ
2 2
L + y (3)
E(x) has close correlation with the value of p.
Assume the function of p is as the following:
n≈ ≤
I f (tx )
Because every node marks the packet F(p)=
with probability p, the probability for the x
2
+y
2
D−1
2
victim to receive a packet marked by a d hop [1 −(1−P) f ( tx ) ] x 2 +y
away zone is [(1−P) f (tx ) ]
(9)
P(d)=(1-(1-P)n)[(1-p)n]d-1 (0<d<=D) f (p) is an incremental function of p, so f (p)
(4) gets its maximal value when チÝ f (p)/チÝp = 0,
and at the same time E(x) can get its minimal
Because the probability of receiving a sample value. Therefore we can calculate the value of
decreases geometrically as it is the further P
away from the victim, the convergence time
for this algorithm is dominated by the 2
y
2
time to receive a sample from the furthest
route. Then the expectation of the time can p =1−
x +
1−
1
be expressed as f (tx ) D
1 (10)
E (t ) = D −1
(1−(1−P) )[(1−P) n]
n
8. SIMULATION RESULTS
(5)
For convenient computing, it is First, we compare the number of zones
conservatively assumed that samples from all with the length of zone path. In the
of the D nodes appear with the same simulation, the network area is divided into X
likelihood as the furthest node. From the point × Y zones (X = 4, Y = 2, 3, 4, 5, 6). For each
of the victim, when it receives a packet, the kind of zone division, two nodes whose
probability that the packet has some zone distance is the longest are selected. As shown
information is larger than in Figure 5, with the increment of zone
number, the length of zone path is also
P(i)=D[1-(1-p)n][(1-P)n]D-1 increasing, but the increasing rate is slow.
(6) When the number of zones varies from 8 to
24,
From the well-known coupon collector the length of zone path only varies from 4 to
problem, then the expected number of trials 9. Thus, in a MANET with large area, we can
required to select one of each of D equi- increase the number of zones to obtain the
probable items is attacker’s position more accurately. Also, the
zone path length increases slowly.
The length of zone path is related to
E(n)=D(ln(D) + O(1)) (7)
the value of X and Y. Under the same zone
number, if X = 1, Y = 8, 12, 16, 20, 24, the
Therefore, the number of packets required for
length of zone path must increase. Therefore,
the victim to reconstruct a zone path of length
when dividing zones, we should make X be
D has the following bounded expectation:
equal to Y.
E ( n)
E( χ ) =
P (i )
the propagation model is TWO-RAY, the radio
30 transmission range is 282 meter.
24 50
25
45
20
40
Number of Hops
20
16 35
30
15
12 25
9 20
10 8
7 15
6
4 4 10
5
5
0
0 8 9 10 11 12 13 14 15
1 2 3 4 5
Number of Packets